Mesh-managing data across a distributed set of devices
First Claim
1. A method comprising:
- storing a core object on a storage device, wherein a network includes the storage device and a plurality of computing devices, and wherein the core object comprises a data file and an application corresponding to the data file and a user interface associated with the application and the data file, and wherein the core object is owned by a user and is not owned by any of the plurality of computing devices;
receiving, at a first computing device of the plurality of computing devices, an identifier that identifies the user;
determining a match between the core object and the identifier that identifies the user wherein the match indicates that the user owns the core object; and
projecting, in response to determining the match, the core object to the first computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over the mesh. Information in the core object may be identified with a corresponding user such that a user may use any collaborating device in the mesh to access the information. In one example, the information is stored remotely from a device used to access the information. A remote source may store the desired information or may determine the storage location of the desired information in the mesh and may further provide the desired information to a corresponding user.
28 Citations
18 Claims
-
1. A method comprising:
-
storing a core object on a storage device, wherein a network includes the storage device and a plurality of computing devices, and wherein the core object comprises a data file and an application corresponding to the data file and a user interface associated with the application and the data file, and wherein the core object is owned by a user and is not owned by any of the plurality of computing devices; receiving, at a first computing device of the plurality of computing devices, an identifier that identifies the user; determining a match between the core object and the identifier that identifies the user wherein the match indicates that the user owns the core object; and projecting, in response to determining the match, the core object to the first computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. At least one computer-readable device comprising computer-executable instructions that, when executed by a processor of a first computing device of the plurality of computing devices, cause the first device to perform a method comprising:
-
storing a core object on a storage device, wherein a network includes the storage device and the plurality of computing devices, and wherein the core object comprises a data file and an application corresponding to the data file and a user interface associated with the application and the data file, and wherein the core object is owned by a user and is not owned by any of the plurality of computing devices; receiving, at the first computing device, an identifier that identifies the user; determining a match between the core object and the identifier that identifies the user wherein the match indicates that the user owns the core object; and projecting, in response to determining the match, the core object to the first computing device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a first computing device configured to be part of a network that includes a plurality of computing devices and a storage device that is configured to store a core object, wherein the core object comprises a data file and an application corresponding to the data file and a user interface associated with the application and the data file, and wherein the core object is owned by a user and is not owned by any of the plurality of computing devices or the first computing device; the first computing device further configured to receive an identifier that identifies the user; the first computing device further configured to determine a match between the core object and the identifier that identifies the user wherein the match indicates that the user owns the core object; and the first computing device further configured to, in response to determining the match, receive a projection of the core object. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification