Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2004-05-12
2010-12-07
Neurauter, Jr., George C (Department: 2443)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
C709S204000
Reexamination Certificate
active
07849203
ABSTRACT:
Provided is a method and apparatus for virtualizing access to resources in a distributed peer-to-peer (P2P) network. Specifically, a resource locally managed by a peer in the P2P network can be published such that other peers can identify the peer managing the resource. Any peer requesting access to the resource of another peer establishes communication to the peer managing the resource. After establishing communication, a proxy of the peer managing the resource can establish a proxy interface. The proxy interface operating on the peer requesting access, permits the peer requesting access to generate command and control data to control the resource. Thus, the peer requesting access believes that it manages the local resource, while in reality, the peer requesting access only has virtualized access to the resource.
REFERENCES:
patent: 6671284 (2003-12-01), Yonge et al.
patent: 6981047 (2005-12-01), Hanson et al.
patent: 7275102 (2007-09-01), Yeager et al.
patent: 2003/0154306 (2003-08-01), Perry
patent: 2004/0148434 (2004-07-01), Matsubara et al.
patent: WO 01/86423 (2001-11-01), None
Unknown,“Jini Architectural Overview” Technical White Paper, XP-002217546, pp. 1-3, 7-10, 15, 1999, Sun Microsystems.
Hessing, “Peer to Peer Messaging Protocol(PPMP)”, Apr. 2002, © The Internet Society, XP015001173.
Li et al., “Research of Peer-to-Peer Network Architecture”, pp. 312-315, Proceedings of ICCT2003, vol. 1, Apr. 9, 2003, XP010643597, Nat'l High Tech. Dev. 863 Program of China, 2001-AA-11-1-141.
Boggs, Jr., “Bit-String Resource Allocation Mechanism”, pp. 1667-1669, XP-002299945, NN 76101667, IBM Tech. Disclosure Bulletin, vol. 19, No. 5, Oct. 1, 1976, New York.
Hsiao et al., “A Tree Model for Structured Peer-to-Peer Protocols”, pp. 336-343, 3rdIEEE/ACM Int'l Symp. on Cluster Computing and the Grid (CCGRID'03), May 12, 2003, XP010639769, IEEE, Dept. of Computer Science, Taiwan.
Hsiao et al., “Tornado: A Capability Aware Peer-to-Peer Storage Network”, Apr. 22, 2003, pp. 72-79, XP010645600, IEEE Computer Society.
Rhea et al., “Probabilistic Location and Routing”, pp. 1248-1257, vol. 1 of 3, XP010593691, conf. 21, (Jun. 23, 2002), IEEE Infocom 2002, Conf. On Communications Jun. 23-27, 2002, New York.
Bates John Paul
Berkey Howard
Corson Greg
Fearer Mark D
Martine & Penilla & Gencarella LLP
Neurauter, Jr. George C
Sony Computer Entertainment Inc.
LandOfFree
Command and control of arbitrary resources in a peer-to-peer... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Command and control of arbitrary resources in a peer-to-peer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Command and control of arbitrary resources in a peer-to-peer... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4221157