Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
First Claim
1. A method for maintaining communication over first and second disjoint networks between at least first and second computing devices, the second computing device comprising a mobile computing device, the method comprising:
- using a first network identifier to identify the first computing device, communicating over a first network between the first computing device and said second, mobile computing device;
authenticating the second, mobile computing device for authorization to communicate with the first computing device over the second network before sending a further network identifier to the second, mobile computing device over the first network;
sending, to the second, mobile computing device over the first network, at least one further network identifier for use in at least in part identifying the first computing device on at least a second network disjoint from the first network, said at least one further network identifier being at least in part different from said first network identifier; and
using the at least one further network identifier to identify the first computing device, communicating between the first and second computing devices over the second network, thereby allowing communications between the first and second computing devices to continue even though said network identifier changes.
20 Assignments
0 Petitions
Accused Products
Abstract
A seamless solution transparently addresses the characteristics of nomadic systems, and enables existing network applications to run reliably in mobile environments. A Mobility Management Server coupled to the mobile network maintains the state of each of any number of Mobile End Systems and handles the complex session management required to maintain persistent connections to the network and to other peer processes. If a Mobile End System becomes unreachable, suspends, or changes network address (e.g., due to roaming from one network interconnect to another), the Mobility Management Server maintains the connection to the associated peer task—allowing the Mobile End System to maintain a continuous connection even though it may temporarily lose contact with its network medium. An interface-based listener uses network point of attachment information supplied by a network interface to determine roaming conditions and to efficiently reestablish connection upon roaming. The Mobility Management Server can distribute lists to Mobile End Systems specifying how to contact it over disjoint networks.
469 Citations
30 Claims
-
1. A method for maintaining communication over first and second disjoint networks between at least first and second computing devices, the second computing device comprising a mobile computing device, the method comprising:
-
using a first network identifier to identify the first computing device, communicating over a first network between the first computing device and said second, mobile computing device; authenticating the second, mobile computing device for authorization to communicate with the first computing device over the second network before sending a further network identifier to the second, mobile computing device over the first network; sending, to the second, mobile computing device over the first network, at least one further network identifier for use in at least in part identifying the first computing device on at least a second network disjoint from the first network, said at least one further network identifier being at least in part different from said first network identifier; and using the at least one further network identifier to identify the first computing device, communicating between the first and second computing devices over the second network, thereby allowing communications between the first and second computing devices to continue even though said network identifier changes. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A process for providing communications between mobile computing systems and a network computing system as the mobile computing systems roam between plural disjoint network segments, comprising:
-
establishing communications between the mobile computing systems and the network computing system via a first network segment; sending to the mobile computing systems, via the first network segment, network identifier information for use in communicating with said network computing system via plural further network segments, at least some of said plural further network segments being disjoint from the first network segment; authenticating at least some of the mobile computing device for authorization to communicate with the network computing system over at least one of said plural further network segments before sending the further network identifier information to said mobile computing system; using said network identifier information to communicate between the mobile computing systems and the network computing system via any of said plural further network segments; and conditioning access to communications over at least some of said plural further network segments with said network computing system and protecting at least some of said plural further network segments from unauthorized communications based at least in part on said network identifier information. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for facilitating communication over disjoint networks between first and second network devices at least one of which is mobile, the system comprising:
-
a first network; a first network device coupled to the first network; a second network device also coupled to the first network, said second network device using at least a first network identifier identifying the first network device on the first network to communicate with the first network device over the first network; a data transmitter coupled to the first network, said data transmitter sending, to the second network device over the first network, a further network identifier at least in part identifying the first network device on at least a second network disjoint from the first network, said further network identifier being at least in part different from said first network identifier; an authenticator that authenticates the second network device for authorization to communicate with the first network device over the second network before sending the further network identifier to the second device; said second network device using the further network identifier at least in part identifying the first network device to communicate with the first network device over the second, disjoint network, thereby allowing communications between the first and second network devices to be maintained and to continue even though a network identifier said second network device uses to reach said first network device has changed. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system for maintaining communications between mobile computing systems and a network device as the mobile computing systems roam between plural disjoint network segments, comprising:
-
a first network segment that establishes communications between mobile computing systems and the network device; a data transmitter that sends the mobile computing systems, via the first network segment, identifying information for use in reaching said network device via plural further network segments at least some of which are disjoint from the first network segment; an authenticator that authenticates at least one of the mobile systems for authorization to communicate with the network device over at least one of said plural further network segments before sending the identifying information to the at least one mobile system; said mobile computing systems using said identifying information to communicate with the network device via at least a disjoint one of said plural further network segments; and a policy manager that conditions access to communications with said network device over said at least some of said plural further network segments and protects at least some of said plural further network segments from unauthorized communications based at least in part on said identifying information. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification