Managed peer-to-peer applications, systems and methods for distributed data access and storage
First Claim
1. A peer-to-peer method of exchanging data between private computers through a public network while providing seamless, firewall-compliant connectivity, said method comprising:
- establishing a peer-to-peer, full duplex, firewall compliant connection between a local computer and a remote computer over the public network;
selecting a file on a storage device associated with the local computer; and
securely sending at least a portion of the file to the remote computer via the peer-to-peer connection to enable the file to be executed at a location of the remote computer;
wherein said establishing a peer-to-peer, full duplex, firewall compliant connection includes;
said local computer contacting an access and control system via the public network;
determining by the access and control system, whether a user of the local computer is authorized to make said connection;
establishing a firewall compliant connection over the public network between said access and control system and said local computer when it is determined that the user is authorized;
contacting the remote computer by the access and control system over the public network; and
establishing a firewall compliant connection over the public network between said access and control system and said remote computer.
13 Assignments
0 Petitions
Accused Products
Abstract
Applications, systems and methods for efficiently accessing and controlling data of devices among multiple computers over a network. Peer-to-peer exchanges of data between private computers is made possible while providing seamless, firewall-compliant connectivity. Such functionality is available even among private users over a public network, and even when multiple firewalls must be passed through. A firewall compliant connection may be established between a local computer and at least one remote computer; at least one file on a storage device associated with one of the computers is selected, and securely sent to at least one other computer over the secure connections. Computers may be connected over a wide area network with or without a connection server, with or without a VPN.
-
Citations
24 Claims
-
1. A peer-to-peer method of exchanging data between private computers through a public network while providing seamless, firewall-compliant connectivity, said method comprising:
-
establishing a peer-to-peer, full duplex, firewall compliant connection between a local computer and a remote computer over the public network; selecting a file on a storage device associated with the local computer; and securely sending at least a portion of the file to the remote computer via the peer-to-peer connection to enable the file to be executed at a location of the remote computer; wherein said establishing a peer-to-peer, full duplex, firewall compliant connection includes; said local computer contacting an access and control system via the public network; determining by the access and control system, whether a user of the local computer is authorized to make said connection; establishing a firewall compliant connection over the public network between said access and control system and said local computer when it is determined that the user is authorized; contacting the remote computer by the access and control system over the public network; and establishing a firewall compliant connection over the public network between said access and control system and said remote computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A peer-to-peer method of exchanging data between computers over a network while providing seamless, firewall-compliant connectivity, said method comprising:
-
establishing a peer-to-peer, full duplex, firewall compliant connection between a local computer and a remote computer over the network, wherein at least one of the local computer or the remote computer connects with the network through a firewall element; selecting a file on a storage device locally associated with the local computer; and securely sending the file to the remote computer via the peer-to-peer connection to enable the file to be executed at a location of the remote computer; wherein said establishing a peer-to-peer, full duplex, firewall compliant connection includes; said local computer contacting an access and control system via the public network; determining by the access and control system, whether a user of the local computer is authorized to make said connection; establishing a firewall compliant connection over the public network between said access and control system and said local computer when it is determined that the user is authorized; contacting the remote computer by the access and control system over the public network; and establishing a firewall compliant connection over the public network between said access and control system and said remote computer. - View Dependent Claims (18)
-
-
19. A peer-to-peer method of exchanging data between private computers through a public network while providing seamless, firewall-compliant connectivity, said method comprising:
-
establishing a peer-to-peer, full duplex, firewall compliant connection between a local computer and a remote computer over the public network; selecting a file on a storage device associated with the local computer; and securely sending at least a portion of the file to the remote computer via the peer-to-peer connection; wherein said establishing a peer-to-peer, full duplex, firewall compliant connection includes; said local computer contacting an access and control system via the public network; determining by the access and control system, whether a user of the local computer is authorized to make said connection; establishing a firewall compliant connection over the public network between said access and control system and said local computer when it is determined that the user is authorized; contacting the remote computer by the access and control system over the public network; and establishing a firewall compliant connection over the public network between said access and control system and said remote computer. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium embodying one or more sequences of instructions for peer-to-peer exchange of data between private computers through a public network while providing seamless, firewall-compliant connectivity, wherein execution of one or more sequences of instructions by one or more processors causes the one or more processors to perform a process comprising:
-
establishing a peer-to-peer, full duplex, firewall compliant connection between a local computer and a remote computer over the public network; selecting a file on a storage device associated with one the local computer; and securely sending the filed to the remote computer via the peer-to-peer connection to enable the file to be executed at a location of the remote computer; wherein said establishing a peer-to-peer, full duplex, firewall compliant connection includes; said local computer contacting an access and control system via the public network; determining by the access and control system, whether a user of the local computer is authorized to make said connection; establishing a firewall compliant connection over the public network between said access and control system and said local computer when it is determined that the user is authorized; contacting the remote computer by the access and control system over the public network; and establishing a firewall compliant connection over the public network between said access and control system and said remote computer.
-
Specification