US Patent Application 18446880. SYSTEM AND METHOD OF SOCIAL AUTHENTICATION AND DATA SYNCHRONIZATION IN A NETWORK simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD OF SOCIAL AUTHENTICATION AND DATA SYNCHRONIZATION IN A NETWORK

Organization Name

Huawei Technologies Co., Ltd.==Inventor(s)==

[[Category:Jian Li of Waltham MA (US)]]

[[Category:Han Su of Ann Arbor MI (US)]]

SYSTEM AND METHOD OF SOCIAL AUTHENTICATION AND DATA SYNCHRONIZATION IN A NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 18446880 titled 'SYSTEM AND METHOD OF SOCIAL AUTHENTICATION AND DATA SYNCHRONIZATION IN A NETWORK

Simplified Explanation

The patent application describes a technology for storing data in a peer-to-peer network.

  • The technology involves a first computing device that identifies other computing devices in the network.
  • Each computing device in the network has a social relationship with at least one other computing device.
  • The degree of connection between the first computing device and each of the other computing devices is measured.
  • Based on the degree of connection, a group of other computing devices is selected to store the data.
  • Each computing device in the group is assigned a storage trust level, which is determined by their established social relationship.
  • The data is then transmitted to each computing device in the group for storage.


Original Abstract Submitted

The present technology discloses storing data in a peer-to-peer network. A first computing device identifies other computing devices in the peer-to-peer network. Each of the computing devices have an established social relationship with at least another one of the computing devices. A degree of connection between the first computing device and each of the other computing devices is detected. A group of the other of computing devices is selected based on the degree of connection for storing the data, and a storage trust level is assigned to each of the other computing devices in the group. The storage trust level of each of the other computing devices is based on the established social relationship. The data is then transmitted to each of the other computing devices in the group for storage.