Managed peer-to-peer applications, systems and methods for distributed data access and storage
First Claim
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing firewall-compliant connectivity, said method comprising the steps of:
- authenticating at least one of said remote computer for connection to said local computer over the public network and said local computer for connection to said remote computer over the public network;
establishing a secure connection between said local computer and said remote computer over the public network by establishing a private-to-public-to-private communications tunnel, wherein a connection server routes communications from said local computer through a first firewall compliant connection and a second firewall compliant connection to said remote computer, and from said remote computer through said second firewall compliant connection to said local computer through said first firewall compliant connection to said local computer;
integrating a desktop of said remote computer on a display of said local computer, wherein said desktop as shown on said remote computer upon said integrating is displayed on said display of said local computer; and
operating said remote computer from said local computer, by manipulating the desktop in a manner the same as a manner used when operating the remote computer locally;
wherein said operating comprises at least one of;
operating a mouse pointer or cursor of said remote computer by operating a mouse of said local computer;
or operating a keyboard of said remote computer by operating a keyboard of said local computer using said keyboard of said local computer or an alternative device that said local computer uses to enter keystrokes on said local computer.
5 Assignments
0 Petitions
Accused Products
Abstract
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and remote operation includes authenticating at least one remote computer for connection to at least one computer over the network and/or at least one local computer for connection to at least one remote computer over the network; establishing a secure connection between the at least one local computer and the at least one remote computer over the network; and integrating a desktop of at least one remote computer on a display of at least one local computer. The connections may be made over a public network, as well as through multiple firewalls without loss of functionality.
-
Citations
11 Claims
-
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing firewall-compliant connectivity, said method comprising the steps of:
-
authenticating at least one of said remote computer for connection to said local computer over the public network and said local computer for connection to said remote computer over the public network; establishing a secure connection between said local computer and said remote computer over the public network by establishing a private-to-public-to-private communications tunnel, wherein a connection server routes communications from said local computer through a first firewall compliant connection and a second firewall compliant connection to said remote computer, and from said remote computer through said second firewall compliant connection to said local computer through said first firewall compliant connection to said local computer; integrating a desktop of said remote computer on a display of said local computer, wherein said desktop as shown on said remote computer upon said integrating is displayed on said display of said local computer; and operating said remote computer from said local computer, by manipulating the desktop in a manner the same as a manner used when operating the remote computer locally; wherein said operating comprises at least one of;
operating a mouse pointer or cursor of said remote computer by operating a mouse of said local computer;
or operating a keyboard of said remote computer by operating a keyboard of said local computer using said keyboard of said local computer or an alternative device that said local computer uses to enter keystrokes on said local computer. - View Dependent Claims (2, 3, 4)
-
-
5. A method of securely and remotely operating a remote computer from a local computer over a network while providing firewall-compliant connectivity, said method comprising the steps of:
-
authenticating at least one of said remote computer for connection to said local computer over the network and said local computer for connection to said remote computer over the network; establishing a secure connection between said local computer and said remote computer over the network by establishing a private-to-public-to-private communications tunnel, wherein a connection server routes communications from said local computer through a first firewall compliant connection and a second firewall compliant connection to said remote computer, and from said remote computer through said second firewall compliant connection to said local computer through said first firewall compliant connection to said local computer; integrating a desktop of said remote computer on a display of said local computer, wherein said desktop as shown on said remote computer upon said integrating is displayed on said display of said local computer; and operating said remote computer from said local computer, by manipulating the desktop in a manner the same as a manner used when operating the remote computer locally; wherein said operating comprises at least one of;
operating a mouse pointer or cursor of said remote computer by operating a mouse of said local computer;
or operating a keyboard of said remote computer by operating a keyboard of said local computer using said keyboard of said local computer or an alternative device that said local computer uses to enter keystrokes on said local computer. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method of accessing and using at least one remote computer from a local computer over a public network, said method comprising the steps of:
-
centrally authenticating, at a location having a public address, a first computer having a first, firewall protected private address; creating a first firewall compliant connection between a publicly addressed connection server and said first computer upon authentication of said first computer; establishing a second firewall compliant connection between said publicly addressed connection server and a second computer having a second firewall protected private address; establishing a private-to-public-to-private communications tunnel, wherein said connection server routes communications from said first computer through said first firewall compliant connection and said second firewall compliant connection to said second computer, and from said second computer through said second firewall compliant connection and said first firewall compliant connection to said first computer; and performing at least one further step selected from the group consisting of;
integrating a file structure of accessible files accessed at said second or first computer, into a file structure contained at said first or second computer, respectively;
at least one of integrating a desktop of said second computer on a display of said first computer, wherein said desktop as shown on said second computer upon said integrating is displayed on said display of said first computer; and
integrating a desktop of said first computer on a display of said second computer, wherein said desktop as shown on said first computer upon said integrating is displayed on said display of said second computer; andoperating said second computer from said first computer or said first computer from said second computer, wherein the computer that is operated is selected from the group consisting of;
home appliances, video equipment, audio equipment, printers, fax machines, office equipment, medical devices, vehicles, cameras, RFID equipment, laboratory equipment, manufacturing machinery, GPS equipment, and devices having one or more embedded microprocessors. - View Dependent Claims (11)
-
Specification