Access and control system for network-enabled devices
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/173
G06F-015/16
출원번호
UP-0145294
(2005-06-02)
등록번호
US-7600036
(2009-10-20)
발명자
/ 주소
Hesselink, Lambertus
Rizal, Dharmarus
Bjornson, Eric S.
출원인 / 주소
Western Digital Technologies, Inc.
인용정보
피인용 횟수 :
70인용 특허 :
81
초록▼
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple devices, that allow collaborative operations by multiple users of remote devices, that allow point to multipoint control of multiple devices and
Systems and methods for remote access of network-enabled devices that provide seamless, firewall-compliant connectivity between multiple users and multiple devices, that allow collaborative operations by multiple users of remote devices, that allow point to multipoint control of multiple devices and which allow rapid, secure transmission of data between remote users and devices. In general terms, the system includes at least one connection server, and at least two computers operatively coupled to the connection server via a public or global network. In an example where at least one client computer is operatively connected to at least one network-enabled device through a connection sever via the public or global network, the connection server is configured to route control instructions from the client to the network-enabled device, and route data from the network-enabled device to the client.
대표청구항▼
That which is claimed is: 1. A method of load balancing communications among a plurality of connection servers networked in a publicly addressable distributed control infrastructure which multiple computers within multiple private networks may access for establishing communications over a public ne
That which is claimed is: 1. A method of load balancing communications among a plurality of connection servers networked in a publicly addressable distributed control infrastructure which multiple computers within multiple private networks may access for establishing communications over a public network, said method comprising: determining a user type of each computer to be connected by communications through said publicly addressable distributed control infrastructure in a particular session; determining a session type of the particular session to be established; comparing user type and session type determinations with server type information stored in at least one database connected to said distributed control infrastructure; selecting a connection server characterized by server type information that indicates the connection server is capable of handling the determined user types and session type; determining if the selected server is active; determining whether or not the selected server, if active, has adequate Power to handle the connections that will be required to establish the communications for the session; and if the selected server is active and has adequate Power, determining whether the selected server has the best available Power level for carrying out the session, based upon a calculated average Power expected for the session and Utilization Ratios of each capable, active connection server which has adequate Power. 2. The method of claim 1, further comprising assigning the selected server determined to active and to have the best available Power level to establish connections between the computers to be included in the session. 3. A method of persistent, secure transfer of data between at least two computers over a public network, wherein the computers have separate privately addressed, firewall protected locations, said method comprising: accessing a connection server operably connected to the public network by addressing a request from a first computer to a public address of the connection server; establishing a secure connection between the first computer and the connection server, the connection server establishing a secure connection between the connection server and at least a second computer according to instructions received from the first computer, the first computer including a first data control process, the at least a second computer including a second data control process and the connection server including a third data control process; setting a polling frequency corresponding to a polling time period; setting a maximum waiting time period between communications with the connection server, the maximum waiting time period longer than the polling time period; during the maximum waiting time period, polling a first sending buffer in the first computer at the polling frequency to determine whether any data to be communicated is contained in the first sending buffer; if data is found during the polling, sending the data from the first sending buffer in the first computer to the connection server; and if no data is found during the polling, sending a communication from the first computer to the connection server without data from the first sending buffer upon expiration of the maximum waiting time period; wherein secure, full-duplex, persistent communications are established through the connection server without the computers providing a private address of the computers between which the communications take place. 4. The method of claim 3, wherein the first data control process sends a request to the connection server along with the data or along with the communication without data. 5. The method of claim 4, wherein the third data control process adaptively polls the first computer to determine whether the request has been sent; and upon receiving the request, the third data process reads the request and buffers any data that is included with the request, in a connection server sending buffer associated with the third data control process; the third data control process additionally adaptively polls the connection server sending buffer to determine whether any data to be sent to the first computer is contained in the connection server sending buffer; and when data to be sent to the first computer is present, the third data control process sends the data along with a response to the request. 6. The method of claim 5, wherein the first data control process reads the response, buffers any data that is contained with the response, and notifies the first computer that data has been received. 7. The method of claim 6, wherein the process steps are iteratively repeated to maintain persistent communications. 8. The method of claim 5, wherein the third data control process adaptively polls the connection server sending buffer to determine whether any data to be sent to the at least a second computer is contained in the connection server sending buffer; and when data to be sent to the at least a second computer is present, the third data control process sends the data along with a response to the at least a second computer. 9. The method of claim 5, wherein the third data control process adaptively polls the at least a second computer to determine whether a request has been sent; and upon receiving the request from the at least a second computer, the third data process reads the request and buffers any data that is included with the request, in the connection server sending buffer; the third data control process additionally adaptively polls the connection server sending buffer to determine whether any data to be sent to the at least a second computer is contained in the connection server sending buffer; and when data to be sent to the at least a second computer is present, the third data control process sends the data along with a response to the request. 10. The method of claim 9, wherein the second data control process reads the response, buffers any data that is contained with the response, and notifies the at least a second computer that data has been received. 11. The method of claim 9, wherein the process steps are iteratively repeated to maintain persistent communications. 12. A method of persistent, secure transfer of data between at least two computers over a public network, wherein the computers have separate privately addressed, firewall protected locations, said method comprising: accessing a connection server operably connected to the public network by addressing a request from a first computer to a public address of the connection server; and establishing a secure connection between the first computer and the connection server, the connection server establishing a secure connection between the connection server and at least a second computer according to instructions received from the first computer, the first computer including a first data control process, the at least a second computer including a second data control process and the connection server including a third data control process; wherein secure, full-duplex, persistent communications are established through the connection server without the computers providing a private address of the computers between which the communications take place, and the first data control process adaptively polls a first sending buffer to determine whether any data to be communicated is contained in the first sending buffer; wherein the first data control process sends the data, and a request to the connection server when the data is contained in the first sending buffer; and wherein the third data control process adaptively polls the first computer to determine whether a request has been sent; upon receiving the request, the third data process reads the request and buffers any data that is included with the request, in a connection server sending buffer associated with the third data control process; the third data control process additionally adaptively polls the connection server sending buffer to determine whether any data to be sent to the first computer is contained in the connection server sending buffer; and when data to be sent to the first computer is present, the third data control process sends the data along with a response to the request. 13. The method of claim 12, wherein the first data control process reads the response, buffers any data that is contained with the response, and notifies the first computer that data has been received. 14. The method of claim 13, wherein the process steps are iteratively repeated to maintain persistent communications. 15. The method of claim 12, wherein the third data control process adaptively polls the connection server sending buffer to determine whether any data to be sent to the at least a second computer is contained in the connection server sending buffer; and when data to be sent to the at least a second computer is present, the third data control process sends the data along with a response to the at least a second computer. 16. The method of claim 12, wherein the third data control process adaptively polls the at least a second computer to determine whether a request has been sent; and upon receiving the request from the at least a second computer, the third data process reads the request and buffers any data that is included with the request, in the connection server sending buffer; the third data control process additionally adaptively polls the connection server sending buffer to determine whether any data to be sent to the at least a second computer is contained in the connection server sending buffer; and when data to be sent to the at least a second computer is present, the third data control process sends the data along with a response to the request. 17. The method of claim 16, wherein the second data control process reads the response, buffers any data that is contained with the response, and notifies the at least a second computer that data has been received. 18. The method of claim 16, wherein the process steps are iteratively repeated to maintain persistent communications.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (81)
Hesselink,Lambertus; Rizal,Dharmarus; Bjornson,Eric S., Access and control system for network-enabled devices.
Rahman,Mahfuzur; Bhattacharya,Prabir, Architecture for secure remote access and transmission using a generalized password scheme with biometric features.
Hesselink,Lambertus; Rizal,Dharmarus; Bjornson,Eric S., Control and observation of physical devices, equipment and processes by multiple users over computer networks.
Lambertus Hesselink ; Dharmarus Rizal ; Eric S. Bjornson, Control and observation of physical devices, equipment and processes by multiple users over computer networks.
Harper Gregory W. (New York NY) Freeman Michael J. (New York NY), Distance learning system providing individual television participation, audio responses and memory for every student.
Venkatraman Chandrasekar ; Morgan Jeffrey A., Embedding web access mechanism in an appliance for user interface functions including a web server and web browser.
Lea Rodger J., Home audio/video network for generating default control parameters for devices coupled to the network, and replacing updated control parameters therewith.
James A. Parker ; Gary J. Legner ; George Lima ; David P. Schwartz ; James R. Gunkel, Intelligent data inventory & asset management systems method and apparatus.
Sonnenreich Wes ; Macinta Tim ; Albanesc Jason ; Rines Robert H., Internet based distance learning system for communicating between server and clients wherein clients communicate with ea.
Bacus James V. ; Bacus James W., Method and apparatus for acquiring and reconstructing magnified specimen images from a computer-controlled microscope.
Crichton Joseph M. ; Garvin Peter F. ; Staten Jeffrey W. ; Wright Waiki L., Method and apparatus for lightweight secure communication tunneling over the internet.
Wall Gerard A. ; Ruberg Alan T. ; Hanko James G. ; Northcutt J. Duane ; Butcher Lawrence L., Method and apparatus for session management and user authentication.
Motoyama, Tetsuro; Niro, Masaichi, Method and system for remote diagnostic, control and information collection based on various communication modes for sending messages to users.
Mourad Magda Mahmoud ; Tantawy Ahmed Nasr-El-Din, Method for real-time delivery of multimedia information requiring a very high bandwidth path over the internet.
Herse,Conrad M.; Rekiere,Joseph P.; Voss,Henry L., Method of controlling access for software development via a virtual common desktop with plural viewers.
Bittinger Reed Richard ; Fraenkel Michael Levi ; Housel ; III Barron Cornelius ; Lindquist David Bruce, Methods, systems and computer program products for the synchronization of time coherent caching system.
Humpleman Richard James ; Harms G. Kevin ; Deacon Michael S. ; Chandiramani Omi, Programming tool for home networks with an HTML page for a plurality of home devices.
Nobuya Sano JP; Makoto Iida JP, Recording and reproducing apparatus for recording digital broadcast compression-coded data of video signals of a multiplicity of channels.
Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
Edlund Stefan B. ; Eichstaedt Matthias ; Eigler Donald Mark ; Kraft Reiner, System and method for operating scientific instruments over wide area networks.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Stephens Philip J. ; Dufort Christopher J. ; Bredenberg Clifford C. ; More Ashish ; Mitchell William P., System for analyzing and/or effecting experimental data from a remote location.
Morris Robert J. T. (Los Gatos CA), System for reducing storage requirements and transmission loads in a backup subsystem in client-server environment by tr.
Henriquez,Alberto, System for transmitting and displaying icon resources group associated with remote application to a local computing system to facilitate virtualization of the remote application.
Levine Michael R. (2122 NW. 60th Cir. Boca Raton FL 33496), System for unattended recording of video programs by remote control code transmitter module which receives user selectio.
Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
Midwinter, Timothy; Daniels, Ian Geoffrey, Telecommunications data conferencing platform having secure firewall wherein access is restricted to messages originating from server but conference data pass freely.
McCabe, Timothy J.; Maroney, John E., Data storage device and method for integrated bridge firmware to be retrieved from a storage system on chip (SOC).
Blankenbeckler, David L.; Ybarra, Danny O.; Hesselink, Lambertus, Digital rights management system and methods for provisioning content to an intelligent storage.
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
Caso, Erik; Abraham, Michael, Method for a cloud-based meta-file system to virtually unify remote and local files across a range of devices' local file systems.
Caso, Erik; Abraham, Michael, Method for a cloud-based meta-file system to virtually unify remote and local files across a range of devices' local file systems.
Chen, Paul; Chas, Derek, Methods and systems for configuring and updating session-based quality of service for multimedia traffic in a local area network.
Nguyen, Mark; Neumann, Charles A., Solving unstable universal asynchronous receive transmit (UART) communication between a power manager and a universal serial bus (USB)-bridge device.
Rensin, David Kallet; Hirata, Tasuki; Kramer, David Joshua; Geoghegan, Brian Joseph; Winters, Kevin John, System and method for remote data acquisition and distribution.
Rensin, David Kallet; Hirata, Tasuki; Kramer, David Joshua; Geoghegan, Brian Joseph; Winters, Kevin John, System and method for remote data acquisition and distribution.
Rensin, David Kallet; Hirata, Tasuki; Kramer, David Joshua; Geoghegan, Brian Joseph; Winters, Kevin John, System and method for remote data acquisition and distribution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.