FACILITATING PEERING BETWEEN DEVICES IN WIRELESS COMMUNICATION NETWORKS
First Claim
1. A method, comprising:
- mapping, by a system comprising a processor, subscription information associated with devices having a defined peering characteristic;
authenticating, by the system, a requesting device of the devices to enable the requesting device to utilize an aspect of a target device of the devices; and
facilitating, by the system, virtual access, at the requesting device, of the aspect of the target device.
1 Assignment
0 Petitions
Accused Products
Abstract
Peering within a mobile network is facilitated. In one example, a method includes: generating, by a requesting device including a processor, a peer group between the requesting device and at least one target device over a wireless communication network. The method also includes obtaining virtual access, by the requesting device, to an aspect of the target device based on the generating, wherein the generating is based on successful authentication of the requesting device and the target device. The method also includes displaying, by the requesting device, information indicative of the aspect of the service to which the target device is subscribed. In some cases, the aspect of the target device includes a service to which the target device is subscribed. The service can share data retrieved at a location of the target device with the requesting device.
32 Citations
20 Claims
-
1. A method, comprising:
-
mapping, by a system comprising a processor, subscription information associated with devices having a defined peering characteristic; authenticating, by the system, a requesting device of the devices to enable the requesting device to utilize an aspect of a target device of the devices; and facilitating, by the system, virtual access, at the requesting device, of the aspect of the target device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
generating, by a requesting device comprising a processor, a peer group between the requesting device and a first target device via a network device of a wireless communication network; and obtaining, by the requesting device, virtual access to an aspect of the first target device based on the generating, wherein the generating is based on successful authentication of the requesting device and the first target device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage device storing executable instructions that, in response to execution, cause a requesting device comprising a processor to perform operations, comprising:
-
generating a peer-to-peer communication path between the requesting device and a target device; and obtaining virtual access to an aspect of the target device based on the generating, wherein the generating is based on successful authentication of the requesting device and the target device. - View Dependent Claims (20)
-
Specification