Access and control system for network-enabled devices
First Claim
1. A first computer having a first private address in a first firewall-protected location, the first computer comprising:
- a processor operable to execute code; and
a memory having computer-readable code stored thereon that is executable by the processor in order to cause the processor to;
send a connection request to a public address of a connection server on a public network;
initiate a first secure connection between the first computer and the connection server;
send instructions to the connection server indicative of a second computer having a second private address in a second firewall-protected location, said instructions causing the connection server to establish a second secure connection with the second computer;
send secure communications from the first computer to the second computer via the first secure connection and the second secure connection without using the second private address;
receive secure communications from the second computer at the first computer via the same second and first secure connections; and
adaptively poll a first sending buffer configured to store data for communication to the second computer.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple devices, that allow collaborative operations by multiple users of remote devices, that allow point to multipoint control of multiple devices and which allow rapid, secure transmission of data between remote users and devices. In general terms, the system includes at least one connection server, and at least two computers operatively coupled to the connection server via a public or global network. In an example where at least one client computer is operatively connected to at least one network-enabled device through a connection server via the public or global network, the connection server is configured to route control instructions from the client to the network-enabled device, and route data from the network-enabled device to the client.
-
Citations
11 Claims
-
1. A first computer having a first private address in a first firewall-protected location, the first computer comprising:
-
a processor operable to execute code; and a memory having computer-readable code stored thereon that is executable by the processor in order to cause the processor to; send a connection request to a public address of a connection server on a public network; initiate a first secure connection between the first computer and the connection server; send instructions to the connection server indicative of a second computer having a second private address in a second firewall-protected location, said instructions causing the connection server to establish a second secure connection with the second computer; send secure communications from the first computer to the second computer via the first secure connection and the second secure connection without using the second private address; receive secure communications from the second computer at the first computer via the same second and first secure connections; and adaptively poll a first sending buffer configured to store data for communication to the second computer. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A first computer having a first private address in a first firewall-protected location, the first computer comprising:
-
a processor operable to execute code; and a memory having computer-readable code stored thereon that is executable by the processor in order to cause the processor to; send a connection request to a public address of a connection server on a public network, causing the connection server to authorize the first computer and establish a secure connection with the first computer; send instructions to the connection server indicative of a second computer having a second private address in a second firewall-protected location, said instructions causing the connection server to establish a second secure connection with the second computer; send secure communications from the first computer to the second computer via the first secure connection and the second secure connection without using the second private address; receive secure communications from the second computer at the first computer via the same second and first secure connections; and adaptively poll a first sending buffer configured to store data for communication to the second computer. - View Dependent Claims (7, 8, 9, 10, 11)
-
Specification