Secure cloud-based clipboard for touch devices
First Claim
1. A computer readable storage medium having executable instructions stored thereon, that if executed by at least one processor of a stylus, cause the at least one processor to perform operations comprising:
- providing a first input to a first client device, wherein the first input corresponds to an asset displayed via a first application of the first client device, and wherein the first client device is configured to encrypt the asset to store on a remote server device and further generate a decryption key to decrypt the encrypted asset based on the first input;
based on the first input, storing in a memory of the stylus, a unique identifier and a decryption key received from the first client device, wherein the unique identifier corresponds to the stored encrypted asset; and
providing a second input to a second application of one of the first client device or a second client device, the second input initiating a communication of the stored unique identifier and the stored decryption key from the stylus to the first or second client device respectively, wherein the respective first or second client device is configured to retrieve and decrypt the encrypted asset, based on the communicated unique identifier and decryption key, to display the asset via the second application thereof.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for securely transferring assets via a cloud-based clipboard are provided. In an embodiment, input is indicating an asset is received from an input device at a computing device, which transmits to asset to cloud-based storage. The method stores a reference to a storage location of the asset in the cloud-based storage in the input device. The method receives, from the input device, a request for the asset at a second computing device, the request indicating the reference. The requested asset is retrieved from the cloud-based storage and rendered on the second computing device. The asset can be encrypted prior to transmission to the cloud-based storage and a decryption key for the asset is stored in the input device. In response to a request, the encrypted asset is retrieved and provided to a second computing device, where the asset is decrypted using the key from the input device.
51 Citations
20 Claims
-
1. A computer readable storage medium having executable instructions stored thereon, that if executed by at least one processor of a stylus, cause the at least one processor to perform operations comprising:
-
providing a first input to a first client device, wherein the first input corresponds to an asset displayed via a first application of the first client device, and wherein the first client device is configured to encrypt the asset to store on a remote server device and further generate a decryption key to decrypt the encrypted asset based on the first input; based on the first input, storing in a memory of the stylus, a unique identifier and a decryption key received from the first client device, wherein the unique identifier corresponds to the stored encrypted asset; and providing a second input to a second application of one of the first client device or a second client device, the second input initiating a communication of the stored unique identifier and the stored decryption key from the stylus to the first or second client device respectively, wherein the respective first or second client device is configured to retrieve and decrypt the encrypted asset, based on the communicated unique identifier and decryption key, to display the asset via the second application thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
providing, by a stylus, a first input to a first client device, wherein the first input corresponds to an asset displayed via a first application of the first client device, and wherein the first client device is configured to encrypt the asset to store on a remote server device and further generate a decryption key to decrypt the encrypted asset based on the first input; based on the first input, storing, by the stylus, a unique identifier and a decryption key received from the first client device into a memory of the stylus, wherein the unique identifier corresponds to the stored encrypted asset; and providing, by the stylus, a second input to a second application of one of the first client device or a second client device, the second input initiating a communication of the stored unique identifier and the stored decryption key from the stylus to the first or second client device respectively, wherein the respective first or second client device is configured to retrieve and decrypt the encrypted asset, based on the communicated unique identifier and decryption key, to display the asset via the second application thereof. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A stylus comprising:
-
a computer readable storage medium having executable instructions stored thereon, that if executed by at least one processor of the stylus, cause the at least one processor to; provide a first input to a first client device, wherein the first input corresponds to an asset displayed via a first application of the first client device, and wherein the first client device is configured to encrypt the asset to store on a remote server device and further generate a decryption key to decrypt the encrypted asset based on the first input; based on the first input, store in a memory of the stylus, a unique identifier and a decryption key received from the first client device, wherein the unique identifier corresponds to the stored encrypted asset; and provide a second input to a second application of one of the first client device or a second client device, the second input initiating a communication of the stored unique identifier and the stored decryption key from the stylus to the first or second client device respectively, wherein the respective first or second client device is configured to retrieve and decrypt the encrypted asset, based on the communicated unique identifier and decryption key, to display the asset via the second application thereof. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification