System and method for simplified secure universal access and control of remote networked electronic resources for the purposes of assigning and coordinationg complex electronic tasks
First Claim
1. A method for facilitating user access from a wireless device to one or more resources stored on or accessible from a remote computing device, the computing device comprising:
- one or more input devices;
one or more desktop applications, each desktop application comprising a user interface for accessing functionality associated with the application via at least one of the one or more input devices; and
a software program comprising a communication component having no user interface accessible via the one or more input devices and being accessible solely via communication with a proxy server;
the method comprising;
transmitting a resource list from the computing device to the wireless device via a proxy server, the resource list comprising identifiers for each of one or more resources that identify the resource without identifying the location where the resource is stored;
transmitting a message from the wireless device to the computing device via the proxy server, the message representing a request for a service in connection with a selected resource; and
performing the requested service without launching the one or more desktop applications.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for accessing resources located on (or accessible from) a remote computer. In a preferred embodiment, a proxy server is adapted to facilitate communication between the remote computer and a user'"'"'s wireless or other device. Both the remote computer and the wireless device preferably derive a DNS entry for the proxy server from a remote ID assigned to the remote computer and establish an HTTP connection with the proxy server. The remote computer preferably selects DNS entries for the proxy server that include randomly chosen DNS host names each of which resolve to the proxy server'"'"'s IP address. The proxy server is adapted to forward messages from the wireless device to the remote computer and from the remote computer to the wireless device via the HTTP connection. Each message is preferably encrypted so that it cannot be decrypted by the proxy server.
157 Citations
51 Claims
-
1. A method for facilitating user access from a wireless device to one or more resources stored on or accessible from a remote computing device, the computing device comprising:
- one or more input devices;
one or more desktop applications, each desktop application comprising a user interface for accessing functionality associated with the application via at least one of the one or more input devices; and
a software program comprising a communication component having no user interface accessible via the one or more input devices and being accessible solely via communication with a proxy server;
the method comprising;
transmitting a resource list from the computing device to the wireless device via a proxy server, the resource list comprising identifiers for each of one or more resources that identify the resource without identifying the location where the resource is stored;
transmitting a message from the wireless device to the computing device via the proxy server, the message representing a request for a service in connection with a selected resource; and
performing the requested service without launching the one or more desktop applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 42, 43, 44, 45, 46, 47)
- one or more input devices;
-
31. A method for transmitting data to a wireless device comprising:
-
dividing the data into blocks, each block having a size, the size being determined as a function of one or more physical characteristics of the wireless device; and
transmitting the blocks to the wireless device. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A method for communicating a confirmation message to a wireless device regarding a requested service, comprising:
-
determining a first time amount, the first time amount representing the time a connection to a wireless device is likely to remain available;
determining a second time amount, the second time amount representing the time it is likely to take to complete the requested service;
if the first time amount is greater than the second time amount, transmitting the confirmation message via the connection to the wireless device; and
if the second time amount is greater than the first time amount, transmitting the confirmation message via an alternate communication means. - View Dependent Claims (39)
-
-
40. A method for increasing the number of connections that can be handled by a proxy server, comprising:
-
determining a time amount that a connection can remain idle between the proxy server and a computing device;
receiving a polling request from the computing device at the proxy server; and
responding to the polling request when the time amount has passed. - View Dependent Claims (41)
-
-
48. A method for connecting a computing device to a proxy server, said computing device being provided with a unique numeric identifier comprising a plurality of fields, the method comprising:
-
establishing a HTTP connection between the computing device and the proxy server using a DNS entry derived from the plurality of fields and a DNS domain name selected from a plurality of DNS domain names provided to the computing device;
establishing subsequent HTTP connections between the computing device and the proxy server using DNS entries derived from the plurality of fields and others of the DNS domain names provided to the computing device;
wherein each DNS entry resolves to the same proxy server.
-
-
49. A method for authenticating a data message transmitted from a wireless device to a computing device via a proxy server, comprising:
-
using at least a portion of a password entered by a user to generate an encryption key;
encrypting a message with the encryption key;
transmitting the encrypted message from the wireless device to the computing device via the proxy server;
the computing device using the at least a portion of the password to generate a decryption key;
decrypting the encrypted message by the computing device using the decryption key; and
determining if the decrypted message contains valid data. - View Dependent Claims (50)
-
-
51. A system for facilitating user access to one or more resources, comprising:
-
a proxy server;
a wireless device adapted to establish a communication link with the proxy server;
a computing device comprising one or more input devices, one or more desktop applications, each desktop application comprising a user interface for accessing functionality associated with the application via at least one of the one or more input devices, and a software program comprising a communication component having no user interface accessible via the one or more input devices and being accessible solely via communication with the proxy server, the computing device being adapted to transmit a resource list to the wireless device via the proxy server, the resource list comprising identifiers for each of one or more resources that identify the resource without identifying the location where the resource is stored and adapted to receive a message from the wireless device via the proxy, the message representing a request for a service in connection with a selected resource.
-
Specification