METHOD AND APPARATUS FOR EXTENDING REMOTE NETWORK VISIBILITY OF THE PUSH FUNCTIONALITY
First Claim
Patent Images
1. A method comprising:
- transmitting an application, via a push agent, from a first network to a device of a second network, wherein the device is configured to execute the application; and
remotely controlling the device using the application.
15 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for extending remote network visibility for push functionality. An application is transmitted, via a push agent, from a first network to a device of a second network, wherein the device is configured to execute the application. The device is remotely controlled using the application.
38 Citations
22 Claims
-
1. A method comprising:
-
transmitting an application, via a push agent, from a first network to a device of a second network, wherein the device is configured to execute the application; and remotely controlling the device using the application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
a processor configured to initiate transmission of an application, via a push agent, from a first network to a device of a second network, wherein the device is configured to execute the application and to be remotely controlled via the application. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A method comprising:
-
receiving a request from a representative system to connect to a push agent that is configured to log activities of a remote system; granting the request, wherein the representative system is configured to communicate with the push agent to authenticate the representative system and to establish a communication session with the remote system; and receiving the logged activities from the push agent. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An apparatus comprising:
-
a first communication interface configured to receive a request from a representative system to connect to a push agent that is configured to log activities of a remote system; a processor configured to grant the request, wherein the representative system is configured to communicate with the push agent to authenticate the representative system and to establish a communication session with the remote system; and a second communication interface configured to receive the logged activities from the push agent. - View Dependent Claims (19, 20, 21, 22)
-
Specification