Invented by Babak Rezvani, Edward B. Kalin, Jack L. Chen, Reza Jalili, Google LLC
The Market For Functionality Inoperable Without Node Registered At Remote Location
Who is the market for Functionality inoperable without node registered at remote location?
The market for functionalities that cannot be registered at a remote location includes computer users, software developers and database administrators who frequently deal with files on a daily basis. They require the capability of writing and reading data in various file formats such as JSON, CSV and Excel; they may need to transfer these files between one file system and another or access data from different directories. They require solutions which are fast, user friendly and secure; additionally they want devices which allow them to view all or some events, store active and cleared tasks and date/time stamp all stored transactions.
What are the benefits of Functionality inoperable without node registered at remote location?
The market for functionalities that cannot be operated without a node registered at remote location encompasses various applications, such as telecommunications, information processing, and the Web. Technological advances are driving this growth by speeding up communication processes and reducing costs through end-to-end digital communications.
Telecommunications refer to the hardware and software that send messages over telephone lines, radio frequencies or other high-speed transmission channels. This technology has applications across many sectors of industry and commerce, enabling various functions like data collection, communication between people and firms as well as coordination among them.
In the past, telecommunications relied on analog circuitry and modems; however, these technologies are rapidly being replaced by digital systems that use high-speed digital transmission. With these new innovations, billions of bits per second will be transmitted digitally – much faster than what could be delivered using analog communications systems.
Digital transmission systems in telecommunications help bypass the bottleneck caused by modem-based communications by sending messages at high speeds over various high-speed links, including fiber optics. This increased speed should enable more information to be delivered quickly, making telecommunications more flexible, reliable, and efficient overall.
Telecommunications provide services that enable organizations to operate more efficiently by organizing employee interactions within the firm and customer relationships. Examples include web telecommunications, electronic transactions, supply chains restructuring and distribution network restructuring.
Information Processing refers to the hardware and software systems responsible for processing messages sent over a wide area network (WAN). It encompasses various dumb terminals with no or limited processing capacity as well as intelligent terminals like personal computers that do have this capacity.
These devices are typically connected via a local area network (LAN), providing high-speed communication between processors within the same building or on campus. LANs also enable users to share facilities (peripherals) connected to the LAN, such as secondary storage devices and database and applications software.
What are the disadvantages of Functionality inoperable without node registered at remote location?
The disadvantage of functionalities that cannot be activated without a node registered at a remote location is that it provides no reliable means for communication with other nodes on the network. If an error is made when updating certificate and key, a node may remain unable to establish new connections and thus fail to recover from an outage or restart.
A network is an interconnected collection of computer hardware, software, and telecommunications equipment that transmits data for information transfer, services delivery, and communication. It includes the Internet, value-added networks (VANs), electronic markets and supply chains. A range of functions are supported by this infrastructure: finding information quickly; providing it to others efficiently; negotiating transactions quickly; as well as guaranteeing data integrity.
Five OSI layers make up a network: layer 1, the communications layer, which provides protocols and services to communicating applications; layer 2, the application layer; layer 3, the session layer; and layer 4, routing and addressing. Each level serves to establish, maintain, and terminate connections (sessions) between two programs running on different nodes.
TCP and IP are two protocols used to connect computers across the Internet. TCP manages the higher-level function of creating and maintaining a connection, while IP ensures all packets are routed through appropriate nodes.
Many organizations rely on telecommunications networks for communication among their members and to enable disparate hardware and software to work together. These links utilize fast local area network (LAN) and wide area network (WAN) links, each with its own communication rules and protocol.
Frame relays, a type of telecommunications network, transmit very short fixed-length packets (known as cells) across fast LANs or WANs. Frame relays can be implemented in either hardware or software and enable two LANs to exchange messages using similar protocols and routing rules.
Circuit switching is a type of telecommunications network that utilizes long, on/off pulses to transfer data. It requires time-consuming processing at both transmitting and receiving nodes to verify each packet for errors, leading to high transmission delays.
The Google LLC invention works as followsSystems and methods to provide registration at remote sites that may include, for instance, a monitoring module which may communicate with remote sites. The monitoring module and remote site may use a registration protocol to generate the messages that are sent during registration. Monitoring modules may collect and generate identification information that can be used in registration protocol messages. The monitoring module may store the registration information at the remote site in a database server that has a database. The monitoring module may send a confirmation message to the remote site. This may acknowledge or report a successful registration.
Background for Functionality inoperable without node registered at remote location
This invention is about systems and methods to register devices at remote locations, and more specifically, it is about systems and methods to automatically register devices at remote places. A user may access remote sites to manage the registered devices.
Much of the technology of today is controlled remotely. The equipment must be registered at remote locations before it can be used.
Cell phones, for example, must be registered with a cell phone service provider before they can be used. Although users can purchase cellular phones in stores, the phones will not work if they haven’t been activated by the cellular provider. The activation process involves the retailer or the user providing specific information about the user and their cellular phone to a service provider. Most users register their cellular phones by calling the service provider, providing the registration information via a separate telephone, or by submitting electronic forms to the service provider (e.g. using a modem/modem connection). The human interaction is an added risk in both cases. These procedures require a lot of time.
It is, therefore, the object of this invention to provide improved methods and systems for remotely registering devices.
This and other objects are achieved in accordance to the principles of this invention by providing an automated registration system with monitoring modules that communicate with remote locations. The monitoring modules can interface with devices at different locations.
One or more monitoring module and their associated interfaced devices” “Installations” may also be used to refer to the associated interfaced devices. Devices can include video cameras, still cameras and motion sensors as well as audible detectors. Monitor modules can be used as standalone devices or software applications. Monitoring modules can communicate with remote sites using any communication protocol. To transmit registration information, remote sites and monitoring modules may use a registration protocol. The registration information could be stored at the remote site in a database. The registration protocol could be a subset the communication protocol between monitoring modules and remote sites.
An installation, one of its components or both, may be associated to a specific user account. Any suitable entity can be an account holder, including a person, corporate entity, family, government entity, or any other entity that is capable of maintaining an account.
Remote sites may be able to associate an installation, elements or both with the corresponding user accounts. Remote sites may associate the installation with any database construct that can cross-reference it, the installation elements, or both, and user accounts. Any suitable relational database schema may be used with the appropriate keys.
Monitoring module identifications may be assigned to or generated globally. This includes a corresponding password, model identification codes, transaction identification and a unique global monitoring module identification. Any devices connected to the monitoring module can be detected automatically. The monitoring module can obtain any useful or necessary data from the device in order to register the devices. The remote site may receive the identification information and the device information via the communications network.
Remote sites can include any computer-based server, or combination of servers, such as web servers and database servers. Remote sites may use any protocol that is compatible with the installation’s monitoring modules. Installations and remote sites can exchange registration messages over the Internet using HTTP. This may be done by the web server at remote site. Over a communications network. API functions allow servers, such as web servers and database servers to interact.
Remote sites may validate the registration protocol messages received. The registration information may be stored on the server’s database if there are no errors in the registration messages or if the errors can be corrected by the remote site. An installation may receive a confirmation message. It may contain either an ACK code that indicates successful registration or a NAK number that may indicate an unsuccessful registration.
A monitoring module can detect devices automatically. Any method of automatic detection can be used. A monitoring module might send a handshake signal through its interface ports. A response from the monitoring module may indicate that a device has been detected at the port where it was received. Another option is to use a specific pin on the interface port to indicate whether power is being sent through that port (i.e. to power a device). The monitoring module might deduce, for example, that a device has been connected to that port by observing the pin’s value. Another option is to have the monitoring module detect specific devices proactively. For example, a user might press a button on a device that will cause it to send a message to the monitoring module. This would alert the monitoring module to its presence.
Virtual representations of devices can be registered in one embodiment of the invention. Virtual representations may consist of resources which can be in turn made up components. The state of a component in a physical device may be indicated by components. You can use components to modify the state of a physical device component. Users who have the authorization to access virtual representations of devices can view them. These users could be users associated with the account with which the corresponding virtual representations (or devices) are also associated.
New devices and monitoring modules can be added to registered installations and automatically detected by an object discovery process. The registered monitoring modules, remote sites, and any other element of the automated registration system can be used to discover new objects. You can conduct the new object discovery on a regular basis or on an ongoing basis. The new object discovery may not have to be performed automatically, but it can be initiated by the user (e.g. through simple software or hardware manipulation).
FIG. “FIG. 1” shows an illustrative system 10, in accordance to the present invention. This is an example of a client-server based embodiment according to the present invention. System 10 could include an installation 12 as well as a remote site 14, which may be connected via a communication network 16. Although there could be multiple remote sites 14 and 12 in practice, only one is shown to avoid complicating the drawing. Any remote site 14 can include any equipment, such as mainframes, servers, personal computers, and any other computer-based equipment. Remote site 14 could include any number of computers that can be connected in any way. This includes, for instance, a local area network or wide area network, telephone network or cable television network, Intranet or Internet. Any suitable communication network 16 could include a local area network or wide area network as well as a telephone network, cable television network or Intranet. Wireless communication networks that are suitable for use include the global system of mobile communications (GSM), code-division multi access (CDMA), Bluetooth or other suitable wireless networks. Remote site 14 and installation 12 can communicate using any protocol or protocol stack over the communications network 16. Installation 12 and remote site 14 can communicate, for example, via a transmission protocol/Internet protocol environment (TCP/IP), using IP version 4 (or IP version 6, which supports 128-bit network address) and a hypertext transport protocol (HTTP). Another approach is to use universal plug-and-play (UPnP), technology to allow communication between remote sites 12 and 14. You can use any suitable request-response protocol, socket-based packet transport stack or peer-to-peer communication approach.
Installation 12 can be managed by a local user. Installation 12 can include one or more nodes. FIG. FIG. 1 shows an approach with two nodes: the first user node 18, and the second user node 20, respectively. Nodes 18 and 20, however, may only be found at one location such as the user’s primary residence. Nodes can be placed in more than one place if desired. One node could be located in the user’s primary residence, while another may be at their vacation home.
In one embodiment, the user node 18 could include a client device 22, which may be connected to a communications network 16. Internet-based approaches such as the one shown in FIG. Client device 22 can be connected to the Internet via ISP 23. Any device that can communicate with remote site 14 via a communications network 16 may be referred to as client device 22. Client device 22 could be, for example, a computer, personal digital assistant (PDA), terminal, set-top box or other device that allows remote site access via the communications network 16. Client device 22 could include, for instance, an Internet browser application which can be used to access websites via the communications network 16. Client device 22 could also run client applications that provide locally generated displays, which can be transmitted using any client-server or peer to-peer scheme.
Client device 22 can communicate with ISP 23 directly or with communications network 16 via any appropriate communications link. The link could include a telephone dial up link, digital subscriber line (DSL), a cable modem (e.g. a data over Cable Service Interface Specification (DOCSIS),) or a satellite link to a computer network (e.g. Ethernet link, T1 link, etc.). Any other communications link, or combination thereof.
Remote site 14 could include one or more servers, such as web server 46 and 48. Database server 48 may maintain database 58. Remote site 14 can also include an application server, and any other server or combination thereof, if it is possible. The term “server” is used herein. The term “server” does not necessarily refer to hardware or software, but can also include software applications or combinations of hardware and software. One computer might have software that allows it to be both a webserver and a database server.
Remote site 14 might provide definitions or displays to client device 22 in some cases. FIG. For example, web server 46 could generate dynamic and static web pages using data from database server 48. A user may view web page 47 using Internet browser 26 on a client device 22.Click here to view the patent on Google Patents.