Patents Assigned to NEXTBIT SYSTEMS INC.
  • Publication number: 20140289203
    Abstract: Technology is disclosed for using computing devices (“the devices”) of a user as an edge cache of a distributed backup system to stream video files. In the distributed backup system, the user can store different data files of the user at different devices of the user and/or at a server. For example, the user may store video files at one of the devices of the user (“a first device”) in addition to storing at the server. When the user requests to stream a particular video file to a particular device, the technology streams the video file to the particular device either from the server or from the first device. If the first device is in proximity to the particular device, the video file is streamed from the first device instead of from the server, thereby minimizing the latency involved in streaming the video file from the server.
    Type: Application
    Filed: May 12, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289194
    Abstract: Technology for a method for backing up and restoring game application state across multiple devices is disclosed herein. The method includes running an instance of a game application, by a distributed system, at a first electronic device, determining a backup event that occurs in the first electronic device, wherein the backup event suggests a backup of application state data and the application state data represent an application state of the game application at the backup event, and transmitting the application state data of the game application to a remote storage service, in response to the backup event. A second electronic device can retrieve the application state data from the remote storage service and restore the game application state.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289304
    Abstract: At least one embodiment of this disclosure includes a method of resource balancing execution of a location-based application involving multiple devices. The method can include: identifying an application executing on an operating system of a first computing device; identifying a resource type to facilitate the executing of the location-based application; identifying computing devices each having at least an available resource instance of the identified resource type, wherein the computing devices are reachable by a communication protocol of the first computing device; and selecting a target computing device to offer up a target resource instance of the resource type to the location-based application based at least partly on a comparable limitation of each available resource instance of the computing devices.
    Type: Application
    Filed: May 2, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140287818
    Abstract: A technique and apparatus for backing up and restoring game application state across multiple devices are disclosed herein. The method includes running an instance of a game application at a first device. Based on any of various criteria, such as the proximity between the first device and a second device or a priority of synchronization, a computer makes a determination to synchronize the application state between the two devices. The computer causes the application state data, which represents an application state of the game application running on the first device, to be saved and made available to the second device, such as by saving the application state data to cloud storage. The second device receives the application state data and restores the game application state.
    Type: Application
    Filed: June 2, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289824
    Abstract: Technology is disclosed for sharing an authentication profile of a user between a group of user devices for accessing an access restricted computing environment (“the technology”). The access restricted computing environment can require the user to input authentication information, such as a username, password, or answers to challenge questions, to authenticate the user. For example, to access a wireless network on a first user device, a user may have to input a password for the wireless network. To access the same wireless network on a second user device, the user may have to input the password again on the second user device. The technology facilitates the user to obtain the authentication information required to access the wireless network from another user device, e.g., a device from which the user has accessed the wireless network previously. This can eliminate the need for the user to manually input the authentication information repeatedly.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289189
    Abstract: Technology is disclosed for performing a priority synchronization of a computing device to download a selected set of data files to the computing device from a distributed backup system. Data files are downloaded to a computing device by synchronizing the computing device with a server of the distributed backup system. A priority sync downloads a subset of the data files (“priority files”) rather than all of the data files of the user, thereby minimizing the computing resources consumed to download the data files. The priority sync can select the priority files based on various criteria, including an access pattern of the data files, attributes of the data files, or attributes of the computing device. The priority sync can also download the data files not identified as priority files (“non-priority files”). While the priority files are downloaded in their original format, the non-priority files are downloaded in a downgraded format.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Tom Moss, Daniel R. Bornstein, Justin Quan, Linda Tong
  • Publication number: 20140289411
    Abstract: Technology is disclosed for enabling multiple computing devices used by a user to interoperate with one another. The technology enables the user to install a given application on a distributed operating system (“DCOS”) managing the multiple computing devices as a single entity. The user can then use the given application through any of the computing devices when executing the given application through the DCOS.
    Type: Application
    Filed: February 13, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Daniel R. Bornstein, Tom Moss, Michael A. Chan, Linda Tong, Justin Quan
  • Publication number: 20140289415
    Abstract: Various embodiments generally relate to decentralized operating systems spanning multiple devices. More specifically, some embodiments relate to continuous and concurrent device experiences across the multiple devices. For example, a user may be streaming a movie through a service provided via a smart television. When the user's phone detects an incoming video call, the television can recognize that a video call is coming in and ask the user if the user wants to answer the call. If the user responds in the affirmative, the television can pause the streaming video from the service provide allowing the user to answer their phone. In some cases, the television can be used as the display screen to display the video call while the local phone resources (e.g., video camera) can be used as the recording device.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289195
    Abstract: Technology is disclosed for providing configurable synchronization mechanisms for automatic synchronization of application states across multiple devices using cloud storage. In accordance with the techniques introduced here, a method includes steps of receiving a request for supplemental application synchronization information associated with a first application on a first remote computing device. In response the request for the supplemental application synchronization information, application-specific configuration information is determined for synchronizing a state of the first application to a cloud-based storage service. The supplemental application synchronization information including the application-specific configuration information is then provided to the first remote computing device for facilitating synchronization of the state of the first application to the cloud-based storage service.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289190
    Abstract: Technology is disclosed for classification of data objects (e.g., files) in a distributed file system based on application creation and/or access information. In some embodiments, data objects of a user are stored across multiple computing devices associated with a user, e.g., mobile computing devices such as a tablet, a laptop, or a smartphone, and/or at server systems, e.g., cloud-based storage servers, in a distributed cloud-based storage system. The technology described tracks the applications that create or touch particular data objects in the distributed file system and classifies the data objects according to these applications resulting in various application classifications. For example, a classification engine can process data objects in the distributed file system to identify an application that created the data object and/or applications that have accessed the data object. The classification information can be saved by, for example, a cloud-based storage server.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 25, 2014
    Applicant: Nextbit Systems Inc.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289825
    Abstract: Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device.
    Type: Application
    Filed: April 14, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289333
    Abstract: At least one embodiment of this disclosure includes a method of sharing application states across different user profiles. The method can include: receiving a request from a first computing device associated with a first user profile to load an application state of a target application, wherein the application state is owned by a second user profile; verifying permission for the first user profile to load the application state owned by the second user profile; configuring a sharing instance of the application state of the target application by accessing application data of the application state associated with the second user profile in a storage service; and sending the sharing instance to be loaded onto the first computing device.
    Type: Application
    Filed: April 14, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Daniel R. Bornstein, Linda Tong
  • Publication number: 20140289717
    Abstract: Technology is disclosed for determining a serialization scheme used in serializing a software object by an application (“the technology”). A source application can serialize the object using multiple serialization schemes. In order for another application to deserialize the object serialized by the source application, the application may have to know the serialization scheme used in serializing the object. The technology can analyze an intermediate code, e.g., bytecode, of the source application to determine the serialization scheme used by the source application. The technology compares a portion of the code of the source application that serializes the objects with multiple serialization scheme templates having code for known serialization schemes and determines the serialization scheme used by the source application based on a matching serialization scheme template.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Michael K. Fleming, Daniel R. Bornstein
  • Publication number: 20140289191
    Abstract: Technology is disclosed for context sensitive synchronization of a distributed cloud-based file system across multiple devices and for providing seamless merging of conflicting data objects. In some embodiments, data objects of a user are stored across multiple computing devices associated with a user, e.g., mobile computing devices such as a tablet, a laptop, or a smartphone, and/or at server systems, e.g., cloud-based storage servers, in a distributed cloud-based storage system. The described technology intelligently synchronizes the data objects based on context and manages potential conflicts.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289417
    Abstract: At least one embodiment of this disclosure includes a method of resource balancing execution of an application involving multiple devices. The method can include: identifying an application executing on an operating system of a first computing device; identifying a resource type to facilitate the executing of the application; identifying multiple computing devices each having at least an available resource instance of the identified resource type, wherein the multiple computing devices are reachable by a communication protocol of the first computing device; and selecting a target computing device to offer up a target resource instance of the resource type to the application based at least partly on a comparable limitation of each available resource instance of the multiple computing devices.
    Type: Application
    Filed: April 14, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289414
    Abstract: Various embodiments are disclosed for enabling multiple computing devices having a decentralized operating system to effectively monitor and manage resources across the multiple devices. In some embodiments, the systems are able to identify a set of local resources available for utilization by an application running on the decentralized operating system. A resource message identifying the set of local resources can be generated using a resource discovery and utilization application programming interface. This information can then be sent to a requestor (e.g., an application running on the decentralized operating system) which can create a resource utilization plan.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Publication number: 20140289201
    Abstract: Technology disclosed herein includes a method for system restoration between computing devices by a tapping mechanism. A first device detects (e.g., via NFC) a second device in proximity. The first device transmits a user credential of the first device to the second device. Either directly or via a cloud storage service, the first device instructs the second device to download a copy of system data of the first device from the cloud storage service, instead of from the first device. The second device is able to restore a system state of the first device on the second device, using the user credential and the system data.
    Type: Application
    Filed: September 30, 2013
    Publication date: September 25, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventors: Michael A. Chan, Tom Moss, Daniel R. Bornstein, Michael K. Fleming, Justin Quan, Linda Tong
  • Publication number: 20140289426
    Abstract: Disclosed are systems, methods, and machine-readable storage mediums for selectively performing storage optimization processes in a computing device. In at least some embodiments, a method includes monitoring access patterns in association with data of one or more files accessed by a user of the computing device, determining a classification of the computing device, and utilizing the user access patterns and the device classification in determining execution of a storage optimization process based on a storage optimization policy. The storage optimization policy can specify downsampling, lossy compression, lossless compression, or a combination thereof to be applied to the files based on thresholds associated with the user access patterns and/or the device classification. Utilization of the storage optimization policy can enable the computing device to have an infinite local storage capacity.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 25, 2014
    Applicant: Nextbit Systems Inc.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Patent number: 8840461
    Abstract: Technology for a method for backing up and restoring game application state across multiple devices is disclosed herein. The method includes running an instance of a game application at a first electronic device, determining a backup event that occurs in the first electronic device, wherein the backup event suggests a backup of application state data and the application state data represent an application state of the game application at the backup event, and transmitting the application state data of the game application to a remote storage service, in response to the backup event. A second electronic device can retrieve the application state data from the remote storage service and restore the game application state.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: September 23, 2014
    Assignee: Nextbit Systems Inc.
    Inventors: Justin Quan, Michael A. Chan, Tom Moss, Michael K. Fleming
  • Patent number: 8844012
    Abstract: Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: September 23, 2014
    Assignee: Nextbit Systems Inc.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong