Remote access to local network
First Claim
Patent Images
1. A method of communication, comprising:
- identifying, at an access terminal, an access point on a local network to be accessed by the access terminal;
sending a first message from the access terminal to a first security gateway to determine whether the first security gateway has established a first protocol tunnel to the access point;
receiving, at the access terminal, a response to the first message from the first security gateway, wherein the response indicates whether the first security gateway has established the first protocol tunnel to the access point; and
establishing, by the access terminal, a second protocol tunnel between the access terminal and the first security gateway to enable the access terminal to remotely access the local network if the response indicates that the first security gateway has established the first protocol tunnel to the access point.
1 Assignment
0 Petitions
Accused Products
Abstract
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
102 Citations
16 Claims
-
1. A method of communication, comprising:
-
identifying, at an access terminal, an access point on a local network to be accessed by the access terminal; sending a first message from the access terminal to a first security gateway to determine whether the first security gateway has established a first protocol tunnel to the access point; receiving, at the access terminal, a response to the first message from the first security gateway, wherein the response indicates whether the first security gateway has established the first protocol tunnel to the access point; and establishing, by the access terminal, a second protocol tunnel between the access terminal and the first security gateway to enable the access terminal to remotely access the local network if the response indicates that the first security gateway has established the first protocol tunnel to the access point. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for communication, comprising:
-
a mobility controller configured to identify an access point on a local network to be accessed by an access terminal; a communication controller configured to send a first message from the access terminal to a first security gateway to determine whether the first security gateway has established a first protocol tunnel to the access point, and further configured to receive a response to the first message from the first security gateway, wherein the response indicates whether the first security gateway has established the first protocol tunnel to the access point; and a tunnel controller configured to establish a second protocol tunnel between the access terminal and the first security gateway to enable the access terminal to remotely access the local network if the response indicates that the first security gateway has established the first protocol tunnel to the access point. - View Dependent Claims (9, 10)
-
-
11. An apparatus for communication, comprising:
-
means for identifying an access point on a local network to be accessed by an access terminal; means for sending a first message from the access terminal to a first security gateway to determine whether the first security gateway has established a first protocol tunnel to the access point; means for receiving a response to the first message from the first security gateway, wherein the response indicates whether the first security gateway has established the first protocol tunnel to the access point; and means for establishing a second protocol tunnel between the access terminal and the first security gateway to enable the access terminal to remotely access the local network if the response indicates that the first security gateway has established the first protocol tunnel to the access point. - View Dependent Claims (12, 13)
-
-
14. A non-transitory computer-readable medium storing computer executable code for causing a computer to:
-
identify an access point on a local network to be accessed by an access terminal; send a first message from the access terminal to a first security gateway to determine whether the first security gateway has established a first protocol tunnel to the access point; receive a response to the first message from the first security gateway, wherein the response indicates whether the first security gateway has established the first protocol tunnel to the access point; and establish a second protocol tunnel between the access terminal and the first security gateway to enable the access terminal to remotely access the local network if the response indicates that the first security gateway has established the first protocol tunnel to the access point. - View Dependent Claims (15, 16)
-
Specification