최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
SAI
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0188274 (2005-07-22) |
등록번호 | US-8914522 (2014-12-16) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 5 인용 특허 : 479 |
The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present provides a method for establishing a direct connection between peer computing de
The present invention is generally directed towards a remote access architecture for providing peer-to-peer communications and remote access connectivity. In one embodiment, the remote access architecture of the present provides a method for establishing a direct connection between peer computing devices via a third computing device, such as a gateway. Additionally, the present invention provides the following techniques to optimize peer-to-peer communications: 1) false acknowledgement of receipt of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 2) payload shifting of network packets allowing communications via a lossless protocol of packets constructed for transmission via a lossy protocol, 3) reduction of packet fragmentation by adjusting the maximum transmission unit (MTU) parameter, accounting for overhead due to encryption, 4) application-aware prioritization of client-side network communications, and 5) network disruption shielding for reliable and persistent network connectivity and access.
1. A method for establishing a peer to peer communication session between a first computing device on a first network and a second computing device on a second network, the method comprising the steps of: (a) establishing, by the first computing device, a first tunneling session with a third computi
1. A method for establishing a peer to peer communication session between a first computing device on a first network and a second computing device on a second network, the method comprising the steps of: (a) establishing, by the first computing device, a first tunneling session with a third computing device, and establishing, by the second computing device, a second tunneling session with the third computing device;(b) initiating, by the first computing device, a communication session to the second computing device via the third computing device;(c) receiving, by a server via the third computing device, a signal to establish the communication session;(d) communicating, by the server, via the third computing device to the first computing device, a first network address comprising a network address of the second computing device on a private network associated with the second tunneling session;(e) communicating, by the first computing device, a request to initiate a connection with the second computing device using the first network address;(f) intercepting, by the third computing device, the request, determining,based on the network address of the second computing device on the private network, that communication quality is to be improved with a direct connection between the first and second computing device bypassing the third computing device, and providing the first computing device a second network address for the second computing device response to the determination, the second network address comprising a public network address associated with the second computing device; and(g) communicating, by the third computing device, a request to the second computing device to allow a connection from the first computing device using the second network address. 2. The method of claim 1, wherein at least a portion of one of the first tunneling session or the second tunneling session comprises one of a Secure Socket Layer or a virtual private network. 3. The method of claim 1, wherein the third computing device comprises a remote access gateway. 4. The method of claim 1, wherein the second computing device is located behind a firewall associated with the second network address. 5. The method of claim 1, comprising providing, by the third computing device, the second network address to the first computing device by communicating an out of band signal to the first computing device via the first tunneling session. 6. The method of claim 1, comprising providing, by the second computing device, a forward hole in a firewall for the first computing device to communicate to the second computing device using the second network address. 7. The method of claim 1, comprising communicating, by the third computing device, a key to the first computing device and the second computing device. 8. The method of claim 7, comprising communicating, by the first computing device, the key to the second computing device. 9. The method of claim 8, comprising checking, by the first computing device, that the key received from the second computing device matches the key of the first computing device before transmitting data to the second computing device. 10. The method of claim 7, comprising communicating, by the second computing device, the key to the first computing device. 11. The method of claim 10, comprising checking, by the second computing device, that the key received from the first computing device matches the key of the second computing device before transmitting data to the second computing device. 12. The method of claim 1, associating a first telecommunication device with the first computing device, and associating a second telecommunication device with the second computing device. 13. The method of claim 12, wherein one of the first telecommunication device or the second telecommunication device comprises one of a software component or a hardware component. 14. The method of claim 12, comprising establishing a telecommunication session between the first telecommunication device and the second telecommunication device via the connection. 15. The method of claim 14, comprising communicating between the first telecommunication device and the second telecommunication device over the telecommunication session without traversing the to the first computing device. 16. The method of claim 1, comprising communicating a remote display protocol via the connection between the first computing device and the second computing device. 17. The method of claim 16, wherein the remote display protocol comprises one of an Independent Computing Architecture protocol or a Remote Desktop Protocol. 18. The method of claim 1, comprising sharing a screen view of the first computing device with the second computing device via the connection. 19. In a gateway, a method for establishing a peer to peer communication session between a first computing device on a first network and a second computing device on a second network, the method comprising the steps of: (a) establishing a first tunneling session with the first computing device on a first network;(b) establishing a second tunneling session with the second computing device on the second network;(c) receiving a request by the first computing device to initiate a communication session with the second computing device;(d) providing to the first computing device a first network address for contacting the second computing device, the first network address comprising a network address of the second computing device on a private network associated with the second tunneling session;(e) receiving a request by the first computing device to initiate a connection with the second computing device using the first network address;(f) intercepting the request to initiate the connection, determining, based on the network address of the second computing device on the private network, that communication quality is to be improved with a direct connection between the first and second computing devices bypassing the gateway, and providing the first computing device a second network address for the second computing device in response to the determination, the second network address comprising a public network address associated with the second computing device; and(g) communicating to the second computing device a request to allow the connection from the first computing device to the second computing device using the second network address. 20. The method of claim 19, wherein at least a portion of one of the first tunneling session or the second tunneling session comprises one of a Secure Socket Layer or a virtual private network. 21. The method of claim 19, wherein the second computing device is located behind a firewall associated with the second network address. 22. The method of claim 19, comprising providing the second network address to the first computing device by communicating an out of band signal to the first computing device via the first tunneling session. 23. The method of claim 19, comprising communicating a key to the first computing device. 24. The method of claim 19, comprising communicating a key to the second computing device. 25. A system for establishing a peer to peer communication session between a first computing device on a first network and a second computing device on a second network via a third computing device, the system comprising: a first computing device on the first network;a second computing device on the second network;a third computing device configured to establish a first tunneling session with the first computing device and a second tunneling session with the second computing device;a server computing device accessible via the third computing device; wherein: the server computing device is configured to communicate via the third computing device to the first computing device a first network address comprising a network address of the second computing device on a private network associated with the second tunneling session;the first computing device is configured to communicate via the third computing device a first request to initiate a connection with the second computing device using the first network address;the third computing device is configured to intercept the first request, determine, based on the network address of the second computing device on the private network, that communication quality is to be improved with a direct connection between the first and second computing devices bypassing the third computing device, and provide the first computing device a second network address for the second computing device in response to the determination, the second network address comprising a public network address associated with the second computing device; and the third computing device is configured to communicate a second request to the second computing device to allow the direct connection from the first computing device using the second network address. 26. The system of claim 25, wherein at least a portion of one of the first tunneling session or the second tunneling session comprises one of a Secure Socket Layer or a virtual private network. 27. The system of claim 25, wherein the third computing device comprises a remote access gateway. 28. The system of claim 25, wherein the second computing device is located behind a firewall associated with the second network address. 29. The system of claim 25, wherein the third computing device is configured to provides the second network address to the first computing device by communicating an out of band signal via the first tunneling session. 30. The system of claim 25, wherein the second computing device is configured to provides a forward hole in a firewall for the first computing device to communicate to the second computing device using the second network address. 31. The system of claim 25, wherein the third computing device is configured to communicate a key to the first computing device and the second computing device. 32. The system of claim 31, wherein the first computing device is configured to communicate the key to the second computing device. 33. The system of claim 32, wherein the first computing device is configured to checks that the key received from the second computing device matches the key of the first computing device before transmitting data to the second computing device. 34. The system of claim 31, wherein the second computing device is configured to communicatethe key to the first computing device. 35. The system of claim 34, wherein the second computing device is configured to checks that the key received from the first computing devices matches the key of the second computing device before transmitting data to the second computing device. 36. The system of claim 25, comprising a first telecommunication device associated with the first computing device, and a second telecommunication associated with the second computing device. 37. The system of claim 36, wherein one of the first telecommunication device or the second telecommunication device comprises one of a software component or a hardware component. 38. The system of claim 37, wherein the first telecommunication device is configured to establishes a telecommunication session with the second telecommunication device via the connection. 39. The system of claim 38, wherein the first telecommunication device is configured to communicates with the second telecommunication device over the telecommunication session without traversing the third computing device. 40. The system of claim 25, wherein the first computing device and the second computing device is configured to communicate a remote display protocol via the connection. 41. The system of claim 40, wherein the remote display protocol comprises one of an Independent Computing Architecture protocol or a Remote Desktop Protocol. 42. The system of claim 25, wherein the first computing device is configured to shares a screen view with the second computing device via the connection. 43. A system for establishing a peer to peer communication session between a first computing device on a first network and a second computing device on a second network, the system comprising: a gateway computing device configured for establishing a first tunneling session with the first computing device on a first network, and for establishing a second tunneling session with the second computing device on the second network, and configured for receiving a request by the first computing device to initiate a communication session with the second computing device; anda server computing device configured for providing to the first computing device a first network address for contacting the second computing device, the first network address comprising a network address of the second computing device on a private network associated with the second tunneling session;wherein the gateway computing device is configured for receiving a request by the first computing device to initiate a connection with the second computing device using the first network address, intercepting the request to initiate the connection, determining, based on the network address of the second computing device on the private network, that communication quality is to be improved with a direct connection between the first and second computing devices bypassing the gateway computing device, providing the first computing device a second network address for the second computing device in response to the determination, the second network address comprising a public network address associated with the second computing device, and communicating to the second computing device a request to allow the direct connection from the first computing device to the second computing device using the second network address. 44. The system of claim 43, wherein at least a portion of one of the first tunneling session or the second tunneling session comprises one of a Secure Socket Layer or a virtual private network. 45. The system of claim 43, wherein the second computing device is located behind a firewall associated with the second network address. 46. The system of claim 43, wherein the gateway computing device is configured for providing the second network address to the first computing device by communicating an out of band signal to the first computing device via the first tunneling session. 47. The system of claim 43, wherein the gateway computing device is configured for communicating a key to the first computing device. 48. The system of claim 43, wherein the gateway computing device is configured for communicating a key to the second computing device.
해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
IPC | Description |
---|---|
A | 생활필수품 |
A62 | 인명구조; 소방(사다리 E06C) |
A62B | 인명구조용의 기구, 장치 또는 방법(특히 의료용에 사용되는 밸브 A61M 39/00; 특히 물에서 쓰이는 인명구조 장치 또는 방법 B63C 9/00; 잠수장비 B63C 11/00; 특히 항공기에 쓰는 것, 예. 낙하산, 투출좌석 B64D; 특히 광산에서 쓰이는 구조장치 E21F 11/00) |
A62B-1/08 | .. 윈치 또는 풀리에 제동기구가 있는 것 |
내보내기 구분 |
|
---|---|
구성항목 |
관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표IPC 관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 공고번호, 공고일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표출원인, 출원인국적, 출원인주소, 발명자, 발명자E, 발명자코드, 발명자주소, 발명자 우편번호, 발명자국적, 대표IPC, IPC코드, 요약, 미국특허분류, 대리인주소, 대리인코드, 대리인(한글), 대리인(영문), 국제공개일자, 국제공개번호, 국제출원일자, 국제출원번호, 우선권, 우선권주장일, 우선권국가, 우선권출원번호, 원출원일자, 원출원번호, 지정국, Citing Patents, Cited Patents |
저장형식 |
|
메일정보 |
|
안내 |
총 건의 자료가 검색되었습니다. 다운받으실 자료의 인덱스를 입력하세요. (1-10,000) 검색결과의 순서대로 최대 10,000건 까지 다운로드가 가능합니다. 데이타가 많을 경우 속도가 느려질 수 있습니다.(최대 2~3분 소요) 다운로드 파일은 UTF-8 형태로 저장됩니다. ~ |
Copyright KISTI. All Rights Reserved.
AI-Helper는 오픈소스 모델을 사용합니다. 사용하고 있는 오픈소스 모델과 라이센스는 아래에서 확인할 수 있습니다.
AI-Helper uses Open Source Models. You can find the source code of these open source models, along with applicable license information below. (helpdesk@kisti.re.kr)
OpenAI의 API Key를 브라우저에 등록하여야 ChatGPT 모델을 사용할 수 있습니다.
등록키는 삭제 버튼을 누르거나, PDF 창을 닫으면 삭제됩니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.