Wireless communications invisible proxy and hooking systems and methods
First Claim
1. A wireless communications network, comprising:
- a wireless communications channel;
a server computer communicatively connected to the wireless communications channel; and
a client device communicatively connected via the wireless channel to the server computer;
wherein the server computer communicates with the client device over the wireless communications channel by a specialized protocol.
9 Assignments
0 Petitions
Accused Products
Abstract
An communications service provider provides wireless access to a packetized data network, such as the Internet. The service provider includes a server computer. The server computer is connected to the network, which is at least in part a wired network. The wired network is connected to a cellular wireless communications system. A method of the network includes a client device that communicates wirelessly with the server computer. The client device runs standard applications programs, such as browser, ftp, and e-mail. The method includes serving a first information by the server computer to the client device according to a specialized protocol, determining that the first information accords with the specialized protocol, and proxying the first information to the standard programs in a standard protocol readable by the standard programs.
37 Citations
10 Claims
-
1. A wireless communications network, comprising:
-
a wireless communications channel;
a server computer communicatively connected to the wireless communications channel; and
a client device communicatively connected via the wireless channel to the server computer;
wherein the server computer communicates with the client device over the wireless communications channel by a specialized protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of wireless communications, wherein a client device communicates wirelessly with a server computer, and wherein the client device runs standard programs, comprising the steps of:
-
serving a first information by the server computer to the client device according to a specialized protocol;
determining that the first information accords with the specialized protocol; and
proxying the first information to the standard programs in a standard protocol readable by the standard programs.
-
-
9. The method of claim 9, wherein the step of proxying includes the steps of invoking non-standard dynamic link libraries.
-
10. The method of claim 10, wherein the step of proxying includes the step of creating a non-standard socket.
Specification