Managed peer-to-peer applications, systems and methods for distributed data access and storage
First Claim
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing seamless, firewall-compliant connectivity, said method comprising the steps of:
- authenticating at least one of said remote computer for connection to said local computer over the public network and said local computer for connection to said remote computer over the public network;
establishing a secure connection between said local computer and said remote computer over the public network; and
integrating a desktop of said remote computer on a display of said local computer.
13 Assignments
0 Petitions
Accused Products
Abstract
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and remote operation includes authenticating at least one remote computer for connection to at least one computer over the network and/or at least one local computer for connection to at least one remote computer over the network; establishing a secure connection between the at least one local computer and the at least one remote computer over the network; and integrating a desktop of at least one remote computer on a display of at least one local computer. The connections may be made over a public network, as well as through multiple firewalls without loss of functionality. A method of accessing and using at least one remote computer from a local computer over a public network may include centrally authenticating, at a location having a public address, a first computer having a first, firewall protected private address; creating a first firewall compliant connection between a publicly addressed connection server and the first computer upon authentication of the first computer; establishing a second firewall compliant connection between the publicly addressed connection server and a second computer having a second firewall protected private address; establishing a private-to-public-to-private communications tunnel, wherein the connection server routes communications from the first computer through the first firewall compliant connection and the second firewall compliant connection to the second computer, and from the second computer through the second firewall compliant connection and the first firewall compliant connection to the first computer; and performing at least one further step selected from the group consisting of: integrating a file structure of accessible files accessed at the second or first computer, into a file structure contained at the first or second computer, respectively; at least one of integrating a desktop of the second computer on a display of the first computer and integrating a desktop of the first computer on a display of the second computer; and directly operating the second computer from the first computer or the first computer from the second computer, wherein the computer that is directly operated is selected from the group consisting of: home appliances, video equipment, audio equipment, printers, fax machines, office equipment, medical devices, vehicles, cameras, RFID equipment, laboratory equipment, manufacturing machinery, GPS equipment, and devices having one or more embedded microprocessors.
-
Citations
18 Claims
-
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing seamless, firewall-compliant connectivity, said method comprising the steps of:
-
authenticating at least one of said remote computer for connection to said local computer over the public network and said local computer for connection to said remote computer over the public network;
establishing a secure connection between said local computer and said remote computer over the public network; and
integrating a desktop of said remote computer on a display of said local computer. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity, said method comprising the steps of:
-
authenticating at least one of said remote computer for connection to said local computer over the network and said local computer for connection to said remote computer over the network;
establishing a secure connection between said local computer and said remote computer over the network; and
integrating a desktop of said remote computer on a display of said local computer. - View Dependent Claims (7, 8, 9, 10, 18)
-
-
11. A method of accessing and using at least one remote computer from a local computer over a public network, said method comprising the steps of:
-
centrally authenticating, at a location having a public address, a first computer having a first, firewall protected private address;
creating a first firewall compliant connection between a publicly addressed connection server and said first computer upon authentication of said first computer;
establishing a second firewall compliant connection between said publicly addressed connection server and a second computer having a second firewall protected private address;
establishing a private-to-public-to-private communications tunnel, wherein said connection server routes communications from said first computer through said first firewall compliant connection and said second firewall compliant connection to said second computer, and from said second computer through said second firewall compliant connection and said first firewall compliant connection to said first computer; and
performing at least one further step selected from the group consisting of;
integrating a file structure of accessible files accessed at said second or first computer, into a file structure contained at said first or second computer, respectively;
at least one of integrating a desktop of said second computer on a display of said first computer and integrating a desktop of said first computer on a display of said second computer; and
directly operating said second computer from said first computer or said first computer from said second computer, wherein the computer that is directly operated is selected from the group consisting of;
home appliances, video equipment, audio equipment, printers, fax machines, office equipment, medical devices, vehicles, cameras, RFID equipment, laboratory equipment, manufacturing machinery, GPS equipment, and devices having one or more embedded microprocessors. - View Dependent Claims (12)
-
-
13. A method of remotely accessing data from a remote storage device, said method comprising the steps of:
-
requesting data from a first computer in a first location to a remote storage device associated with a second computer in a second location, said first and second computers being connected over a wide area network; and
displaying a file structure, on a display of said first computer, of data stored on said remote storage device, wherein the displayed file structure may be interacted with by a user of the first computer in the same manner that a user of the second computer would interact with the file structure locally on a display of said second computer and wherein at least one of said first and second computers is located behind a firewall. - View Dependent Claims (14, 15, 16, 17)
-
Specification