Ad-hoc peer-to-peer communications to access various services via a cellular network
First Claim
1. A method for accessing a network, the method comprising:
- receiving, by one or more computer processors, information related to a plurality of mobile devices, wherein information related the plurality of mobile devices includes information respectively associated with a mobile device that;
(i) indicates whether the respective mobile device has access to a wireless network;
(ii) identifies one or more protocols and related hardware of the respective mobile device to establish a secure, wireless peer-to-peer communication link to access the wireless network;
(iii) identifies an amount of bandwidth, associated with the respective mobile device, available for transmitting the one or more communications from a first device to the wireless network; and
(iv) identifies a location corresponding to the respective mobile device;
identifying, by the one or more computer processors, a request from a first device to utilize wireless communication capabilities of a second device to communicate with the wireless network;
in response to identifying the request from the first device to communicate with the wireless network, identifying, by the one or more computer processors, the second device from the plurality of mobile devices based on;
(i) information identifying the one or more peer-to-peer communication protocols respectively associated with the first device and another mobile device;
(ii) a location corresponding to the other mobile device; and
(iii) information indicating a fee respectively associated with utilizing the wireless communication capabilities of the other mobile device;
generating, by the one or more computer processors, a secure, wireless peer-to-peer communication link between the first device and the second device, wherein generating the secure wireless peer-to-peer communication link further comprising;
allocating, by the one or more computer processors, a portion of storage included in the second device to isolate communications associated with the first device; and
dictating, by the one or more computer processors, storage of one or more secure communications associated with the first device within the allocated portion of storage utilized to isolate communications associated with the first device;
receiving, by the one or more computer processors, to the second device, via the generated secure wireless peer-to-peer communication link, one or more communications from the first device;
establishing, by the one or more computer processors, a wireless communication link between the second device and the wireless network, wherein the wireless communication link between the second device and the wireless network includes a cellular communication link between the second device and a service provider associated with the second device; and
transmitting, by the one or more computer processors, one or more communications within the dictated storage within the second device, to the wireless network, via the wireless communication capabilities of the second device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.
8 Citations
1 Claim
-
1. A method for accessing a network, the method comprising:
-
receiving, by one or more computer processors, information related to a plurality of mobile devices, wherein information related the plurality of mobile devices includes information respectively associated with a mobile device that; (i) indicates whether the respective mobile device has access to a wireless network; (ii) identifies one or more protocols and related hardware of the respective mobile device to establish a secure, wireless peer-to-peer communication link to access the wireless network; (iii) identifies an amount of bandwidth, associated with the respective mobile device, available for transmitting the one or more communications from a first device to the wireless network; and (iv) identifies a location corresponding to the respective mobile device; identifying, by the one or more computer processors, a request from a first device to utilize wireless communication capabilities of a second device to communicate with the wireless network; in response to identifying the request from the first device to communicate with the wireless network, identifying, by the one or more computer processors, the second device from the plurality of mobile devices based on; (i) information identifying the one or more peer-to-peer communication protocols respectively associated with the first device and another mobile device; (ii) a location corresponding to the other mobile device; and (iii) information indicating a fee respectively associated with utilizing the wireless communication capabilities of the other mobile device; generating, by the one or more computer processors, a secure, wireless peer-to-peer communication link between the first device and the second device, wherein generating the secure wireless peer-to-peer communication link further comprising; allocating, by the one or more computer processors, a portion of storage included in the second device to isolate communications associated with the first device; and dictating, by the one or more computer processors, storage of one or more secure communications associated with the first device within the allocated portion of storage utilized to isolate communications associated with the first device; receiving, by the one or more computer processors, to the second device, via the generated secure wireless peer-to-peer communication link, one or more communications from the first device; establishing, by the one or more computer processors, a wireless communication link between the second device and the wireless network, wherein the wireless communication link between the second device and the wireless network includes a cellular communication link between the second device and a service provider associated with the second device; and transmitting, by the one or more computer processors, one or more communications within the dictated storage within the second device, to the wireless network, via the wireless communication capabilities of the second device.
-
Specification