Abstract:
Systems, methods, and computer-readable storage media for identifying a LAN sync candidate are disclosed. A synchronized content management system may receive a request from a first client device to synchronize a content item. The synchronized content management system may identify a second client device that has a current copy of the content item. The second client device may belong in the same local area network as the first client device. The second client device can be identified based on a characteristic of the LAN as well as the public and local addresses of the first and second client devices. The synchronized content management system can send a LAN sync instruction to the first client device. The instruction may identify the second client device as a LAN sync candidate. The first client device may then initiate LAN sync by requesting synchronization of the content item from the second client device.
Abstract:
Systems, methods, and computer-readable storage media for identifying a LAN sync candidate are disclosed. A synchronized content management system may receive a request from a first client device to synchronize a content item. The synchronized content management system may identify a second client device that has a current copy of the content item. The second client device may belong in the same local area network as the first client device. The second client device can be identified based on a characteristic of the LAN as well as the public and local addresses of the first and second client devices. The synchronized content management system can send a LAN sync instruction to the first client device. The instruction may identify the second client device as a LAN sync candidate. The first client device may then initiate LAN sync by requesting synchronization of the content item from the second client device.
Abstract:
The disclosed embodiments relate to a feature of a content-item-uploading system that facilitates secure, peer-to-peer distributed sharing of a version of a content item by a user that created the version of the content item (e.g., by modifying a previous version of the content item or by creating a new content item). During operation, the system receives a cryptographic key from the user. In response, the system provides the cryptographic key to recipients in the system. Subsequently, the recipients can use the cryptographic key for secure, peer-to-peer distributed sharing of the version of the content item among the user and the recipients in a shared network without synchronization conflicts with previous versions of the content item in the system.