Low-latency media sharing
First Claim
1. A computer-implemented method for sharing a file between a local device and a television, the method comprising:
- identifying, at a first time, a first image on the local device as a candidate for sharing, the first image selected by a user of the local device;
assigning a first identifier to the first image, the first identifier being a number;
determining a television with which to share the first image, the television having an established relationship with the local device including previously sharing images from the local device to the television;
identifying a tablet device with which to share the first image;
determining that the television has a higher priority than the tablet device based on the established relationship;
encrypting the first image to generate a first encrypted image, the encrypting using a first cryptographic key;
inserting the first identifier in a header associated with the first encrypted image, the header comprising supplemental data placed at a beginning of the first encrypted image;
associating the first cryptographic key with the first identifier;
sending, at a second time, the first encrypted image from the local device to the television, wherein the second time is after the first time;
sending, at a third time, the first encrypted image from the local device to the tablet device, wherein the third time is after the second time;
detecting, at a fourth time, a share request input by a user of the local device, the share request instructing the local device to share the first image with the television, wherein the fourth time is after the second time;
identifying the first identifier associated with the first image;
identifying the first cryptographic key using the first identifier; and
sending the first cryptographic key and the first identifier from the local device to the television.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems and methods are disclosed that encrypt media files with cryptographic keys and transmit the encrypted media files to a remote device during pre-caching. The encrypted media files may be transferred to the remote devices prior to a user issuing a request to share the particular media file. The local device may maintain cryptographic keys associated with the sent encrypted media files and only share a cryptographic key associated with a media file the user wishes to share. Without the cryptographic keys, the remote device cannot access the contents of the pre-shared encrypted media files in the remote device'"'"'s cache. Upon the user sharing the media file and the remote device receiving the cryptographic key, the remote device may use the cryptographic key to decrypt the encrypted media file and display the media file at a significantly reduced latency than if the media file were sent only upon the sharing request.
-
Citations
20 Claims
-
1. A computer-implemented method for sharing a file between a local device and a television, the method comprising:
-
identifying, at a first time, a first image on the local device as a candidate for sharing, the first image selected by a user of the local device; assigning a first identifier to the first image, the first identifier being a number; determining a television with which to share the first image, the television having an established relationship with the local device including previously sharing images from the local device to the television; identifying a tablet device with which to share the first image; determining that the television has a higher priority than the tablet device based on the established relationship; encrypting the first image to generate a first encrypted image, the encrypting using a first cryptographic key; inserting the first identifier in a header associated with the first encrypted image, the header comprising supplemental data placed at a beginning of the first encrypted image; associating the first cryptographic key with the first identifier; sending, at a second time, the first encrypted image from the local device to the television, wherein the second time is after the first time; sending, at a third time, the first encrypted image from the local device to the tablet device, wherein the third time is after the second time; detecting, at a fourth time, a share request input by a user of the local device, the share request instructing the local device to share the first image with the television, wherein the fourth time is after the second time; identifying the first identifier associated with the first image; identifying the first cryptographic key using the first identifier; and sending the first cryptographic key and the first identifier from the local device to the television. - View Dependent Claims (2, 3)
-
-
4. A computer-implemented method, comprising:
-
identifying first data on a first device as a candidate for sharing; identifying a second device with which to share the first data; determining a first relationship between the first device and the second device; identifying a third device with which to share the first data; determining a second relationship between the first device and the third device; determining that the third device has a lower priority than the second device based on the first relationship and the second relationship; generating first encrypted data based at least in part on the first data; sending the first encrypted data to the second device; sending the first encrypted data to the third device, wherein the first encrypted data is sent to the third device after the first encrypted data is sent to the second device; after sending the first encrypted data to the second device, receiving a share request for the first device to share the first data with the second device; and sending a first cryptographic key to the second device, the first cryptographic key usable for decrypting the first encrypted data. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A first computing device, comprising:
-
at least one processor; a memory device including instructions operable to be executed by the at least one processor to cause the device to; identify first data on the first device as a candidate for sharing; identify a second device with which to share the first data; generate first encrypted data based at least in part on the first data; send the first encrypted data to the second device; determine that the first data is unlikely to be shared with the second device; and send a signal to the second device to delete the first encrypted data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification