Apple inc. (20240223553). SYSTEMS AND METHODS FOR DATA STORAGE simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR DATA STORAGE

Organization Name

apple inc.

Inventor(s)

Srinivas Vedula of Pleasanton CA (US)

David Cohen of Longmont CO (US)

SYSTEMS AND METHODS FOR DATA STORAGE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240223553 titled 'SYSTEMS AND METHODS FOR DATA STORAGE

Simplified Explanation: The patent application describes a system where electronic devices discover each other, with one device selecting another to coordinate file storage. An authentication handshake is performed, and data is transmitted between the devices. The second device operates using a temporary file system, which may be deleted based on certain criteria being met.

Key Features and Innovation:

  • Devices in a system discover each other for file storage coordination.
  • Authentication handshake between devices.
  • Data transmission from one device to another.
  • Use of a temporary file system by the second device.
  • Deletion of temporary file system and data based on specific criteria.

Potential Applications: This technology could be applied in various scenarios such as:

  • Collaborative file storage systems.
  • Secure data transmission between devices.
  • Temporary data storage solutions.

Problems Solved: The technology addresses issues related to:

  • Efficient coordination of file storage.
  • Secure data transmission.
  • Temporary data storage management.

Benefits: The technology offers benefits including:

  • Improved file storage coordination.
  • Enhanced data security.
  • Efficient temporary data storage management.

Commercial Applications: Title: Secure Collaborative File Storage System This technology could be utilized in industries such as:

  • Cloud storage services.
  • Data security companies.
  • Collaborative work platforms.

Questions about the Technology 1. How does the authentication handshake process ensure secure data transmission? 2. What criteria are considered for the deletion of the temporary file system and data?


Original Abstract Submitted

a plurality of devices in a system discover one another and a first electronic device selects a second electronic device from amongst a plurality of devices to coordinate file storage. in some embodiments, the first electronic device and the second electronic device perform an authentication handshake. after performing the authentication handshake, the first electronic device transmits first data to the second electronic device. in some embodiments, the second electronic device operates using a temporary file system that includes the first data. in accordance with a determination that one or more criteria are satisfied, the second electronic device ceases operating using the temporary file system and deletes at least a portion of the temporary file system and/or first data.