Device-to-device network
First Claim
Patent Images
1. A method for communicating data, comprising the steps of:
- receiving a request to access a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access, said devices authorized to access being distributed across a global network;
identifying said devices authorized to access; and
allowing communication with said devices authorized to access and not allowing communication with said devices not authorized to access.
10 Assignments
0 Petitions
Accused Products
Abstract
A device to device network allows an entity to seamlessly access content stored on various devices. Many devices can be registered on a network; however, an entity will only have access to devices for which the entity is authorized to access. In one embodiment, the entity can only access devices that have been authenticated with the same username. While using the device-to device network, an entity can transfer files, stream files, create and use play lists, send commands to various devices and explore the contents of various devices.
290 Citations
57 Claims
-
1. A method for communicating data, comprising the steps of:
-
receiving a request to access a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access, said devices authorized to access being distributed across a global network;
identifying said devices authorized to access; and
allowing communication with said devices authorized to access and not allowing communication with said devices not authorized to access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 19, 20, 21, 22, 24, 27, 29, 30, 31, 32, 33, 35, 36, 38, 39, 40, 41)
-
-
15. A method for communicating data, comprising the steps of:
-
receiving a request to access a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access;
identifying items on said set of devices authorized to access; and
creating a playlist of said items on said set of devices authorized to access, said playlist includes items on different devices.
-
-
18. A method of communicating data, comprising the steps of:
-
logging a first device into a network of devices using a first user identification, said network of devices includes devices logged into said network using said first user identification and devices logged in to said network using one or more other user identifications, said one or more other user identifications include a second user identification;
identifying said devices that are logged in to said network using said first user identification; and
allowing said first device to communicate with devices that are logged into said network using said first user identification and not allowing communication with devices that are logged in to said network using said second user identification.
-
-
23. A method of communicating data, comprising the steps of:
-
accessing a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access;
sending a search request to said set of devices authorized to access; and
receiving search results from said set of devices authorized to access.
-
-
25. A method for communicating data, comprising the steps of:
-
receiving a request for a search, said search being requested by a source device;
performing said search;
sending results of said search directly to said source device if a direct connection to said source device is possible; and
sending results of said search to said source device via an intermediary device if a direct connection to said source device is not possible.
-
-
26. A method for communicating data, comprising the steps of:
-
receiving a request to transfer an item, said item residing on a target device;
attempting to establish a first connection with said target device in response to said step of receiving;
transferring said item using said first connection if said attempt to establish said first connection was successful;
sending a message to said target device via an intermediate device if said attempt to establish said first connection was not successful;
receiving an attempt to establish a second connection from said target device; and
transferring said item using said second connection if said attempt to establish said second connection was successful.
-
-
28. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a request to access a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access, said devices authorized to access being distributed across a global network;
identifying said devices authorized to access; and
allowing communication with said devices authorized to access and not allowing communication with said devices not authorized to access.
-
-
34. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a request to access a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access;
identifying items on said set of devices authorized to access; and
creating a playlist of said items on said set of devices authorized to access, said playlist includes items on different devices.
-
-
37. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
logging a first device into a network of devices using a first user identification, said network of devices includes devices logged into said network using said first user identification and devices logged in to said network using one or more other user identifications, said one or more other user identifications include a second user identification;
identifying said devices that are logged in to said network using said first user identification; and
allowing said first device to communicate with devices that are logged into said network using said first user identification and not allowing communication with devices that are logged in to said network using said second user identification.
-
-
42. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
accessing a network of devices, said network of devices includes a set of devices authorized to access and a set of devices not authorized to access;
sending a search request to said set of devices authorized to access; and
receiving search results from said set of devices authorized to access. - View Dependent Claims (43)
-
-
44. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a request for a search, said search being requested by a source device;
performing said search;
sending results of said search directly to said source device if a direct connection to said source device is possible; and
sending results of said search to said source device via an intermediary device if a direct connection to said source device is not possible. - View Dependent Claims (46, 48, 49, 50, 51, 52)
-
-
45. One or more processor readable storage devices for storing processor readable code, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a request to transfer an item, said item residing on a target device;
attempting to establish a first connection with said target device in response to said step of receiving;
transferring said item using said first connection if said attempt to establish said first connection was successful;
sending a message to said target device via an intermediate device if said attempt to establish said first connection was not successful;
receiving an attempt to establish a second connection from said target device; and
transferring said item using said second connection if said attempt to establish said second connection was successful.
-
-
47. An apparatus for communicating data, comprising:
-
a communication interface; and
one or more processors, in communication with said communication interface, said one or more processor perform a method comprising the steps of;
receiving a request to access a network of devices, said network devices includes a set of devices authorized to access and a set of devices not authorized to access, said devices authorized to access being distributed across a global network, identifying said devices authorized to access, and allowing communication with said devices authorized to access and not allowing communication with said devices not authorized to access.
-
-
53. An apparatus for communicating data, comprising:
-
a communication interface; and
one or more processors in communication with said communication interface, said one or more processor perform a method comprising the steps of;
logging a first device into a network of devices using a first user identification, said network of devices includes devices logged into said network using said first user identification and devices logged in to said network using one or more other user identifications, said one or more other user identifications include a second user identification, identifying said devices that are logged in to said network using said first user identification, and allowing said first device to communicate with devices that are logged into said network using said first user identification and not allowing communication with devices that are logged in to said network using said second user identification. - View Dependent Claims (54, 55, 56, 57)
-
Specification