Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
First Claim
1. In a data communications environment including:
- a plurality of data networks or subnetworks capable of communicating Internet Protocol packet-based data;
at least one resource consumer that consumes at least one resource;
at least one mobile computing device coupled to at least one of said plurality of networks or subnetworks; and
at least another computing device that is coupled to at least one of said plurality of networks or subnetworks,wherein said at least one mobile computing device communicates with said at least another computing device at least in part via at least one of said plurality of networks or subnetworks,a distributed policy-management arrangement comprising;
a policy management module present at least on said at least one mobile computing device, said policy management module dynamically conditioning or dynamically modifying at least one of consumption of and access to said at least one resource by said at least one resource consumer;
wherein said distributed policy management arrangement provides at least one of (a) a rule, and (b) a control, that dynamically conditions or dynamically modifies at least one of said consumption of and said access to said resource by the resource consumer based at least in part on at least one of (a) a change in the state of the resource consumer, (b) the identity of the resource consumer, (c) said mobile computing device'"'"'s communication capability via at least one of said plurality of networks or subnetworks, (d) a time event associated with said policy management arrangement, and (e) a mobility event associated with said mobile computing device,wherein said policy management arrangement dynamically conditions or dynamically modifies said consumption of or access to the said at least one resource even if said communication(s) are encrypted.
18 Assignments
0 Petitions
Accused Products
Abstract
A seamless solution transparently addresses the characteristics of nomadic systems, and enables existing network applications to run reliably in mobile environments. A Mobility Management Server coupled to the mobile network maintains the state of each of any number of Mobile End Systems and handles the complex session management required to maintain persistent connections to the network and to other peer processes. If a Mobile End System becomes unreachable, suspends, or changes network address (e.g., due to roaming from one network interconnect to another), the Mobility Management Server maintains the connection to the associated peer task—allowing the Mobile End System to maintain a continuous connection even though it may temporarily lose contact with its network medium. An interface-based listener uses network point of attachment information supplied by a network interface to determine roaming conditions and to efficiently reestablish connection upon roaming. The Mobility Management Server can distribute lists to Mobile End Systems specifying how to contact it over disjoint networks.
658 Citations
105 Claims
-
1. In a data communications environment including:
-
a plurality of data networks or subnetworks capable of communicating Internet Protocol packet-based data; at least one resource consumer that consumes at least one resource; at least one mobile computing device coupled to at least one of said plurality of networks or subnetworks; and at least another computing device that is coupled to at least one of said plurality of networks or subnetworks, wherein said at least one mobile computing device communicates with said at least another computing device at least in part via at least one of said plurality of networks or subnetworks, a distributed policy-management arrangement comprising; a policy management module present at least on said at least one mobile computing device, said policy management module dynamically conditioning or dynamically modifying at least one of consumption of and access to said at least one resource by said at least one resource consumer; wherein said distributed policy management arrangement provides at least one of (a) a rule, and (b) a control, that dynamically conditions or dynamically modifies at least one of said consumption of and said access to said resource by the resource consumer based at least in part on at least one of (a) a change in the state of the resource consumer, (b) the identity of the resource consumer, (c) said mobile computing device'"'"'s communication capability via at least one of said plurality of networks or subnetworks, (d) a time event associated with said policy management arrangement, and (e) a mobility event associated with said mobile computing device, wherein said policy management arrangement dynamically conditions or dynamically modifies said consumption of or access to the said at least one resource even if said communication(s) are encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. In a network computing environment comprising
a plurality of networks or subnetworks; -
at least one resource consumer that consumes at least one resource at least in part via at least one of said plurality of networks or subnetworks; at least one mobile computing device coupled to at least one of said plurality of networks or subnetworks; and at least another computing device that is coupled to at least one of said plurality of networks or subnetworks, a distributed policy management system including a first module operable on said at least another computing device coupled to said at least one of said networks or subnetworks, said distributed policy management system including a second module operable on said mobile computing device, said first and second modules cooperating to dynamically manage at least one of;
(a) access by said resource consumer to the at least one resource, and (b) consumption by said resource consumer of the at least one resource as said mobile computing device roams between said plurality of networks or subnetworks, even if the mobile computing device becomes unreachable or communication accessing or consuming the at least one resource is encrypted. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. In a data communications environment including:
-
a plurality of networks or subnetworks, at least one resource consumer that consumes at least one resource at least in part via at least one of said plurality of networks or subnetworks, at least one mobile computing device communicating with at least one of said plurality of networks or subnetworks, and at least another computing device that is coupled to at least one of said plurality of networks and subnetworks, a method comprising; executing, on said at least one mobile computing device, said resource consumer comprising at least one software module that at least one of accesses and consumes at least one computing resource via said at least one of said plurality of networks or subnetworks, and managing policy at least in part through cooperation involving said mobile computing device, including dynamically managing, based at least on an identity of at least one computing application, at least one of;
(a) access by said resource consumer to said resource, and (b) consumption by said resource consumer of said resource, at least in part in response to change in the state of said mobile computing device, even if communication with the resource is encrypted. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105)
-
Specification