Cooperative network for mobile internet access
First Claim
Patent Images
1. A method of connecting a first system to a target network via a second system wherein the second system can access the target network comprising the steps of:
- for each system, configuring the system to enable the cooperative networking capability of the system;
said configuring step comprising(1) providing host and client tunneling software to the system,(2) setting tunnel preferences of the system for provision of tunnels for use by other systems with cooperative networking enabled and(3) setting access preferences of the system for use of tunnels provided by other systems with cooperative networking capability enabled, such that each system can act as a host system or a client system;
establishing a physical link between the first system and the second system;
said first system acting as a client and said second system acting as a host;
setting up a logical link between the second host system and the first client system on establishment of the physical link,sending information about access preferences of the first client system from the first client system to the second host system through the logical link and comparing tunneling preferences of the second host system with access preferences of the first client system under control of matching software; and
when the tunnel preferences of the second host system match the access preferences of the first client system, establishing cooperative networking by establishing a tunnel from the first client system to the second host system through which encapsulated data packets can be sent, such that data packets from the first system can be sent to and from the target network via the second host system;
wherein the first system only accesses resources of the host system required for the cooperative networking.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for connecting mobile users to the Internet using cooperative interconnection. A node consists of a network element that has two connections methodologies—typically a node will have a radio link and a wired link to the Internet. To obtain a connection, a member of the service located themselves in proximity to a network node which is commonly provided by another member and the cooperative tunneling agent requests a secure link. All members of the service agree to give connection to the Internet upon request from another member.
-
Citations
1 Claim
-
1. A method of connecting a first system to a target network via a second system wherein the second system can access the target network comprising the steps of:
-
for each system, configuring the system to enable the cooperative networking capability of the system;
said configuring step comprising(1) providing host and client tunneling software to the system, (2) setting tunnel preferences of the system for provision of tunnels for use by other systems with cooperative networking enabled and (3) setting access preferences of the system for use of tunnels provided by other systems with cooperative networking capability enabled, such that each system can act as a host system or a client system; establishing a physical link between the first system and the second system;
said first system acting as a client and said second system acting as a host;setting up a logical link between the second host system and the first client system on establishment of the physical link, sending information about access preferences of the first client system from the first client system to the second host system through the logical link and comparing tunneling preferences of the second host system with access preferences of the first client system under control of matching software; and when the tunnel preferences of the second host system match the access preferences of the first client system, establishing cooperative networking by establishing a tunnel from the first client system to the second host system through which encapsulated data packets can be sent, such that data packets from the first system can be sent to and from the target network via the second host system; wherein the first system only accesses resources of the host system required for the cooperative networking.
-
Specification