Method and apparatus for supporting communications between a computing device within a network and an external computing device
First Claim
1. A method for determining whether a first computing system within a protected network can communicate with an external computing system, said method comprising the steps of:
- receiving a registration request from at least one of said first and external computing systems; and
determining whether said computing system is publicly addressable.
26 Assignments
0 Petitions
Accused Products
Abstract
A network communication bridge establishes communication between a computing system within a protected network and an external computing system. A registrar is positioned outside the protected network and registers authorized users. The registrar determines if the computing device associated with the user is publicly addressable, and for those computing devices that are not publicly addressable, the computing device maintains a persistent communication session with a bridge proxy server. The bridge proxy server employs a reversal or relaying technique to enable communication between two systems that cannot ordinarily establish communication with each other, based on characteristics of the two systems. If at least one party to a communication is publicly addressable, then a reversal technique is employed. If neither party to the communication is publicly addressable, then both parties have a persistent session with their respective bridge proxy server, and the bridge proxy server acts as a “relay service” for communications between the initiator and the recipient. The invention can be implemented as a separate application or as an enhancement to the Session Initiation Protocol (SIP).
-
Citations
29 Claims
-
1. A method for determining whether a first computing system within a protected network can communicate with an external computing system, said method comprising the steps of:
-
receiving a registration request from at least one of said first and external computing systems; and
determining whether said computing system is publicly addressable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for determining whether a first computing system within a protected network can communicate with an external computing system, said system comprising:
-
a memory that stores computer-readable code; and
a processor operatively coupled to said memory, said processor configured to implement said computer-readable code, said computer-readable code configured to;
receive a registration request from at least one of said first and external computing systems; and
determine whether said computing system is publicly addressable. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An article of manufacture for determining whether a first computing system within a protected network can communicate with an external computing system, said article of manufacture comprising:
a computer readable medium having computer readable code means embodied thereon, said computer readable program code means comprising;
a step to receive a registration request from at least one of said first and external computing systems; and
a step to determine whether said computing system is publicly addressable.
-
26. A method for enabling a first computing system within a protected network to communicate with an external computing system, said method comprising the steps of:
-
determining whether at least one of said first and external computing systems is publicly addressable; and
initiating a reversal of roles as a call initiator and a call recipient for a communication between said first and external computing systems if at least one of said first and external computing systems is publicly addressable.
-
-
27. A system for enabling a first computing system within a protected network to communicate with an external computing system, said system comprising:
-
a memory that stores computer-readable code; and
a processor operatively coupled to said memory, said processor configured to implement said computer-readable code, said computer-readable code configured to;
determine whether at least one of said first and external computing systems is publicly addressable; and
initiate a reversal of roles as a call initiator and a call recipient for a communication between said first and external computing systems if at least one of said first and external computing systems is publicly addressable.
-
-
28. A method for determining whether a first computing system within a protected network can communicate with an external computing system, said method comprising the steps of:
-
determining whether at least one of said first and external computing systems is publicly addressable; and
propagating results of said determining step to one or more additional computing systems. - View Dependent Claims (29)
-
Specification