Secure cloud-based clipboard for touch devices
First Claim
1. A method comprising:
- receiving, from a stylus, a first input at a first computing device comprising a display, wherein the stylus includes a physical button, a tip, a storage medium, and a wireless transceiver configured to communicate with at least the first computing device, and wherein the received first input is based on one or more of an applied amount of pressure via the tip onto the display of the first computing device, clicking the physical button, and causing a movement of the tip against the display;
in response to a selected asset based on the received first input, transmitting, to a remote server system, an encrypted version of the selected asset for storage on the remote server system; and
providing to the stylus for storage thereon, a decryption key to decrypt the encrypted asset, and a unique identifier to identify the encrypted asset stored on the remote server system or to reference a storage location that corresponds to the encrypted asset stored on the remote server system, wherein the stylus is configured to transmit the decryption key and the unique identifier to a second computing device based on a second input received thereon from the stylus, and wherein the second computing device is configured to retrieve and decrypt the encrypted version of the selected asset.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for securely transferring assets via a cloud-based clipboard are provided. In an embodiment, input is indicating an asset is received from an input device at a computing device, which transmits to asset to cloud-based storage. The method stores a reference to a storage location of the asset in the cloud-based storage in the input device. The method receives, from the input device, a request for the asset at a second computing device, the request indicating the reference. The requested asset is retrieved from the cloud-based storage and rendered on the second computing device. The asset can be encrypted prior to transmission to the cloud-based storage and a decryption key for the asset is stored in the input device. In response to a request, the encrypted asset is retrieved and provided to a second computing device, where the asset is decrypted using the key from the input device.
51 Citations
20 Claims
-
1. A method comprising:
-
receiving, from a stylus, a first input at a first computing device comprising a display, wherein the stylus includes a physical button, a tip, a storage medium, and a wireless transceiver configured to communicate with at least the first computing device, and wherein the received first input is based on one or more of an applied amount of pressure via the tip onto the display of the first computing device, clicking the physical button, and causing a movement of the tip against the display; in response to a selected asset based on the received first input, transmitting, to a remote server system, an encrypted version of the selected asset for storage on the remote server system; and providing to the stylus for storage thereon, a decryption key to decrypt the encrypted asset, and a unique identifier to identify the encrypted asset stored on the remote server system or to reference a storage location that corresponds to the encrypted asset stored on the remote server system, wherein the stylus is configured to transmit the decryption key and the unique identifier to a second computing device based on a second input received thereon from the stylus, and wherein the second computing device is configured to retrieve and decrypt the encrypted version of the selected asset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer storage medium storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:
-
receiving, at a first computing device comprising a display, a first input from a stylus, wherein the stylus includes a physical button, a tip, a storage medium, and a wireless transceiver configured to establish a wireless connection with at least the first computing device, and wherein the received first input is based on one or more of an applied amount of pressure via the tip onto the display of the first computing device, a clicking of the physical button, and a movement of the tip against the display; in response to a selected asset based on the received first input, encrypting the selected asset and generating a decryption key for decrypting the selected asset; sending, to a server system remote from the first computing device, the encrypted asset for storage thereon; receiving, from the server system, a unique identifier that identifies the encrypted asset stored in the server system or references a storage location corresponding to the encrypted asset; and providing to the stylus, for storage in a storage medium thereof, the unique identifier and the decryption key, wherein the stylus is configured to provide a second computing device with the unique identifier and the decryption key to retrieve and decrypt the encrypted asset based on a second input received by the second computing device from the stylus. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-implemented method comprising:
-
receiving, by a first application executing on a computing device, a cut input or a copy input from a stylus, wherein the stylus includes a physical button, a tip, a storage medium, and a wireless transceiver configured to establish a wireless connection with at least the computing device, wherein the received cut input or copy input is based on one or more of an applied amount of pressure via the tip onto the display of the first computing device, a clicking of the physical button, and a movement of the tip against the display, wherein the received cut input or copy input corresponds to a selected asset, and wherein the selected asset is copied to a local clipboard of the computing device in response to the received cut input or copy input; transmitting, to a remote server system for storage thereon, an encrypted version of the selected asset, and first application information; providing, to the stylus for storage thereon, a decryption key for decrypting the encrypted asset, a unique identifier that identifies the encrypted asset stored on the server system or that references a storage location that corresponds to the encrypted asset, and the first application information; receiving, by a second application, a paste input from the stylus, wherein the received paste input includes the decryption key, the unique identifier, and the first application information; based at least in part on the first application information, determining whether the selected asset copied to the local clipboard can be provided to the second application; in response to determining that the selected asset copied to the local clipboard can be provided to the second application, retrieving the selected asset from the local clipboard; in response to determining that the selected asset copied to the local clipboard cannot be provided to the second application, retrieving the encrypted asset from the remote server system utilizing the unique identifier, wherein the retrieved encrypted asset is decrypted by the computing device utilizing the decryption key; and rendering, within an interface of the second application, the decrypted asset. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification