Capability addressable network and method therefor
First Claim
Patent Images
1. A method of establishing connectivity in a data communication network, comprising the steps of:
- transmitting unsolicited messages from first and second peers for reception by another peer;
comparing an identity of the first peer that is included in an unsolicited message received by the second peer with an authorization key of the second peer to provide authorization for the second peer to establish a communication link with the first peer;
comparing an identity of the second peer that is received by the first peer with an authorization key of the first peer to provide authorization for the first peer to establish said communication link with the second peer; and
establishing connectivity in the data communication network after authorizing the first and second peers.
4 Assignments
0 Petitions
Accused Products
Abstract
A wireless, peer-to-peer, capability addressable network (22) is disclosed. The network (22) accommodates any number of peers (20). Network connections are formed based upon proximity between peers (20) and upon a needs and capabilities evaluation (82). Wireless communications occur at a sufficiently low power to form a detection zone (28) of less than about five meters for many peers (20).
-
Citations
12 Claims
-
1. A method of establishing connectivity in a data communication network, comprising the steps of:
-
transmitting unsolicited messages from first and second peers for reception by another peer;
comparing an identity of the first peer that is included in an unsolicited message received by the second peer with an authorization key of the second peer to provide authorization for the second peer to establish a communication link with the first peer;
comparing an identity of the second peer that is received by the first peer with an authorization key of the first peer to provide authorization for the first peer to establish said communication link with the second peer; and
establishing connectivity in the data communication network after authorizing the first and second peers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
evaluating the first need and the first capability of the first peer by the second peer; and
processing an addressed service connection in the second peer in response to the evaluating step.
-
-
4. The method of claim 3, further comprising the steps of:
-
uploading a computer program from the second peer to the first peer, the computer program defining a process for controlling the first peer; and
executing the computer program at the first peer.
-
-
5. The method of claim 4, further comprising the step of receiving control data from the second peer over the addressed service connection, wherein the control data is used by the computer program to control the first peer.
-
6. The method of claim 1 wherein the steps of:
-
transmitting unsolicited messages from first and second peers for reception by the another peer;
authorizing the second peer to establish the communication link with the first peer; and
authorizing the first peer to establish the communication link with the second peer occur without manual intervention.
-
-
7. The method of claim 1, wherein the step of establishing connectivity between the first peer and the second peer in the data communication network occurs when the first peer is within about 50 meters of the second peer.
-
8. The method of claim 1, further comprising the steps of:
-
receiving at a third peer an unsolicited second beacon message from the second peer; and
authorizing the third peer to establish a second communication link with the second peer based on the third peer verifying that the identity of the second peer is included in an authorization key of the third peer.
-
-
9. The method of claim 8, wherein the connectivity in the data communication network includes relaying, at the second peer, data between the first peer and the third peer.
-
10. The method of claim 1, wherein the second peer receives personalization data from the first peer.
-
11. The method of claim 10, wherein the personalization data is selected from a group consisting of identification codes, passwords, identification numbers, radio presets, television presets, language preferences, and telephone numbers.
-
12. The method of claim 11, further comprising the steps of:
-
storing the personalizing data at the second peer; and
programming the second peer with the personalizing data.
-
Specification