Remote access communication architecture apparatus and method

Abstract
Disclosed herein is a system and method for communicating data from a base computer to a remote device via a central server system without the necessity of specialty software on the remote device. Remote devices such as laptop computers and cellular telephones communicate with the central server system, while the central server system likewise communicates with base computers. Communications between the central server system and the base computers are facilitated by an intermittent query from base computers to the central server system in a manner which allows communication even in a firewall-constrained environment. The system and method provides a means for facilitating both persistent connections and dialup communications between the base computers and the central server system.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates generally to remote access systems. More particularly, the present invention relates to an apparatus and method for implementing a communication architecture for remotely accessing a computer by means of a remote device without the need for special software applications on the remote device.


2. The Prior Art


In general, remote access systems allow a “remote” user (from a remote computer) to connect to and access resources on another computer. For example, a user on a mobile computer may connect to and access resources on a home computer via conventional remote access systems. However, prior art remote access systems require special application software to be supplied to both the remote system and the base system. Due to this shortcoming, most prior art remote access systems are limited to devices including substantial computing capabilities in the remote computer. Also, access to another computer via a remote access system is provided using conventional data connection means, typically through a PSTN (public switched telephone network) connection. That is, a direct connection from the remote computer to the base computer is typically required for security reasons.


Remote access systems can generally be categorized into two types of systems. The first system is generally referred to as a remote access server (RAS) system. A RAS system usually comprises server RAS software residing on a RAS server and client RAS software residing on a “remote” computer. The RAS server is coupled to resources (e.g., printers, files, other nodes) which are remotely accessed by a user of the system. In operation, a user of the remote computer connects to the RAS server via a dial-in telephone connection. Upon connection, the RAS server queries for the user's access credentials (e.g., user name and password). Upon authentication of the user's access credentials, the user is granted access to resources on the RAS server and/or resources on other nodes connected to the RAS server to which the user is authorized access. The RAS software manages the connection process, the authentication process, the access privileges, and the data transfers between the RAS server and the remote computer. RAS systems are also used by commercial service providers, such as Internet Access Providers (ISPs) to allow their customers access into their network resources.


In another implementation, RAS systems may be used in conjunction with an Internet connection. In this scheme, a user is able to access a RAS server indirectly via the Internet, rather than directly via a point to point telephone connection. These RAS systems are generally referred to as virtual private networks (VPNs), because a secure channel is provided via the normally unsecured Internet. In VPNs, a remote user having a computer operatively coupled to the VPN, is able to access resources on another computer via the Internet using Internet protocols.


The other type of remote access system is generally referred to as a remote control system (RCS). RCSs allow a remote user to not only access resources on another “host” computer, but also allow the user to control the host computer. RCSs typically display on the remote computer what would normally be displayed on the host computer (known as screen emulation). In this way, the user is able to control the host computer from the remote computer as if the user was directly accessing the host computer. An example of a commercially available RCS product is PC Anywhere™ by Symantec Corp.™. Like RAS systems, RCS allows a remote user to connect via a conventional means, including a telephone connection and via the Internet. Again, special software is required on both nodes.


There are several disadvantages with RAS and RCS systems. In RAS systems, file synchronization poses a common problem, particularly with respect to email applications. For example, where a remote user downloads email to the remote computer it may be stored on the remote computer. Thus, when the user gets back to the local computer, that email is not accessible on the remote computer, but must somehow be transferred from the remote computer or disregarded. This can become quite frustrating to the user.


In addition, in RAS implementations certain files may be unusable without the original application. For example, with certain email applications, the messages associated with the email application are commonly stored in a proprietary file format. Without the original email application, the file would be unusable to the remote user if the original application is not installed on the remote computer accessed by the user.


RCS, on the other hand, typically requires proprietary software to be installed on both the server (host) and client (remote) computers. Proprietary software limits the ability of a remote user to access the host computer, because such proprietary software may not be readily accessible.


In addition, often the setup and administration of RAS and RCS systems are cumbersome or otherwise overwhelming for the home or corporate users. Setup normally involves the assistance of a network system administrator and is usually complicated further by the fact that each user may have different remote computers and different host computers. Each setup then becomes unique and difficult.


BRIEF DESCRIPTION OF THE INVENTION

Accordingly, there is a need for a method and apparatus which provides for remote and secure access to a host or base computer, and which further provides an open application standard for client access to the host computer. The present invention satisfies these needs, as well as others, and generally overcomes the deficiencies found in the background art.


Thus, it is desirable to have an open application standard (such as a conventional world wide web (web) browser), particularly on the client side, whereby a mobile user may access a plurality of data processing means (computers, Internet terminals, PDAs, mobile telephones, etc.).


To overcome the above described and other shortcomings of the prior art, disclosed herein is an apparatus and method for remotely accessing a base computer. The remote access device may be any device capable of accessing the internet and does not require the installation of specialty software thereon. The base computer operates by means of an agent that communicates with a central server system.


A user of the system may access a base computer from a remote device such as a laptop computer, cellular telephone, palm pilot, or any other device capable of accessing the internet. A browser interface on a laptop computer for example is all that would be required for a laptop computer. The laptop user would then access the central server system web site and be provided with one or more tasks that the user may desire to perform. Such tasks may include checking email on the base computer, obtaining files from the base computer, copying files from the remote computer to the base computer, or accessing an address book on the base computer.


The base computer intermittently contacts the central server system to determine whether the central server system has established a session with a remote user. When a session has been established between a remote user and the central server system, the central server system replies to the base computers next intermittent request with an IP address and port number for the base computer to establish a socket connection. The IP address and port number correspond to a server in the central server system handling the particular session task requests. That socket connection will be maintained between the base computer and the server until the server ends the session or a predefined timeout period expires.


While the socket connection is maintained, the base computer “listens” for tasks from the server. It should be noted that because of the intermittent initial contacts from the base computer to the central server system, operation of this system will be allowed, even in the presence of a firewall (i.e. a firewall between the base computer and the internet is intended to preclude a signal from an outside source coming through the firewall unless requested, but will allow outgoing signals; thus, a message sent from a base computer to a web server would be allowed through a firewall along with any response to said message). Likewise, since the base computer establishes the continuous connection with the IP socket and port number of the server in question after being informed of same from the central server system in response to one of the intermittent contacts, a firewall is not a problem. Thus, once a task is selected by a remote user, the central server system via the connected server (to the base computer) transmits the task request to the base computer and the base computer provides the data and/or files necessary to fulfill that request in response back to the central server system.


The central server system then, in turn, presents the requested data to the remote user in an internet readable form. For instance, in the laptop computer example, the information is presented in a browser readable format such as HTML. For a cellular device on the other hand, a WAP (Wireless Application Protocol) would be used to present such information to the cellular device user via the cellular device display (HDML, WML, etc.). Additionally, the communications between the remote device and the central server system are preferably conducted via a secure sockets layer (SSL) for security purposes, and the communications between the base computer and the central server system are preferably conducted via a proprietary protocol utilizing encryption as well to also ensure security.


Therefore, it is a first object of the present invention to provide a system for remotely accessing a base computer without the necessity of specialty software on the remote device.


It is another object of the present invention to provide a system for remotely accessing a base computer wherein the remote device communicates solely with an internet server system and the base computer communicates solely with the internet server system.


It is yet another object of the present invention to provide a system for remotely accessing a base computer via the internet in a manner that is highly secure.


It is yet another object of the present invention to provide a method for both remotely accessing a base computer that is continuously connected to the internet and one which is not continuously connected to the internet.


It is yet another object of the present invention to provide a remote access system that will work even though the base computer may reside behind a firewall.


Viewed from a first vantage point a method for remotely accessing a base computer from internet-enabled remote devices wherein the remote devices do not include remote access software is disclosed, comprising in combination, establishing a remote access session with one of the remote devices at an internet central server system, presenting a task list to the remote device from said central server system, receiving a task selection at said central server system from the remote device, establishing a persistent connection between said central server system and a base computer in response to intermittent contact from said base computer to said central server system, transmitting said task from said central server system to the base computer via said connection between said central server system and said base computer, receiving at said central server system task data from the base computer responsive to said transmitted task, and presenting from said central server system a task response compiled from said task data to the remote device.


Viewed from another vantage point a remote access system is disclosed comprising in combination a central server system in operative communication with the internet, an internet server for communicating with remote devices, the internet server comprising one server within the central server system, a task transmitter within the central server system for transmitting tasks to base computers; and a task data receiver within the central server system for receiving task data from base computers.





BRIEF DESCRIPTION OF THE DRAWING FIGURES


FIG. 1 is a schematic diagram of an overview of the present invention.



FIG. 2 is a schematic diagram of the present invention in a continuous connection environment.



FIG. 3 is a schematic diagram of the present invention in a non-continuous connection environment.



FIG. 4 is a flowchart of the present invention in a continuous connection environment.



FIG. 5 is a flowchart of the present invention in a non-continuous connection environment.





DETAILED DESCRIPTION OF THE INVENTION

Persons of ordinary skill in the art will realize that the following description of the present invention is illustrative only and not in any way limiting. Other embodiments of the invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.


Referring to the drawing figures, wherein like numerals denote like parts throughout the various drawing figures, FIG. 1 is directed to the remote access system 10 of the present invention. Generally, the remote access system 10 includes a central server system 12 that may be in operative communication with a remote device 16. Additionally, a base computer 14 may be continuously or non-continuously in operative communication with central server system 12. Furthermore, the central server system 12 may consist of one or more servers. A multiple server configuration would allow for the handling of certain discreet operations by different servers and is preferred. For instance, one server may be configured as a web site server, while another may be configured to communicate in a manner understood by cellular phones, and yet another for PDA's, and so forth.


The essence of the system is to enable a remote device 16 to retrieve data from, or provide data to, a base computer 14 with the assistance of central server system 12. No special software is installed on the remote device 16. To the contrary, remote device 16 may be any device capable of accessing the internet which includes a readable interface such as a computer, mobile telephone, palm device, webTV, or any other such device.


A remote user using a remote device 16 may connect to the central server system 12 as the user might connect to any other internet site. Once connected (and authenticated), that user will then be presented with task options by the central server system in an internet readable format (HTML for mobile computer user using a browser for instance) by the device being used. The user will then select the task desired at which time the central server system 12 will transmit the task to base computer 14.


The base computer 14, via an agent installed thereon, will contact the central server 12 from time to time to determine if a remote user session has been established. Application entitled AGENT SYSTEM FOR A SECURE REMOTE ACCESS SYSTEM, filed Jul. 19, 2000, U.S. application Ser. No. 09/618,955, now U.S. Pat. No. 6,892,225, describes more fully this method, system, and apparatus of implementing the agent and is expressly incorporated herein by reference. Thus, the base computer 14 intermittently contacts the central server system 12 to determine whether the central server system 12 has established a session with a remote user. When a session has been established between a remote device 16 and the central server system 12, the central server system 12 replies to the base computers next intermittent contact with an IP address and port number for the base computer 14 to establish a socket connection with a server in the central server system 12. The IP address and port number correspond to a server in the central server system 12 handling the particular session task requests. That socket connection will be maintained between the base computer 14 and the server until the server ends the session or a predefined timeout period expires.


While the socket connection is maintained, the base computer 14 “listens” for tasks from the server. It should be noted that because of the intermittent initial contacts from the base computer 14 to the central server system 12, operation of this system will be allowed, even in the presence of a firewall (i.e. a firewall between the base computer 14 and the internet is intended to preclude a signal from an outside source coming through the firewall unless requested, but will allow outgoing signals; thus, a message sent from a base computer 14 to a web server would be allowed through a firewall along with any response to said message). Likewise, since the base computer 14 establishes the continuous connection with the IP address and port number of the server in question after being informed of same from the central server system 12 in response to one of the intermittent contacts, a firewall is not a problem.


Thus, once a task is selected by a remote user via remote device 16, the central server system 12 via the connected server (to the base computer) transmits the task request to the base computer 14 and the base computer 14 provides the data and/or files necessary to fulfill that request in response back to the central server system 12. Then, the central server system will present the task information/data to the remote device 16 in a manner readable by remote device 16.


More specifically, and referring now to FIGS. 2 and 4, a continuous connection remote access system and method are depicted. FIG. 2 is intended to be a graphical representation of the system, while FIG. 4 is intended to provide a flowchart of the system method. A “continuous connection” includes, but is not limited to such on demand or persistent connection means such as T1, T3, ADSL, ISDN or other similar types of connectivity as opposed to dial-up connections.


As shown in FIG. 2, a base computer 14 resides on a network with a plurality of other devices as is common in an office setting. That network resides behind firewall 15 which is intended to prevent unwanted access to the network from outside sources (hackers, etc.). A message may pass from within the firewall to outside sources such as internet 18 web servers as will be appreciated by those skilled in the art. Likewise, responses to such outgoing signals are allowed back through the firewall as they are deemed wanted since a device within the firewall requested them. The communication media is continuously available to users as is known and common in large group settings such as offices. That is, access does not require any additional level of effort by base computer 14, as would be the case for dial-up connections. Thus, FIG. 2 depicts one embodiment of the invention where the environment includes a continuous open connection between base computer 14 and central server system 12 via internet 18 preferably in an encrypted manner.


On the other hand, mobile devices 16 are also capable of connecting to central server system 12 as they would any other internet resource. Central server system 12 includes the necessary server subsystems for communicating appropriately with each such remote device. Co-pending application Ser. No. 09/618,954 entitled METHOD AND APPARATUS FOR A SECURE REMOTE ACCESS SYSTEM, filed Jul. 19, 2000, describes more fully this method, system, and apparatus of implementing the server subsystems within the central server system and is expressly incorporated herein by reference. For instance, one server within central server system 12 may communicate to WAP (wireless application protocol) enabled devices 16, cellular telephones for instance, while another may communicate to IP (internet protocol) enabled devices 16, laptop computers for instance. The communication between remote devices 16 and central server system 12 is preferably accomplished in a secure and authenticated manner, such as by secure sockets layer (SSL) and passwords.


Software installed on the base computer 14, an agent as described in U.S. patent Ser. No. 09/618,955, incorporated herein by reference, provides the capability of receiving tasks from central server system 12. It is also capable of performing those tasks on data within base computer 14. For instance, if the agent within base computer 14 receives a task from central server system 12 and central server system 12 transmits the task of getting a file directory from the base computer, the agent responds by providing the base computer 14 directory structure in a manner understandable by central computer system 12. Furthermore, in this continuous connection environment, the agent in base computer 14 “listens” (since a persistent socket connection has been established) for new tasks from central server 12.


Thus, and referring now especially to FIG. 4, the base computer 14 will intermittently contact central server system 12 to determine if a remote session has been established (i.e. a session between a remote device 16 and central server system 12). If a remote session has been established, central server system 12 replies to base computer 14 with an IP address and port number for the base computer 14 to connect with to receive tasks. Base computer 14 then establishes the specified socket connection and awaits (“listens” for) tasks. In this manner, complications associated with firewalls as described above, may be avoided. That is, the connection originates with the base computer 14 and is allowed to go out to central server system 12. Furthermore, the reply transmitted from central server system 12 to base computer 14 is likewise allowed as will be understood by those individuals familiar with firewalls.


However, before any communication between central server system 12 and the agent of base computer 14 may take place, a user must have registered with central server system 12. Registration includes the providing of typical user information such as name, address, telephone number, and so forth and will likewise include an associated password for authentication purposes. The authentication is necessary to establish whether remote users are who they purport to be.


Thus, once a user account is established and a record thereof created in the central server system 12 database, a user may then remotely access the base computer 14 with a remote device 16 as follows. From a remote device 16, the user attempts to contact central server system 12 to initiate a remote access session. Central server system 12 enables an SSL session (if remote device 16 is able to communicate via SSL) and requests a username and password from the remote user. The remote user provides a username and password that is verified against the central server system database record discussed above. If the central server system 14 cannot verify the remote username and password provided (one or more attempts may be allowed, but a limited number of attempts is preferred for security reasons), then the session is terminated by the central server system.


On the other hand, if the remote user is authenticated (username and password provided by remote user match central server system database record), then a list of tasks is presented to the remote used to choose amongst. The list may include such tasks as “check email”, “get directory list”, “upload files to base computer”, “download files from base computer”, “get address book”, and other like tasks. This list may be presented as text or as icons or both depending on the remote device protocol limitations or capabilities. The user will then select a task from the list.


Upon receipt of the user task selection form remote device 16, the central server system 12 then transmits that task to the connected base computer 14. Then, upon receipt of the task request, base computer 14 performs the task in accordance with the agent-defined instruction set. For instance, if the task is to provide a directory listing, the agent will provide the necessary directory tree information to the central server system 12.


Thereafter, the central server system 12, upon receipt of the data from base computer 14, presents the information to the remote device in a manner viewable by the remote device (HTML for a remote computer using a browser for instance). The presented information, will also include other tasks or subtasks that may be selected by the remote user (subdirectories of the directory may be needed in a next step). The remote user will continue selecting tasks or subtasks until wishing to end the session at which time the end session task will be selected. The session is then terminated by the user and central server system 12. Of course, after a period of no selections or activity on the part of the remote user, the session may be terminated by the central server system as well as will be appreciated by those skilled in the art now informed by this disclosure.


In an alternate embodiment, namely a non-continuous connection environment for the base device, and referring now to FIGS. 3 and 5, the present invention is likewise depicted. In this environment, non-continuous connection means a connection between the base computer 14 and the central server system 12 in which the connection is not persistent, such as a dial-up or PSTN connection. That is, many home computers are capable of connecting to the internet only by way of a dial-up connection via a local ISP 20. Typically, that ISP resides behind a firewall. Therefore, it is desirable to enable such home users constrained by dial-up connections to access the home computer 14 when away from the home computer 14 with a remote device 16.


As will be understood by those familiar with connecting to an ISP from a home computer via a dial-up connection, the base or home computer 14 must first establish a connection via a PSTN (“POTS”) 22 with the ISP by dialing into one or more predefined telephone numbers. If the ISP verifies the user appropriately, such as by a username and password, then the connection is allowed to continue until the user logs off or some other event terminates the session. Also important, but not typically an issue for a dial-up ISP user, is that a firewall typically precludes unwanted incoming traffic from other internet sources to the ISP. Thus, connected users can send messages from the ISP to other internet sources and receive responses, however, unsolicited incoming traffic is generally precluded by the ISPs firewall 15 to prevent unwanted attacks (or hacks) on the ISP servers and system devices.


A remote user having a remote device 16 may connect to the central server system 12 as described above for a continuous connection (i.e. SST, password, authentication, etc.), but in this non-continuous connection environment the base computer 14 may either not be on or at least not connected to the internet. Thus, making it impossible for the base computer to intermittently contact the central server system 12 as described above. However, the central server system 12 can record the telephone number of the base computer's modem upon registration by requiring the user to provide such information upon registering. Having this information then, when the central server system 12 is contacted by a remote device 16, central server system 12 will, via one or more available modems (i.e. a modem bank), dial the base computer modem line telephone number to attempt a connection therewith.


As will be appreciated by those familiar with modern modems, the base computer 14, if not already on, may turn itself on when the modem therewith is called upon by the central server system 12 and a connection established. Thus, once “awakened,” the agent within the base computer 14 may initiate contact processes as follows. First, the connection is terminated with central server system 12, thus minimizing costs associated with the central server system 12 having to dial into the base computer 14. Then, the base computer 14 can establish an internet connection by dialing into ISP 20 via PSTN 22. Once connected to the internet in this manner, base computer 14 via the agent may begin intermittently contacting the central server system 12 to determine if a remote session has been established, not unlike the process described above for the continuous connection environment. On the other hand, if upon attempting to establish a connection with base computer 14, central server system 12 encounters a “busy” signal, then the session with the remote device is terminated.


More specifically, and referring now especially to FIG. 5, a user having a remote device will attempt to login to central server system 12 and central server system 12 will establish (if possible) a SSL connection. A username (or number) and password are then requested of the remote user by central server system 12. If authenticated, a task list is presented to the remote user by the central server system 12 on remote device 16. If authentication fails, the session is terminated. If authentication succeeds, central server system 12 initiates a call to base computer 14's modem.


If the base computer 14 modem is not busy, then the agent therein disconnects the line and establishes a connection with the user's ISP 20 (as described above). Once the connection with the ISP 20 is established, the agent will begin intermittently contacting central server system 12 to determine if a remote session has been established. If a remote session has indeed been established, the central server system 12 will send an IP address and port number of the server processing tasks for the session to the base computer 14. Then the base computer 14 establishes a connection at the specified IP address and port number and begins “listening” for tasks on the established socket connection. Once a task is selected on the remote device 16 by a remote user, the central server system 12 will transmit that task request to the base computer via the established socket connection. Then, as with the continuous connection environment, the base computer will perform the task by supplying the data necessary to fulfill the task to the central server system 12. This process will continue until the session is terminated by the central server system (via selection of a termination task request by a remote user or the expiration of a predefined time-out period).


While embodiments and applications of this invention have been shown and described, it would be apparent to those skilled in the art that many more modifications than mentioned above are possible without departing from the inventive concepts herein. The invention, therefore, is not to be restricted except in the spirit of the appended claims.

Claims
  • 1. A remote access system, comprising in combination: a server system in operative communication with at least one remote device and at least one base computer responsive to establishment of a remote access session between the at least one remote device and the server system, and responsive to intermittent communication between the at least one base computer and the server system, wherein the at least one remote device includes open application standard remote access software to establish a remote access session with the server system, and wherein the at least one remote device includes non-proprietary remote access server software and non-proprietary remote control system software;a task transmitter within said server system for transmitting tasks submitted by said at least one remote device to said at least one base computer; anda task data receiver within said server system for receiving task data from said at least one base computers and returned to the remote device.
  • 2. The remote access system of claim 1 further comprising security services enabled between said server system and said at least one remote device, and between said server system and at least one base computers.
  • 3. The remote access system of claim 2 wherein said security services between said server system and at least one remote device include means for authenticating the user of the remote device.
  • 4. The remote access system of claim 3 wherein said security services between said server system and at least one base computer includes encryption.
  • 5. A method for remotely accessing a base computer from internet-enabled remote devices, the method comprising in combination: establishing a remote access session with one of the remote devices at an internet central server system, wherein the remote devices include open application standard remote access software to establish the remote access session, and include non-proprietary remote access server software and non-proprietary remote control system software;presenting a task list to the remote device from said internet central server system;receiving a task selection at said internet central server system from the remote device;establishing a persistent connection between said internet central server system and a base computer in response to intermittent contact from said base computer to said internet central server system, and in response to establishing a remote access session between the one of the remote devices and the internet central server system;transmitting said task from said internet central server system to the base computer via said connection between said internet central server system and said base computer;receiving at said internet central server system task data from the base computer responsive to said transmitted task; andpresenting from said internet central server system a task response compiled from said task data to the remote device.
  • 6. The method of claim 5 further comprising terminating said remote access session by said internet central server system.
  • 7. The method of claim 6 further comprising communicating said task response via a protocol compatible with the remote device.
  • 8. The method of claim 7 wherein said protocol is TCP/IP for remote devices configured as computers.
  • 9. The method of claim 7 wherein said protocol is WAP for remote devices configured as wireless communication devices.
  • 10. The method of claim 5 further comprising authenticating the user of the remote device while establishing the remote access session.
  • 11. The method of claim 10 further comprising providing a secure communication means while establishing the remote access session and continuing said secure communication between said internet central server system and the remote device until said session is terminated.
  • 12. The method of claim 11 further comprising encrypting the communications between said internet central server system and the base computer.
  • 13. The method of claim 12 further comprising establishing a communication link between the base computer and the internet central server system when the base computer is not already connected to the internet.
  • 14. The method of claim 13 further comprising dialing up a base computer modem by the internet central server system to wake up the base computer to establish said communication link.
  • 15. The method of claim 14 further comprising disconnecting from the dial up connection by the base computer and then reestablishing the communication link via the internet between said internet central server system and said base computer.
  • 16. A method for remotely accessing a base computer from internet-enabled remote devices, the method comprising in combination: establishing a remote access session with one of the remote devices at an internet central server system, wherein the remote devices include open application standard remote access software to establish the remote access session, and include non-proprietary remote access server software and non-proprietary remote control system software;presenting a task list to the remote device from said internet central server system;receiving a task selection at said internet central server system from the remote device;establishing a persistent connection between said internet central server system and a base computer in response to intermittent contact from said base computer to said internet central server system;transmitting said task from said internet central server system to the base computer via said connection between said internet central server system and said base computer;receiving at said internet central server system task data from the base computer responsive to said transmitted task;presenting from said internet central server system a task response compiled from said task data to the remote device;authenticating the user of the remote device while establishing the remote access session;providing a secure communication means while establishing the remote access session and continuing said secure communication between said internet central server system and the remote device until said session is terminated;encrypting the communications between said internet central server system and the base computer;establishing a communication link between the base computer and the internet central server system when the base computer is not already connected to the internet; anddialing up a base computer modem by the internet central server system to wake up the base computer to establish said communication link.
  • 17. The method of claim 16 further comprising disconnecting from the dial up connection by the base computer and then reestablishing the communication link via the internet between said internet central server system and said base computer.
US Referenced Citations (442)
Number Name Date Kind
4887212 Zamora et al. Dec 1989 A
5111398 Nunberg et al. May 1992 A
5115466 Presttun May 1992 A
5130993 Gutman et al. Jul 1992 A
5146221 Whiting et al. Sep 1992 A
5329619 Page et al. Jul 1994 A
5392390 Crozier Feb 1995 A
5418854 Kaufman et al. May 1995 A
5418908 Keller et al. May 1995 A
5425079 Noda et al. Jun 1995 A
5483352 Fukuyama et al. Jan 1996 A
5485161 Vaughn Jan 1996 A
5519433 Lappington et al. May 1996 A
5519606 Frid-Nielsen et al. May 1996 A
5543789 Behr et al. Aug 1996 A
5544061 Morimoto et al. Aug 1996 A
5561446 Montlick Oct 1996 A
5574906 Morris Nov 1996 A
5579489 Dornier et al. Nov 1996 A
5588009 Will Dec 1996 A
5592470 Rudrapatna et al. Jan 1997 A
5623406 Ichbiah Apr 1997 A
5623661 Hon Apr 1997 A
5628005 Hurvig May 1997 A
5630081 Rybicki et al. May 1997 A
5638508 Kanai et al. Jun 1997 A
5640577 Scharmer Jun 1997 A
5644709 Austin Jul 1997 A
5647002 Brunson Jul 1997 A
5649195 Scott et al. Jul 1997 A
5650800 Benson Jul 1997 A
5666397 Lamons et al. Sep 1997 A
5666553 Crozier Sep 1997 A
5682524 Freund et al. Oct 1997 A
5684990 Boothby Nov 1997 A
5694596 Campbell Dec 1997 A
5699255 Ellis et al. Dec 1997 A
5701423 Crozier Dec 1997 A
5706509 Man-Hak Tso Jan 1998 A
5710922 Alley et al. Jan 1998 A
5727202 Kucala Mar 1998 A
5727950 Cook et al. Mar 1998 A
5729735 Meyering Mar 1998 A
5729739 Cantin et al. Mar 1998 A
5729743 Squibb Mar 1998 A
5742792 Yanai et al. Apr 1998 A
5745750 Porcaro Apr 1998 A
5745906 Squibb Apr 1998 A
5757920 Misra et al. May 1998 A
5758150 Bell et al. May 1998 A
5758355 Buchanan May 1998 A
5764899 Eggleston et al. Jun 1998 A
5768480 Crawford, Jr. et al. Jun 1998 A
5768597 Simm Jun 1998 A
5771354 Crawford Jun 1998 A
5778346 Frid-Nielsen et al. Jul 1998 A
5778361 Nanjo et al. Jul 1998 A
5778367 Wesinger et al. Jul 1998 A
5778388 Kawamura et al. Jul 1998 A
5781901 Kuzma Jul 1998 A
5787247 Norin et al. Jul 1998 A
5787262 Shakib et al. Jul 1998 A
5794228 French et al. Aug 1998 A
5804803 Cragun et al. Sep 1998 A
5809497 Freund et al. Sep 1998 A
5812773 Norin Sep 1998 A
5812793 Shakib et al. Sep 1998 A
5818437 Grover et al. Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5832489 Kucala Nov 1998 A
5832518 Mastors Nov 1998 A
5832519 Bowen et al. Nov 1998 A
5845283 Williams et al. Dec 1998 A
5859973 Carpenter Jan 1999 A
5864864 Lerner Jan 1999 A
5875296 Shi et al. Feb 1999 A
5884323 Hawkins et al. Mar 1999 A
5884325 Bauer et al. Mar 1999 A
5893119 Squibb Apr 1999 A
5896321 Miller Apr 1999 A
5897640 Veghte et al. Apr 1999 A
5897642 Capossela et al. Apr 1999 A
5903723 Beck et al. May 1999 A
5907793 Reams May 1999 A
5923756 Shambroom Jul 1999 A
5923848 Goodhand et al. Jul 1999 A
5926816 Bauer et al. Jul 1999 A
5933653 Ofek Aug 1999 A
5933778 Buhrmann et al. Aug 1999 A
5933816 Zeanah et al. Aug 1999 A
5935262 Barrett et al. Aug 1999 A
5937405 Campbell Aug 1999 A
5941944 Messerly Aug 1999 A
5943676 Boothby Aug 1999 A
5944787 Zoken Aug 1999 A
5946615 Holmes et al. Aug 1999 A
5948066 Whalen et al. Sep 1999 A
5951636 Zerber Sep 1999 A
5961572 Craport et al. Oct 1999 A
5961590 Mendez et al. Oct 1999 A
5968131 Mendez et al. Oct 1999 A
5970149 Johnson Oct 1999 A
5970490 Morgenstern Oct 1999 A
5971277 Cragun et al. Oct 1999 A
5974238 Chase, Jr. Oct 1999 A
5974563 Beeler, Jr. Oct 1999 A
5987381 Oshizawa Nov 1999 A
5987609 Hasebe Nov 1999 A
5995118 Masuda Nov 1999 A
6000000 Hawkins et al. Dec 1999 A
6006215 Retallick Dec 1999 A
6006274 Hawkins et al. Dec 1999 A
6009462 Birrell et al. Dec 1999 A
6012063 Bodnar Jan 2000 A
6012088 Li et al. Jan 2000 A
6014695 Yamashita et al. Jan 2000 A
6016394 Walker Jan 2000 A
6016478 Zhang et al. Jan 2000 A
6023708 Mendez et al. Feb 2000 A
6023723 McCormick et al. Feb 2000 A
6026414 Anglin Feb 2000 A
6034621 Kaufman Mar 2000 A
6038665 Bolt et al. Mar 2000 A
6044381 Boothby et al. Mar 2000 A
6049776 Donnelly et al. Apr 2000 A
6052735 Ulrich et al. Apr 2000 A
6058399 Morag et al. May 2000 A
6061790 Bodnar May 2000 A
6061796 Chen et al. May 2000 A
6063134 Peters et al. May 2000 A
6064880 Alanara May 2000 A
6065018 Beier et al. May 2000 A
6073133 Chrabaszcz Jun 2000 A
6076109 Kikinis Jun 2000 A
6078960 Ballard Jun 2000 A
6081900 Subramaniam et al. Jun 2000 A
6094618 Harada Jul 2000 A
6101480 Conmy et al. Aug 2000 A
6108330 Bhatia et al. Aug 2000 A
6108703 Leighton et al. Aug 2000 A
6112024 Almond et al. Aug 2000 A
6115797 Kanda et al. Sep 2000 A
6131096 Ng et al. Oct 2000 A
6131116 Riggins et al. Oct 2000 A
6141011 Bodnar et al. Oct 2000 A
6141621 Piwowarski et al. Oct 2000 A
6141659 Barker et al. Oct 2000 A
6141664 Boothby Oct 2000 A
6145088 Stevens Nov 2000 A
6148260 Musk et al. Nov 2000 A
6151606 Mendez Nov 2000 A
6157630 Adler et al. Dec 2000 A
6163773 Kishi Dec 2000 A
6163779 Mantha et al. Dec 2000 A
6163844 Duncan et al. Dec 2000 A
6167120 Kikinis Dec 2000 A
6173310 Yost et al. Jan 2001 B1
6173311 Hassett et al. Jan 2001 B1
6182117 Christie et al. Jan 2001 B1
6182141 Blum et al. Jan 2001 B1
6185598 Farber et al. Feb 2001 B1
6189030 Kirsch et al. Feb 2001 B1
6189096 Haverty Feb 2001 B1
6195695 Cheston et al. Feb 2001 B1
6195794 Buxton Feb 2001 B1
6202085 Benson et al. Mar 2001 B1
6205448 Kruglikov et al. Mar 2001 B1
6209034 Gladwin et al. Mar 2001 B1
6212529 Boothby et al. Apr 2001 B1
6212556 Arunachalam Apr 2001 B1
6216131 Liu et al. Apr 2001 B1
6219680 Bernardo et al. Apr 2001 B1
6223187 Boothby et al. Apr 2001 B1
6226650 Mahajan et al. May 2001 B1
6233565 Lewis et al. May 2001 B1
6233589 Balcha et al. May 2001 B1
6243760 Armbruster et al. Jun 2001 B1
6247048 Greer et al. Jun 2001 B1
6247135 Feague Jun 2001 B1
6249690 Mashiko Jun 2001 B1
6252547 Perry et al. Jun 2001 B1
6255989 Munson et al. Jul 2001 B1
6256750 Takeda Jul 2001 B1
6260124 Crockett et al. Jul 2001 B1
6272545 Flanagin et al. Aug 2001 B1
6275831 Bodnar et al. Aug 2001 B1
6278941 Yokoyama Aug 2001 B1
6282435 Wagner et al. Aug 2001 B1
6282698 Baker et al. Aug 2001 B1
6285889 Nykanen et al. Sep 2001 B1
6286029 Delph Sep 2001 B1
6286053 Van Peursem et al. Sep 2001 B1
6286085 Jouenne et al. Sep 2001 B1
6292743 Pu et al. Sep 2001 B1
6292905 Wallach et al. Sep 2001 B1
6295502 Hancock et al. Sep 2001 B1
6295541 Bodnar et al. Sep 2001 B1
6304881 Halim et al. Oct 2001 B1
6317755 Rakers et al. Nov 2001 B1
6321236 Zollinger et al. Nov 2001 B1
6324467 Machii et al. Nov 2001 B1
6324526 D'Agostino Nov 2001 B1
6324544 Alam et al. Nov 2001 B1
6327533 Chou Dec 2001 B1
6329680 Yoshida et al. Dec 2001 B1
6330568 Boothby et al. Dec 2001 B1
6332158 Risley et al. Dec 2001 B1
6333973 Smith et al. Dec 2001 B1
6338096 Ukelson Jan 2002 B1
6339710 Suzuki Jan 2002 B1
6341316 Kloba et al. Jan 2002 B1
6345308 Abe Feb 2002 B1
6349336 Sit et al. Feb 2002 B1
6353448 Scarborough et al. Mar 2002 B1
6356910 Zellweger Mar 2002 B1
6356961 Oprescu-Surcobe Mar 2002 B1
6360252 Rudy et al. Mar 2002 B1
6360330 Mutalik et al. Mar 2002 B1
6363249 Nordeman et al. Mar 2002 B1
6363391 Rosensteel, Jr. Mar 2002 B1
6363412 Niwa et al. Mar 2002 B1
6374250 Ajtai et al. Apr 2002 B2
6381700 Yoshida Apr 2002 B1
6389462 Cohen et al. May 2002 B1
6396482 Griffin et al. May 2002 B1
6397307 Ohran May 2002 B2
6397351 Miller et al. May 2002 B1
6401104 LaRue et al. Jun 2002 B1
6405218 Boothby Jun 2002 B1
6418309 Moon et al. Jul 2002 B1
6434627 Millet et al. Aug 2002 B1
6437818 Ludwig et al. Aug 2002 B1
6449622 LaRue et al. Sep 2002 B1
6453392 Flynn, Jr. Sep 2002 B1
6457062 Pivowar et al. Sep 2002 B1
6460036 Herz Oct 2002 B1
6462644 Howell et al. Oct 2002 B1
6463464 Lazaridis et al. Oct 2002 B1
6466967 Landsman et al. Oct 2002 B2
6473621 Heie Oct 2002 B1
6480896 Brown et al. Nov 2002 B1
6484143 Swildens et al. Nov 2002 B1
6487560 LaRue et al. Nov 2002 B1
6490655 Kershaw Dec 2002 B1
6496944 Hsiao et al. Dec 2002 B1
6499108 Johnson Dec 2002 B1
6507891 Challenger et al. Jan 2003 B1
6516327 Zondervan et al. Feb 2003 B1
6519452 Agostino et al. Feb 2003 B1
6523063 Miller et al. Feb 2003 B1
6523079 Kikinis et al. Feb 2003 B2
6532588 Porter Mar 2003 B1
6535743 Kennedy, III et al. Mar 2003 B1
6539494 Abramson et al. Mar 2003 B1
6542933 Durst, Jr. et al. Apr 2003 B1
6546425 Hanson et al. Apr 2003 B1
6549933 Barrett et al. Apr 2003 B1
6553375 Huang et al. Apr 2003 B1
6553410 Kikinis Apr 2003 B2
6553413 Leighton et al. Apr 2003 B1
6567850 Freishtat et al. May 2003 B1
6567857 Gupta et al. May 2003 B1
6581065 Rodkin et al. Jun 2003 B1
6584454 Hummel et al. Jun 2003 B1
6589290 Maxwell et al. Jul 2003 B1
6591266 Li et al. Jul 2003 B1
6591306 Redlich Jul 2003 B1
6591362 Li Jul 2003 B1
6597700 Golikeri et al. Jul 2003 B2
6601143 Lamparter Jul 2003 B1
6609005 Chern Aug 2003 B1
6628194 Hellebust et al. Sep 2003 B1
6636894 Short et al. Oct 2003 B1
6640302 Subramaniam et al. Oct 2003 B1
6643707 Booth Nov 2003 B1
6647399 Zaremba Nov 2003 B2
6654746 Wong et al. Nov 2003 B1
6665721 Hind et al. Dec 2003 B1
6671724 Pandya et al. Dec 2003 B1
6671757 Multer et al. Dec 2003 B1
6684206 Chen et al. Jan 2004 B2
6684302 Kershaw Jan 2004 B2
6694335 Hopmann et al. Feb 2004 B1
6694336 Multer et al. Feb 2004 B1
6701316 Li et al. Mar 2004 B1
6704849 Steegmans Mar 2004 B2
6714987 Amin et al. Mar 2004 B1
6718348 Novak et al. Apr 2004 B1
6718390 Still et al. Apr 2004 B1
6725239 Sherman et al. Apr 2004 B2
6728530 Heinonen et al. Apr 2004 B1
6732101 Cook May 2004 B1
6732264 Sun et al. May 2004 B1
6738789 Multer et al. May 2004 B2
6741851 Lee et al. May 2004 B1
6745040 Zimmerman Jun 2004 B2
6757696 Multer et al. Jun 2004 B2
6757698 Davidson et al. Jun 2004 B2
6757712 Bastian et al. Jun 2004 B1
6781575 Hawkins et al. Aug 2004 B1
6795848 Border et al. Sep 2004 B1
6799214 Li Sep 2004 B1
6804690 Dysert et al. Oct 2004 B1
6804783 Wesinger, Jr. et al. Oct 2004 B1
6810411 Coughlin et al. Oct 2004 B1
6812961 Parulski et al. Nov 2004 B1
6813487 Trommelen Nov 2004 B1
6816481 Adams et al. Nov 2004 B1
6829654 Jungck Dec 2004 B1
6836657 Ji et al. Dec 2004 B2
6836765 Sussman Dec 2004 B1
6839022 Benco et al. Jan 2005 B1
6839568 Suzuki Jan 2005 B2
6842695 Tu et al. Jan 2005 B1
6850944 MacCall et al. Feb 2005 B1
6868451 Peacock Mar 2005 B1
6870921 Elsey et al. Mar 2005 B1
6886013 Beranek Apr 2005 B1
6892225 Tu et al. May 2005 B1
6892245 Crump et al. May 2005 B1
6904449 Quinones Jun 2005 B1
6904460 Raciborski et al. Jun 2005 B1
6920488 Le Pennec et al. Jul 2005 B1
6925476 Multer Aug 2005 B1
6925477 Champagne et al. Aug 2005 B1
6934767 Jellinek Aug 2005 B1
6944651 Onyon et al. Sep 2005 B2
6944676 Armbruster et al. Sep 2005 B1
6954660 Aoyama Oct 2005 B2
6954783 Bodwell et al. Oct 2005 B1
6959331 Traversat et al. Oct 2005 B1
6963914 Breitbart et al. Nov 2005 B1
6973299 Apfel Dec 2005 B2
6996617 Aiken, Jr. et al. Feb 2006 B1
6996631 Aiken, Jr. et al. Feb 2006 B1
7003555 Jungck Feb 2006 B1
7003668 Berson et al. Feb 2006 B2
7007041 Multer et al. Feb 2006 B2
7010578 Lewin et al. Mar 2006 B1
7016964 Still et al. Mar 2006 B1
7023868 Rabenko et al. Apr 2006 B2
7030730 Zondervan Apr 2006 B1
7035878 Multer et al. Apr 2006 B1
7039656 Tsai et al. May 2006 B1
7051275 Gupta et al. May 2006 B2
7054594 Bloch et al. May 2006 B2
7054952 Schwerdtfeger et al. May 2006 B1
7082476 Cohen et al. Jul 2006 B1
7085817 Tock et al. Aug 2006 B1
7096418 Singhal et al. Aug 2006 B1
7099915 Tenereillo et al. Aug 2006 B1
7103794 Malcolm et al. Sep 2006 B2
7107043 Aoyama Sep 2006 B2
7110954 Yung et al. Sep 2006 B2
7116681 Hovell et al. Oct 2006 B1
7146161 Chou Dec 2006 B2
7162494 Arellano Jan 2007 B2
7167728 Wagner et al. Jan 2007 B1
7181628 Sato et al. Feb 2007 B2
7197574 Ishiyama Mar 2007 B1
7233791 Gilbert et al. Jun 2007 B2
7237027 Raccah et al. Jun 2007 B1
7249175 Donaldson Jul 2007 B1
7269433 Vargas et al. Sep 2007 B2
7284051 Okano et al. Oct 2007 B1
7289964 Bowman-Amuah Oct 2007 B1
7293074 Jellinek et al. Nov 2007 B1
7315826 Guheen et al. Jan 2008 B1
7317907 Linkert et al. Jan 2008 B2
7343568 Jiang et al. Mar 2008 B2
7349719 Buniatyan Mar 2008 B2
7356559 Jacobs et al. Apr 2008 B1
7363233 Levine Apr 2008 B1
7383061 Hawkins Jun 2008 B1
7392034 Westman et al. Jun 2008 B2
7415486 Multer et al. Aug 2008 B2
7440746 Swan Oct 2008 B1
7447743 Jordan, Jr. Nov 2008 B1
7454500 Hsu et al. Nov 2008 B1
7499888 Tu et al. Mar 2009 B1
7505762 Onyon et al. Mar 2009 B2
7519702 Allan Apr 2009 B1
7596609 Refuah et al. Sep 2009 B1
7663652 Reese Feb 2010 B1
20010014893 Boothby Aug 2001 A1
20010028363 Nomoto et al. Oct 2001 A1
20010044805 Multer et al. Nov 2001 A1
20010047471 Johnson Nov 2001 A1
20010051920 Joao et al. Dec 2001 A1
20020007303 Brookler et al. Jan 2002 A1
20020010868 Nakashima et al. Jan 2002 A1
20020016818 Kirani et al. Feb 2002 A1
20020016912 Johnson Feb 2002 A1
20020032751 Bharadwaj Mar 2002 A1
20020040369 Multer et al. Apr 2002 A1
20020049852 Lee et al. Apr 2002 A1
20020055909 Fung et al. May 2002 A1
20020056011 Nardone et al. May 2002 A1
20020059116 Bulatovic et al. May 2002 A1
20020062365 Nishikawa et al. May 2002 A1
20020067816 Bushnell Jun 2002 A1
20020073212 Sokol et al. Jun 2002 A1
20020078075 Colson et al. Jun 2002 A1
20020082995 Christie, IV Jun 2002 A1
20020083325 Mediratta et al. Jun 2002 A1
20020091785 Ohlenbusch et al. Jul 2002 A1
20020116444 Chaudhri et al. Aug 2002 A1
20020120600 Schiavone et al. Aug 2002 A1
20020128908 Levin et al. Sep 2002 A1
20020138582 Chandra et al. Sep 2002 A1
20020138765 Fishman et al. Sep 2002 A1
20020152278 Pontenzone et al. Oct 2002 A1
20020162011 Tanaka et al. Oct 2002 A1
20020168964 Kraft Nov 2002 A1
20030021274 Siikaniemi et al. Jan 2003 A1
20030028451 Ananian Feb 2003 A1
20030028554 Koskimies et al. Feb 2003 A1
20030037020 Novak et al. Feb 2003 A1
20030061163 Durfield Mar 2003 A1
20030065934 Angelo et al. Apr 2003 A1
20030069874 Hertzog et al. Apr 2003 A1
20030084121 De Boor et al. May 2003 A1
20030134625 Choi Jul 2003 A1
20030135463 Brown et al. Jul 2003 A1
20030139172 Lampela et al. Jul 2003 A1
20030204568 Bhargava et al. Oct 2003 A1
20040054746 Shibata Mar 2004 A1
20040093385 Yamagata May 2004 A1
20040120477 Nguyen et al. Jun 2004 A1
20040148408 Nadarajah Jul 2004 A1
20040204120 Jiles Oct 2004 A1
20040224665 Kokubo Nov 2004 A1
20050090253 Kim et al. Apr 2005 A1
20050227674 Kopra et al. Oct 2005 A1
20050240494 Cue et al. Oct 2005 A1
20050273632 Kawakami Dec 2005 A1
20060190626 Bhogal et al. Aug 2006 A1
20060212482 Celik Sep 2006 A1
20070050734 Busey Mar 2007 A1
20080009268 Ramer et al. Jan 2008 A1
20080022220 Cheah Jan 2008 A1
20080039020 Eskin Feb 2008 A1
Foreign Referenced Citations (43)
Number Date Country
1202662 Dec 1998 CN
1455522 Nov 2003 CN
1313697 Feb 2005 CN
0801487 Oct 1997 EP
0836131 Apr 1998 EP
0836301 Apr 1998 EP
0924917 Jun 1999 EP
0930593 Jul 1999 EP
1024441 Feb 2000 EP
0986225 Mar 2000 EP
1139608 Oct 2001 EP
1180890 Feb 2002 EP
1263244 Apr 2002 EP
2366050 Jun 2001 GB
10191453 Jul 1998 JP
11242620 Sep 1999 JP
11242677 Sep 1999 JP
WO 9704391 Feb 1997 WO
WO 9739564 Oct 1997 WO
WO 9741520 Nov 1997 WO
WO 9803005 Jan 1998 WO
WO 9821648 May 1998 WO
WO 9829994 Jul 1998 WO
WO 9854662 Dec 1998 WO
WO 9856159 Dec 1998 WO
WO 9905813 Feb 1999 WO
WO 9906900 Feb 1999 WO
WO 9936870 Jul 1999 WO
WO 9940514 Aug 1999 WO
WO 9945451 Sep 1999 WO
WO 9945484 Sep 1999 WO
WO 9946701 Sep 1999 WO
WO 9950761 Oct 1999 WO
WO 9965256 Dec 1999 WO
WO 0011832 Mar 2000 WO
WO 0016222 Mar 2000 WO
WO 0029998 May 2000 WO
0133874 May 2001 WO
WO 0171539 Sep 2001 WO
WO 0180535 Sep 2001 WO
0217140 Feb 2002 WO
03-083716 Oct 2003 WO
WO 2005112586 Dec 2005 WO