Access and control system for network-enabled devices
14 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple devices, that allow collaborative operations by multiple users of remote devices, that allow point to multipoint control of multiple devices and which allow rapid, secure transmission of data between remote users and devices. In general terms, the system includes at least one connection server, and at least two computers operatively coupled to the connection server via a public or global network. In an example where at least one client computer is operatively connected to at least one network-enabled device through a connection sever via the public or global network, the connection server is configured to route control instructions from the client to the network-enabled device, and route data from the network-enabled device to the client.
-
Citations
132 Claims
-
1-113. -113. (canceled)
-
114. A method of load balancing communications among a plurality of connection servers networked in a publicly addressable distributed control infrastructure which multiple computers within multiple private networks may access for establishing communications over a public network, said method comprising:
-
determining a user type of each computer to be connected by communications through said publicly addressable distributed control infrastructure in a particular session;
determining a session type of the particular session to be established;
comparing user type and session type determinations with server type information stored in at least one database connected to said distributed control infrastructure;
selecting a connection server characterized by server type information that indicates the connection server is capable of handling the determined user types and session type;
determining if the selected server is active;
determining whether or not the selected server, if active, has adequate Power to handle the connections that will be required to establish the communications for the session; and
if the selected server is active and has adequate Power, determining whether the selected server has the best available Power level for carrying out the session, based upon a calculated average Power expected for the session and Utilization Ratios of each capable, active connection server which has adequate Power. - View Dependent Claims (115)
-
-
116. A method of persistent, secure transfer of data between at least two computers over a public network, wherein the computers have separate privately addressed, firewall protected locations, said method comprising:
-
accessing a connection server operably connected to the public network by addressing a request from a first of the computers to a public address of the connection server;
establishing a secure connection between the first computer and the connection server, after which, the connection server establishes a secure connection between the connection server and at least a second of the computers, according to instructions received from the first computer as to which computers the first computer desires to communicate with;
wherein secure, full-duplex, persistent communications are established through the connection server without the need for any of the computers to know or address a private address of any of the other computers between which the communications take place. - View Dependent Claims (117, 118, 119, 120, 121, 122, 123, 124)
-
-
125-129. -129. (canceled)
-
130. A system for remote communications between private users through a public network while providing seamless, firewall-compliant connectivity, said system comprising:
-
a tunneling protocol comprising a stateless application level protocol by which a first computer is securely connectable to the public network through a first firewall element, said first firewall element adapted to protect said client computer from hostile intrusion from the public network, and by which a second computer is securely connectable to the public network through a second firewall element, said second firewall element adapted to protect said second computer; and
means for iteratively polling the stateless application level protocol to maintain efficient and persistent, stateful tunnel connections. - View Dependent Claims (131, 132)
-
Specification