Methods and apparatus for use in establishing communications for virtual private networking
First Claim
1. A method in a wireless mobile telephone for registering for communications for use of a communications application stored in the wireless mobile telephone, the method comprising:
- receiving, via a wireless network, a first IP address which is assigned to the wireless mobile telephone;
communicating, from the wireless mobile telephone via the wireless network, a request for establishing a secure tunnel connection with a private network through the wireless network;
if the secure tunnel connection with the private network through the wireless network is established within a predetermined period of time, then receiving from the private network a second IP address of the private network for assignment to the wireless mobile telephone, and communicating to a server a request for registering for the communications using the second IP address of the private network which is assigned to the wireless mobile telephone; and
if the secure tunnel connection with the private network through the wireless network is not established within the predetermined period of time, then communicating to a server a request for registering for the communications using the first IP address that was previously received and assigned to the wireless mobile telephone.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques for registering for communications for a communications application stored in a mobile device are described. The mobile device communicates, via a communication network, a request for a connection with a private network. If the connection is established within a predetermined period of time, then the mobile device receives from the private network a first IP address for assignment to the mobile device, and communicates to a server a request for registering for the communications using the first IP address assigned to the mobile device. If the connection is not established within the predetermined period of time, then the mobile device communicates to a server a request for registering for the communications using a second IP address assigned to the mobile device.
-
Citations
20 Claims
-
1. A method in a wireless mobile telephone for registering for communications for use of a communications application stored in the wireless mobile telephone, the method comprising:
-
receiving, via a wireless network, a first IP address which is assigned to the wireless mobile telephone; communicating, from the wireless mobile telephone via the wireless network, a request for establishing a secure tunnel connection with a private network through the wireless network; if the secure tunnel connection with the private network through the wireless network is established within a predetermined period of time, then receiving from the private network a second IP address of the private network for assignment to the wireless mobile telephone, and communicating to a server a request for registering for the communications using the second IP address of the private network which is assigned to the wireless mobile telephone; and if the secure tunnel connection with the private network through the wireless network is not established within the predetermined period of time, then communicating to a server a request for registering for the communications using the first IP address that was previously received and assigned to the wireless mobile telephone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless mobile telephone, comprising:
-
a wireless transceiver; one or more processors coupled to the wireless transceiver; memory adapted to store a communications application for communications; the one or more processors being configured to register for communications for use of the communications application by; receiving, via a wireless network, a first IP address which is assigned to the wireless mobile telephone; communicating, from the wireless mobile telephone via the wireless network, a request for establishing a secure tunnel connection with a private network through the wireless network; if the secure tunnel connection with the private network through the wireless network is established within a predetermined period of time, then receiving from the private network a second IP address of the private network for assignment to the wireless mobile telephone, and communicating to a server a request for registering for communications using the second IP address of the private network which is assigned to the wireless mobile telephone; and if the secure tunnel connection with the private network through the wireless network is not established within the predetermined period of time, then communicating to a server a request for registering for communications using the first IP address that was previously received and assigned to the wireless mobile telephone. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification