Network based machine-to-machine system for monitoring
First Claim
1. A cloud server comprising multiple servers, the cloud server comprising:
- an authentication server configured to authenticate one or more mobile computing devices, the authentication server comprising;
an authentication memory; and
an authentication processor in communication with the authentication memory, the authentication processor configured to;
receive a request for authentication from a mobile computing device;
determine whether to authenticate the mobile computing device; and
in response to determining to authenticate the mobile computing device;
generate an authentication token, the authentication token having associated therewith a time of expiry of the authentication token;
send a link and the authentication token to the mobile computing device, the link for use by the mobile computing device to connect to a back-end server separate from the authentication server, the authentication token for encrypting information transmitted to the back-end server; and
send the authentication token and the time of expiry to the back-end server,the back-end server configured to communicate with the mobile computing device in order to establish a virtual link between the one or more mobile computing devices and at least one web client, the back-end server comprising;
a back-end memory; and
a back-end processor in communication with the back-end memory, the back-end processor configured to;
receive a mobile computing device communication encrypted with the authentication token;
determine, based on the time of expiry, whether the authentication token is expired in order to determine whether to communicate with the mobile computing device; and
wherein, responsive to determining that the authentication token has expired, the authentication server further communicates with the mobile computing device in order for the authentication server to authenticate the mobile computing device again so that the mobile computing device communicates with the back-end server or with another back-end server;
a front-end server configured to communicate with the at least one web client; and
a virtual link device configured to provide an appearance that the virtual link between the mobile computing device and the at least one web client is maintained when the mobile computing device reverts to the authentication server in order for the authentication server to authenticate the mobile computing device again in order for the mobile computing device to communicate again with the at least one web client.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for remote monitoring of mobile computing devices. The method and systems can use cloud-type services to monitor the mobile computing devices. The cloud-type services can include a server that is configured to maintain a virtual link between one or more web-based computing devices and the mobile computing devices. So that, even if the mobile computing devices are not communicating with the server, the server can perform one or more actions to maintain the link between the web-based device and the mobile computing device. The cloud-type services can also include a server that authenticates the mobile computing devices, and that sends a link to the mobile computing device if the mobile computing device is authenticated, the link for use by the mobile computing device to connect to a back-end server that is separate from the server.
30 Citations
18 Claims
-
1. A cloud server comprising multiple servers, the cloud server comprising:
-
an authentication server configured to authenticate one or more mobile computing devices, the authentication server comprising; an authentication memory; and an authentication processor in communication with the authentication memory, the authentication processor configured to; receive a request for authentication from a mobile computing device; determine whether to authenticate the mobile computing device; and in response to determining to authenticate the mobile computing device; generate an authentication token, the authentication token having associated therewith a time of expiry of the authentication token; send a link and the authentication token to the mobile computing device, the link for use by the mobile computing device to connect to a back-end server separate from the authentication server, the authentication token for encrypting information transmitted to the back-end server; and send the authentication token and the time of expiry to the back-end server, the back-end server configured to communicate with the mobile computing device in order to establish a virtual link between the one or more mobile computing devices and at least one web client, the back-end server comprising; a back-end memory; and a back-end processor in communication with the back-end memory, the back-end processor configured to; receive a mobile computing device communication encrypted with the authentication token; determine, based on the time of expiry, whether the authentication token is expired in order to determine whether to communicate with the mobile computing device; and wherein, responsive to determining that the authentication token has expired, the authentication server further communicates with the mobile computing device in order for the authentication server to authenticate the mobile computing device again so that the mobile computing device communicates with the back-end server or with another back-end server; a front-end server configured to communicate with the at least one web client; and a virtual link device configured to provide an appearance that the virtual link between the mobile computing device and the at least one web client is maintained when the mobile computing device reverts to the authentication server in order for the authentication server to authenticate the mobile computing device again in order for the mobile computing device to communicate again with the at least one web client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for a cloud server to authenticate one or more mobile computing devices and to communicate with the one or more mobile computing devices, the method comprising:
-
receiving, by an authentication server, a request for authentication from a mobile computing device; determining, by the authentication server, whether to authenticate the mobile computing device; and in response to determining to authenticate the mobile computing device; generating, by the authentication server, an authentication token, the authentication token having associated therewith a time of expiry of the authentication token; sending, by the authentication server, a link and the authentication token to the mobile computing device, the link for use by the mobile computing device to connect to a back-end server separate from the authentication server, the authentication token for encrypting information transmitted to the back-end server; and sending, by the authentication server, the authentication token and the time of expiry to the back-end server, receiving, by the back-end server, a mobile computing device communication encrypted with the authentication token, the back-end server configured to establish a virtual link between the mobile computing devices and at least one web client; and determining, by the back-end server based on the time of expiry, whether the authentication token is expired in order to determine whether to communicate with the mobile computing device, wherein, responsive to determining that the authentication token has expired, the authentication server further communicates with the mobile computing device in order for the authentication server to authenticate the mobile computing device again so that the mobile computing device communicates with the back-end server or with another back-end server, communicating, by a front end server, with the at least one web client; and providing, by a virtual link device, an appearance that the virtual link between the mobile computing device and the at least one web client is maintained when the mobile computing device reverts to the authentication server in order for the authentication server to authenticate the mobile computing device again in order for the mobile computing device to communicate again with the at least one web client. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification