Connecting computer processing systems and transmitting data

ABSTRACT

Examples described herein provide a computer-implemented method that includes establishing, by a second processing system, a first connection with a first processing system. The method further includes receiving, by the second processing system, a first postcard from the first processing system via the first connection, the first postcard comprising information associated with the first processing system. The method further includes establishing, by the second processing system, a second connection with a third processing system. The method further includes transmitting, by the second processing system, a second postcard to the third processing system via the second connection, the second postcard comprising information associated with the second processing system. The method further includes transmitting, by the second processing system, the first postcard to the third processing system via the second connection.

BACKGROUND

The present invention generally relates to computer processing systems,and more specifically, to connecting computer processing systems andtransmitting data.

Computer processing systems (or simply “processing systems”) come inmany forms, such as laptops, desktops, smartphones, tablet computers,wearable computing devices, smart displays, and the like. Theseprocessing systems can include, for example, sensors, displays,memories, processors, data storage devices, and communicationinterfaces. The communication interfaces enable two or more processingsystems to communicate with one another by transmitting and receivingdata between/among them. For example, two processing systems can form adirect wired and/or wireless communicative link and can transmit datafrom one processing system to the other processing system. As anotherexample, two or more processing systems can form a network thatfacilitates transmitting and receiving data between or among the two ormore processing systems.

SUMMARY

Embodiments of the present invention are directed to connecting computerprocessing systems and transmitting data.

A non-limiting example computer-implemented method for establishing dataconnections between a plurality of processing systems includes assigningeach of the plurality of processing systems to one of a plurality ofgroups. Each group of the plurality of groups cycles, based on an offsettime period, between an advertiser state, a listener state, and a sleepstate. The method further includes connecting a first processing systemof a first group of the plurality of groups to a second processingsystem of a second group of the plurality of groups when the first groupis in one of the listener state or the advertiser state and the secondgroup is in the other of the listener state or the advertiser state.

A non-limiting example computer-implemented method for exchanging databetween a plurality of processing systems includes converting, by afirst processing system, a binary data stream into a string usingencoding. The method further includes advertising, by the firstprocessing system, standard characteristics to a second processingsystem. The method further includes receiving, by the first processingsystem, a request from the second processing system for a payload sizeand payload characteristics for the data to be transmitted from thefirst processing system to the second processing system. The methodfurther includes transmitting, by the first processing system, thepayload size and the payload characteristics to the second processingsystem.

A non-limiting example computer-implemented method includesestablishing, by a second processing system, a first connection with afirst processing system. The method further includes receiving, by thesecond processing system, a first postcard from the first processingsystem via the first connection, the first postcard comprisinginformation associated with the first processing system. The methodfurther includes establishing, by the second processing system, a secondconnection with a third processing system. The method further includestransmitting, by the second processing system, a second postcard to thethird processing system via the second connection, the second postcardcomprising information associated with the second processing system. Themethod further includes transmitting, by the second processing system,the first postcard to the third processing system via the secondconnection.

Other embodiments of the present invention implement features of theabove-described method in computer systems and computer programproducts.

Additional technical features and benefits are realized through thetechniques of the present invention. Embodiments and aspects of theinvention are described in detail herein and are considered a part ofthe claimed subject matter. For a better understanding, refer to thedetailed description and to the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The specifics of the exclusive rights described herein are particularlypointed out and distinctly claimed in the claims at the conclusion ofthe specification. The foregoing and other features and advantages ofthe embodiments of the invention are apparent from the followingdetailed description taken in conjunction with the accompanying drawingsin which:

FIG. 1 depicts a block diagram of processing systems according to one ormore embodiments described herein;

FIG. 2A depicts a block diagram of an environment of groups ofprocessing systems that can establish connections according to one ormore embodiments described herein;

FIG. 2B depicts a block diagram of an environment of groups ofprocessing systems that can establish connections according to one ormore embodiments described herein;

FIG. 3 depicts a flow diagram of a method for establishing dataconnections between a plurality of processing systems according to oneor more embodiments described herein;

FIG. 4A depicts a timing diagram according to one or more embodimentsdescribed herein;

FIG. 4B depicts a timing diagram according to one or more embodimentsdescribed herein;

FIG. 5A depicts a sequence diagram of unidirectional communicationbetween a first processing system and a second processing systemaccording to one or more embodiments described herein;

FIG. 5B depicts a sequence diagram of bidirectional communicationbetween a first processing system and a second processing systemaccording to one or more embodiments described herein;

FIG. 6 depicts a flow diagram of a method for exchanging informationbetween processing systems using a generic transport protocol accordingto one or more embodiments described herein;

FIGS. 7A-7F depict block diagrams of mesh-based communication fortransmitting postcards between processing systems according to one ormore embodiments described herein;

FIG. 8 depicts a block diagram of mesh-based communication fortransmitting postcards between processing systems and a cloud computingenvironment according to one or more embodiments described herein;

FIG. 9 depicts a flow diagram of a method for mesh-based communicationfor transmitting postcards between processing systems according to oneor more embodiments described herein;

FIG. 10 depicts a cloud computing environment according to one or moreembodiments described herein;

FIG. 11 depicts abstraction model layers according to one or moreembodiments described herein; and

FIG. 12 depicts a block diagram of a processing system for implementingthe presently described techniques according to one or more embodimentsdescribed herein.

The diagrams depicted herein are illustrative. There can be manyvariations to the diagrams or the operations described therein withoutdeparting from the scope of the invention. For instance, the actions canbe performed in a differing order or actions can be added, deleted ormodified. Also, the term “coupled” and variations thereof describehaving a communications path between two elements and do not imply adirect connection between the elements with no interveningelements/connections between them. All of these variations areconsidered a part of the specification.

DETAILED DESCRIPTION

One or more embodiments of the present invention provide techniques forconnecting computer processing systems and transmitting data. As oneexample, the techniques described herein facilitate connecting twoprocessing systems with limited or no user interaction, transmitting ageneral purpose data stream (referred to herein as a “postcard”) overthe connection between the two processing systems, and then sharing thepostcard with other processing systems and/or a cloud computingenvironment.

One example implementation of the present techniques can be useful inthe event of an emergency or natural disaster type situation. Forexample, in many emergency or natural disaster situations, people needthe ability to communicate, such as to let others know their locationand whether they are safe. Conventional solutions to this problem relyon fixed communications infrastructure (i.e., cellular network,Internet, etc.) and a manual action taken by the user (e.g., sending amessage, making a phone call, etc.). This infrastructure can fail ordestabilize due to loss of power, physical damage to equipment, towers,or cabling and the like. If a typical communications network isunavailable or a person is unable or chooses not to take action tocommunicate, others may not be able to determine the whereabouts of theperson and/or his or her condition.

In such emergency or natural disaster type situations, the presenttechniques enable two processing systems to connect and exchangeinformation without user action. The information can be relayed to otherprocessing systems and/or to a cloud computing environment.

With so many interconnected processing systems, from smartphones toInternet of Things (IoT) devices, it may be desirable for them toconnect to one another easily and efficiently. It may also be desirableto reduce user interaction that is needed for establishing suchprocessing systems so that the connection can occur without userinteraction. Conventional processing systems tend to use a random schemeof listening and advertising to attempt to connect to one another. Whentwo processing systems are in alternating states, one in a “listenerstate” and the other in an “advertiser state,” the two processingsystems can detect each other and can attempt to create a connection.However, if the devices are operating in the same state at the sametime, they are unable to connect. For example, if two processing systemsare both operating in “listener states,” then the processing systems areunable to connect.

Traditionally, it can be very difficult for processing systems toconnect without any user interaction. For example, processing systemsthat are changing states too quickly may not have enough time to createa connection. Autonomous roaming mobile processing systems may beattempting to create connections with other such processing systems butare not in alternating signals long enough because they switch too soondue to randomization. Processing systems also need to conserve power sothat they do not die and need to be recharged. The power consumptionused during the advertising and listening states can be significant ifused continuously without a break. Conventionally, a sleep state can beused to reduce power consumption. However, this approach can beproblematic because one processing system may be in the sleep state (notin either of the advertiser or listener states) while another processingsystem is attempting to connect by operating in one of the advertiser orlistener states. This can prevent processing systems from connecting.

To address these issues of conventional approaches for connectingprocessing systems, a technique for connecting processing systemswithout user interaction using offset time period groupings is describedherein. In particular, the techniques described herein create groupsthat cycle between the listener state and the advertiser state atdifferent offset time periods. These offset time periods are assigned togroups. Processing systems are randomly assigned to a group so that theyare able to connect to the processing systems in the other group(s).After listening or broadcasting/advertising for a connection time, theprocessing systems go into a sleep state to conserve energy. Theprocessing systems can be reassigned to other groups, such as after apredetermined amount of time, number of cycles, number of successfulconnections, randomly, etc. This enables these processing systems thatwere in the same group to potentially connect. In some examples,processing systems can be assigned a random seed. Processing systemswith the same random seed maintain the same group assignments, therebypreventing processing systems with the same random seeds from connectingto one another.

The above-described aspects address at least some of the shortcomings ofthe prior art by providing a greater ability for processing systems toconnect to one another without needing any user input/interaction afteran initial timing is set for the offset time period. Further, thetechniques described herein conserve energy for the processing systemsby selectively using sleep states, such as after everylistener/advertiser state cycle. With each of the processing systems onthe same schedule, they do not waste energy advertising or listeningunnecessarily (i.e., at times where other processing systems are notalso listening or advertising).

FIG. 1 depicts a block diagram of processing systems 101, 102 accordingto one or more embodiments described herein. The processing systems 101,102 can be any suitable type of computing processing system, such as theprocessing system 1200 of FIG. 12, and can have one or more of thecomponents described regarding the processing system 1200, such as aprocessing device, a memory, and the like.

It may be desirable to establish a connection 130 between the processingsystems 101, 102 to enable data to be transmitted from the processingsystem 101 to the processing system 102 (shown by the arrow 131) and toenable data to be transmitted from the processing system 102 to theprocessing system 101 (shown by the arrow 132). Establishing such aconnection traditionally requires user interaction (i.e., interaction bya user or users of the processing systems 101 and/or 102). However, somecommunications protocols do not require such user interaction, such asBluetooth Low Energy (BTLE).

The processing systems 101, 102 can be in different operating states(i.e., modes), including an advertiser state, a listener state, and asleep state. For example, the processing system 101 can be in one of anadvertiser state 111, a listener state 112, or a sleep state 113.Similarly, the processing system 102 can be in one of an advertiserstate 121, a listener state 122, or a sleep state 123.

In order to establish the connection 130 between the processing systems101, 102, one of the processing systems 101, 102 advertises (i.e.,broadcasts) information about itself while in the advertiser state forother processing systems that are in a listener state to detect. Forexample, if the processing system 101 is in the advertiser state 111 andthe processing system 102 is in the listener state 122, the processingsystem 101 can advertise/broadcast information that is detected andreceived by the processing system 102 to enable the connection 130 to beestablished. In the context of BTLE, the information that isadvertised/broadcast can be in the form of a packet having a preamble,an access address, a data unit having a header and payload, and a cyclicredundancy check value.

In some examples, processing systems are assigned to groups that cyclebetween the listener state and the advertiser state at different offsettime periods. FIGS. 2A and 2B depict examples of such groups.Particularly, FIG. 2A depicts a block diagram of an environment 200A ofgroups of processing systems that can establish connections according toone or more embodiments described herein. In this example, three groupsare implemented: group A 211, group B 212, and group C 213.

Each of the groups A 211, B 212, C 213 have processing systems assignedthereto. As depicted in FIG. 2A, the group A 211 has the processingsystem 101 of FIG. 1 as well as processing system 203 assigned thereto.Similarly, the group B 212 has processing systems 204, 205, 206 assignedthereto. The group C 213 has the processing system 102 of FIG. 1 andprocessing system 207 assigned thereto.

FIG. 2B depicts a block diagram of an environment 200B of groups ofprocessing systems that can establish connections according to one ormore embodiments described herein. In this example, three groups areimplemented: group A 211, group B 212, group C 213, and group D 214.

Each of the groups A 211, B 212, C 213, D 214 have processing systemsassigned thereto. The groups A 211, B 212, C 213 have the processingsystems assigned as depicted in FIG. 2A, while the group D 214 hasprocessing systems 208, 209, 210 assigned thereto.

It should also be appreciated that the processing systems 101, 102,203-210 depicted in FIGS. 2A and 2B can also establish a connection witha cloud computing node 10 in a cloud computing environment 50, which arefurther described herein.

In the example of FIG. 2A, each of the groups A 211, B 212, C 213 are inthe range of each other and thus their respective processing systems canconnect to one another. However, in another example, as shown in FIG.2B, the processing systems 101, 203 of the group A 211 are not in rangeof the processing systems 102, 207 of the group C 213. In such cases,mesh networking techniques can be used to send information, such as apostcard, between the processing systems of groups A 211, C 213 via theprocessing systems of the groups B 212, D 214 and/or via the cloudcomputing environment 50.

The groups A 211, B 212, C 213, D 214 and their respective processingsystems 101, 102, 203-210 depicted in FIGS. 2A and 2B are now describedfurther with reference to FIGS. 3, 4A, and 4B.

FIG. 3 depicts a flow diagram of a method 300 for establishing dataconnections between a plurality of processing systems according to oneor more embodiments described herein. The method 300 can be implementedby any suitable processing system (e.g., the processing systems 101, 102of FIG. 1 or FIG. 2; any of the processing systems 203-207, 215-217 ofFIGS. 2A, 2B; the processing system 1200 of FIG. 12; etc.), any suitableprocessing device (e.g., the processing device 1221 of FIG. 12), and/orthe like including combinations thereof.

At block 302, each of the plurality of processing systems (e.g., theprocessing systems 101, 102, 203-207) is assigned to one of a pluralityof groups (e.g., the group 211, group B 212, group C 213). One suchexample having three groups is depicted in FIG. 2A, in which theprocessing systems 101, 203 are assigned to group A 211, the processingsystems 204-206 are assigned to group B 212, and the processing systems102 and 207 are assigned to group C 213. As another example having fourgroups as depicted in FIG. 2B, the processing systems 101, 203 areassigned to group A 211, the processing systems 204-206 are assigned togroup B 212, the processing systems 102 and 207 are assigned to group C213, and the processing systems 208-210 are assigned to group D 214.Each of the plurality of groups cycles, based on an offset time period,between states, which include an advertiser state (e.g., the advertiserstate 111, 121 of FIG. 1), a listener state (e.g., the listener state112, 122 of FIG. 1), and a sleep state (e.g., the sleep state 113, 123of FIG. 1). While in the listener state, a processing system listens foradvertisements sent by a processing system in the advertiser state.While in the sleep state, the processing system does not advertise orlisten. In some examples, in the sleep state, the processing systempartially or wholly shuts/powers down or disables a communicationinterface (e.g., the network adapter 1226 of FIG. 12).

Each of the processing systems assigned to a group cycles through theadvertiser, listener, and sleep states based on an offset time period.That is, during a first cycle of the offset time period, each processingsystem assigned to a group is in one of the advertiser, listener, orsleep states; during a second cycle of the offset time period, eachprocessing system assigned to the group is in another one of theadvertiser, listener, or sleep states.

At block 304, a first processing system of a first group of theplurality of groups connects to a second processing system of a secondgroup of the plurality of groups when the first group is in one of thelistener state or the advertiser state and the second group is in theother of the listener state or the advertiser state. The followingexample of such connection is described with reference to theenvironment 200A of FIG. 2A. In this example, during a first cycle ofthe offset time period (that is, during a first period of time equal tothe offset time period), the processing systems 101, 203 of the group A211 are in an advertiser state, the processing systems 204, 205, 206 ofthe group B 212 are in the advertiser state, and the processing systems102, 207 of the group C 213 are in the listener state (see FIG. 4A).During this first cycle, the processing systems 101, 203 of the group A211 and the processing systems 204-206 of the group B 212 can attempt toconnect to the processing systems 102, 207 of the group C 213. Once aconnection is established between two processing systems (one being fromthe group A 211 and the other being from the group B 212), the connectedprocessing systems can communicate by transmitting/receiving data.

Once the first cycle of the offset time period has concluded, a secondcycle of the offset time period begins, and the processing systems 101,102, 203-210 of the groups A 211, B 212, C 213 change states. In anexample, each of the processing systems 101, 102, 203-207 of the groupsA 211, B 212, C 213 enter the sleep state during the second cycle of theoffset time period (see FIG. 4A). As another example, the processingsystems 101, 102 of the group A 211 change from the advertiser state tothe listener state; the processing systems 204-206 of the group B 212change from the listener state to the sleep state; and the processingsystems 102, 207 of the group C 213 change from the sleep state to theadvertiser state.

In some examples, the processing systems of multiple groups can be inthe same state. For example, as shown in the timing diagrams 400A, 400Bof FIGS. 4A and 4B respectively, some groups can have processing systemsin the advertiser state while another group (or groups) are in thelistener state during a first cycle of the offset time period. Then,during a second cycle of the offset time period, the groups ofprocessing systems are all in the sleep state. For example, in FIG. 4Aand relating to the environment 200A of FIG. 2A, during a first cycle ofthe offset time period, the processing systems of groups A and B (e.g.,the groups A 211, B 212) are in the advertiser state (shown as a valueof “1”) and the processing systems of group C (e.g., the group C 213) isin the listener state (shown as a value of “−1”). Then, during a secondcycle of the offset time period, all of the processing systems of groupsA, B, C are in the sleep state (shown as a value of “0”). During a thirdcycle of the offset time period, processing systems in the group A 211are in the advertiser state while processing systems in the groups B andC are in the listener state.

As another example, as shown in FIG. 4A and relating to the environment200B of FIG. 2B, during a first cycle of the offset time period, theprocessing systems of groups A, B, and D (e.g., the groups A 211, B 212,D 214) are in the advertiser state (shown as a value of “1”) and theprocessing systems of group C (e.g., the group C 213) is in the listenerstate (shown as a value of “−1”). Then, during a second cycle of theoffset time period, all of the processing systems of groups A, B, C, Dare in the sleep state (shown as a value of “0”). During a third cycleof the offset time period, processing systems in the groups A and D arein the advertiser state while processing systems in the groups B and Care in the listener state.

With continued reference to FIG. 3, the offset time period of block 302can be calculated based on an estimated amount of time that it takes tocreate a connection, referred to as T_(c) or “connection time.” That is,the offset time period is set to be longer than the connection time. Insome examples, the processing systems assigned to an even-numbered group(e.g., the groups B 212, D 214) are in the advertiser state during afirst offset time period cycle, and the processing systems assigned toodd-numbered groups (e.g., the groups A 211, C 213) are in the listenerstate during the first offset time period. In some examples, every othercycle, the processing systems transition into the sleep state; however,in some examples, the processing systems can be in the sleep state formultiple consecutive cycles (e.g., two or more cycles in a row). Theprocessing systems then switch from listener state to advertiser state(or advertiser state to listener state) every second cycle, as shown inthe timing diagrams 400A, 400B.

In some examples, a random number is assigned to each of the processingsystems 101, 102, 203-210 to determine to which group they are assigned.By giving two (or more) processing systems the same random seed value,they can be kept in the same groups and not create connections to oneanother. Processing systems can be synchronized using a base time sothat they are advertising (or listening) together. Any new processingsystem that is introduced or powered on would be able to synchronizewith its group based on the randomly assigned value and based on thetiming from the base time. After a predetermined period of time or apredetermined number of cycles, the processing systems can be assignedto new groups so that new connections can be formed. For example, every30 cycles, the processing systems can be reassigned. In some examples,the reassignment is based at least in part on how many groups and howmany processing systems are in an environment.

With continued reference to FIG. 3, additional processes also may beincluded. For example, the method 300 can further include, subsequent toconnecting the first processing system to the second processing system,transmitting data from the first processing system to the secondprocessing system. In such examples, the data is transmitted from thefirst processing system to the second processing system via BluetoothLow Energy. It should be understood that the process depicted in FIG. 3represents an illustration, and that other processes may be added orexisting processes may be removed, modified, or rearranged withoutdeparting from the scope of the present disclosure.

Once two processing systems (e.g., the processing systems 101, 102) haveconnected, the processing systems can exchange information (i.e.,transmit/receive data) as shown in FIG. 1 and as described herein. Asdescribed herein, it can be useful to exchange information betweenprocessing systems in emergency or natural disaster type situations. Thepresent techniques provide for exchanging such information between two(or more) processing systems using a generic transport protocol thatoperates on top of BTLE.

A conventional approach to communicating in emergency or naturaldisaster type situations utilizes mesh networking. For example, a Meshnetwork can be based on a common wireless protocol available to manyprocessing systems within a given population. Mesh networks rely on manyindividual nodes that route messages through each other in an ad-hocmanner until the message reaches its intended recipient. One suchexample of a commonly available wireless protocol is Bluetooth. Giventhat processing systems with Bluetooth wireless technology are pervasivein today's society, it makes sense to deploy such a network usingBluetooth. However, as described herein, such approaches, includingBluetooth, typically require user interaction to connect and exchangeinformation. Bluetooth Low Energy, unlike traditional Bluetooth, allowsfor connections between processing systems to be made without manuallypairing those processing systems, such as using the techniques describedherein.

By design, the BTLE architecture is only intended to transfer very smallpackets (i.e., about 20 bytes) of structured data. The size limit andforced data structure of the BTLE architecture are not well suited foruse as a general purpose data stream where the type of data and the sizecan vary. Although conventional Bluetooth would allow for data streamsof arbitrary format and size, a manual pairing process or manualexchange of physical/virtual BTLE MAC addresses is required. Thisapproach is unsuitable as it requires significant user involvement forevery connection made and is not able to be automated.

The present techniques provide a generic transport protocol thatoperates on top of BTLE. This new protocol uses Base64 encoding, forexample, and segmenting to transport a general purpose data streamacross a standard BTLE characteristic.

According to one or more embodiments described herein, a standard BTLEcharacteristic is defined as follows:

Name Size (bytes) Data type Characteristic Type PayloadSize 4 IntegerRead Payload 20 String Read

FIG. 5A depicts a sequence diagram 500A of unidirectional communicationbetween a first processing system (e.g., the processing system 101) anda second processing system (e.g., the processing system 102) accordingto one or more embodiments described herein. In this example, theprocessing system 101 is operating in the advertiser state, and theprocessing system 102 is operating in the listener state.

The processing system 101, operating as BTLE server (referred to simplyas “server”) in the advertiser state, first converts a binary datastream (e.g., “01101110”) into a string using encoding such as Base64 oranother suitable encoding technique. Then the server advertises thestandard BTLE characteristics described herein (arrow 502). Theprocessing system 102, operating as a BTLE client (referred to simply as“client”) in the listener state, connects, without any manual pairingprocess, to the server and requests the payload size (“PayloadSize”) andpayload characteristics from the server. For example, the client firstrequests the payload size from the server (arrow 504). The serverresponds with the size of the Base64 encoded string that represents thedata to be sent across the BTLE connection (arrow 506). In this example,BTLE is implemented, and data can be transmitted in a portion (or“chunks”) that are a particular packetSize. As one such example, apacketSize can be chunks of 20-bytes, although it should be appreciatedthat the data can be transmitted in portions/chunks of other sizes inother examples. Once the client knows the payload size, then it canrequest the payload characteristic a total n/20 times (once more ifthere is a remainder on the division) (arrow 508). Each time the payloadcharacteristic is read, the next 20 bytes in the stream are sent (arrows510, 512). The server keeps track of how much data it has already sentso it knows which 20-byte chunk to send next. The client knows when thetransfer has been completed by comparing the number of bytes received tothe number of bytes the server provided via the PayloadSizecharacteristic. Once all of the data is received by the client, then theclient can reconstruct the original data by running a Base64 decode onthe String received.

Bidirectional Communication is also possible. For example, FIG. 5Bdepicts a sequence diagram 500B of bidirectional communication betweenthe first processing system (e.g., the processing system 101 referred toas “server” in FIG. 5B) and the second processing system (e.g., theprocessing system 102 referred to as “client” in FIG. 5B) according toone or more embodiments described herein. To enable bidirectionalcommunication between the server and the client, the server definescharacteristics as follows:

Name Size (bytes) Data type Characteristic Type InboxSize 4 IntegerWrite Inbox 20 String Write

The client can now construct a Base64 encoded data stream to send to theserver. The process is initiated by the client writing to the InboxSizecharacteristic. That is, the client creates the InboxSize characteristicto represent the size of the data it will send (block 513). The clientwrites the size in bytes of the data it is about to send to the inboxcharacteristic of the server and sends the write request for the inboxsize (arrow 514). The server creates a buffer of the size InboxSizecharacteristic to hold the incoming data (block 515) and sends backacceptance of the write request (arrow 516).

The client then proceeds to write to the Inbox characteristic as manytimes as needed to send the entire data stream (arrow 518). Uponreceiving a Write Request for InboxSize the server will create a bufferto hold InboxSize bytes of data (block 515). Upon receiving a WriteRequest for Inbox the server will append the received data to theaforementioned buffer and continue requesting more data (arrow 520). Theserver knows when the transfer has been completed by comparing thenumber of bytes received to the number of bytes the client provided whenwriting the InboxSize characteristic. Until the transfer is complete(i.e., until the amount of inbox received matches the InboxSize), theclient 102 continues to send 20 bytes of data at a time (block 522).Once all the data is received by the server, then the server canreconstruct the original data by running a Base64 decode on the Stringreceived.

The techniques depicted in FIGS. 5A and 5B can be used to pass arrays ofmessages (known as “postcards” in a mesh network). In examples, theclient and server can bundle whatever messages they want to propagateinto an array or list object. Those objects can then be Base64 encodedand transferred via BTLE according to the techniques described herein.This effectively creates a completely automated mesh network operatingon the pervasive and battery efficient BTLE protocol.

FIG. 6 depicts a flow diagram of a method 600 for exchanging informationbetween processing systems using a generic transport protocol accordingto one or more embodiments described herein. The method 600 can beimplemented by any suitable processing system (e.g., the processingsystems 101, 102 of FIG. 1 or FIG. 2; any of the processing systems203-207, 215-217 of FIGS. 2A, 2B; the processing system 1200 of FIG. 12;etc.), any suitable processing device (e.g., the processing device 1221of FIG. 12), and/or the like including combinations thereof.

At block 602, the processing system 101 converts a binary data streaminto a string using encoding. The encoding can be any suitable encoding,for example, Base64 encoding.

At block 604, the processing system 101 advertises standardcharacteristics to the processing system 102. According to one or moreembodiments described herein, a standard BTLE characteristic is definedas follows:

Name Size (bytes) Data type Characteristic Type PayloadSize 4 IntegerRead Payload 20 String Read

According to one or more examples, subsequent to advertising thestandard characteristics to the second processing system, a connection(e.g., the connection 130) is formed between the processing system 101and the processing system 102 without a manual pairing process. Inexamples, the processing systems 101, 102 utilize BTLE to form theconnection.

At block 606, the processing system 101 receives a request from theprocessing system 102 for a payload size and payload characteristics forthe data to be transmitted from the first processing system to thesecond processing system. In some cases, the request for the payloadsize and the payload characteristics are separate requests (see, e.g.,FIG. 5A). In examples, the payload size can be a size of the stringencoded in Base64 that represents the data to be sent across aconnection (e.g., the connection 130) between the processing system 101and the processing system 102.

At block 608, the processing system 101 transmits the payload size andthe payload characteristics to the processing system 102. thetransmitting is performed n/20 times, where n is a size of the data.

According to one or more embodiments described herein, additionalprocesses also may be included. For example, the method 600 can includetransmitting, by the processing system 100, the data to the processingsystem 102 via the connection (e.g., the connection 130). In someexamples, the transmitting is performed n/20 times, where n is a size ofthe data. However, in other examples, the transmitting is performed(n/20)+1 times when n/20 yields a remainder. In additional examples, themethod 600 further includes reconstructing, by the processing system102, the data received from the processing system 101 by performing aBase64 decoding on the data to generate the binary data stream. Inadditional examples, the processing system 102 can perform a secondtransmitting to transmit second data from the processing system 102 tothe processing system 101. It should be understood that the processdepicted in FIG. 6 represents an illustration, and that other processesmay be added or existing processes may be removed, modified, orrearranged without departing from the scope of the present disclosure.

Continuing with the example application of the present techniques duringemergency or natural disaster type situations, during such times peoplemay lose the ability to communicate through typical techniques (e.g.,making phone calls, sending a text message, etc.) as discussed. Thismakes it difficult to contact someone to find out if someone is safe. Aconventional technique for people to connect and send information isthrough a mesh network. Mesh networks help send data across deviceswithout needing a lot of infrastructure. Information is passed byprocessing systems making a connection to one another. The processingsystems can connect according to the techniques described herein. Onceconnected, the processing systems can send small amounts ofinformation/data to each other also as described herein.

One conventional technique for sending such information is usingBluetooth. Users can search and find one another to connect and sharedata. But the distance between users cannot be very large otherwise theycannot connect, or if a point of contact in the mesh goes away, then therest of the connections can be separated from one another. Additionally,as described herein, Bluetooth requires user interaction to connect, sousing a protocol such as BTLE may be preferable in emergency or naturaldisaster type situations or other similar situations desiring toeliminate the need for user interaction to connect processing systems.In such scenarios, processing systems may have limited connectivity andno way for connecting with cellular networks, etc., others besidessending data to other processing systems nearby in the mesh network. Butno one outside that network will be able to receive the information. Toextend mesh networks, additional hardware to extend connections would beneeded to increase the signals sent by the processing systems and/or byforwarding the signals sent to increase the range and distance. Thisstill limits the mesh networks by the accuracy and durability of thehardware used to extend signals.

The present techniques enable processing systems, such as phones and/orInternet of Things (IoT) devices, that are part of a mesh network toconnect to each other and share data with a cloud computing environment(e.g., the cloud computing environment 50). The mesh network data thatthe devices send, using BTLE for example, between each other is in theform of a data postcard as described herein, which can containinformation such as a public key and encrypted data. As an example, apostcard can include unencrypted data, such as a public key, andencrypted data, such as global positioning system (GPS) data, atimestamp, a message, etc.

A processing system can receive multiple postcards, bundle themtogether, and transmit them in whole or in part to another processingsystem and/or the cloud computing environment. In some examples, GPScoordinates of the sending in processing system and a timestampassociated with when the postcard was received are also included. Acloud database can be created as part of the mesh network to collect thepostcards and can associate/relate the postcards based on GPScoordinates of the postcards. This allows processing systems in nearbymesh networks to obtain the information from other mesh networks whenthey connect to the cloud. Other mesh network solutions do not takeadvantage of using the cloud, GPS based coordinates, and timestamps toexpand the network. This builds out the mesh network to include otherprocessing systems that may not be close enough to connect physically.This enables the mesh network to obtain new information that certainprocessing systems have not previously obtained because they may nothave had an interaction with those other processing systems.

As processing systems pass each other, they swap data postcards andbuild an internal database of these postcards. The present techniquesprovide for swapping data postcards over Bluetooth, for example, usingBTLE. This swapping is done in the background without the user havingany interaction. The data postcards that are sent back and forth amongdevices may contain a public key, some public information, and encryptedinformation. These data postcards are stored locally on the processingdevices for example and are bundled together to create a postcardbundle.

The postcard bundle that has been created can be sent to otherprocessing systems and/or into a cloud computing environmentperiodically or when a processing system establishes an interneconnection. The data postcards sent from the mesh network are bundledwith a timestamp and GPS coordinates. A GPS coordinate of one postcardassociated with a particular processing system is based on the locationof that processing system when it sent the postcard. It can bedetermined whether other processing devices in bundles are near that GPSlocation. If so, then those bundles are returned to the processingsystem. The sending processing system then receives back a bundle ofdata postcards to add to its internal database for the mesh network.This gives the sender additional data to pass back to other processingsystems in the mesh network that would not have been possible.

Once postcards have been sent into the cloud computing environment, theybegin to be aged out from the processing system(s) for example. Thisprevents duplicates of old postcards being passed around. Olderpostcards from the same public key postcard are aged out so that newerdata is sent in subsequent bundles. Timestamps are also used to aid inthe aging process. Older bundles from the cloud computing environmentare not returned to sending processing systems if they are over an agethreshold, for example, which can be adjustable. Old postcards (olderthan the threshold) are maintained in the cloud computing environmentfor potential searching and future use, for example.

According to some examples, a processing system can query to the cloudcomputing environment to find data postcards that match a public keyinput. The cloud database can be queried to provide specific datapostcards by searching on a public key. All data postcards of that useridentified from the public key are returned. Only those users thatpossess the data postcard creator's private key are able to decrypt thedata postcards and see the information. This allows processing systemsto search for individual users and to get information without being inthe same mesh network.

FIGS. 7A-7F depict block diagrams of mesh-based communication fortransmitting postcards between processing systems according to one ormore embodiments described herein. These figures are described withreference to the elements depicted in FIGS. 1, 2A, and/or 2B but are notso limited.

As shown in FIG. 7A, the processing systems 101, 102 each have apostcard (PC) 701, 702 associated therewith. The postcard 701 includesinformation about the processing system 101 and the postcard 702includes information about the processing system 102. A connection 130is formed between the processing systems 101, 102.

As shown in FIG. 7B, the processing system 101 transmits its postcard701 to the processing system 102 via the connection 130 (see arrow 131).In this way, the processing system 102 stores both its own postcard 702and the postcard 701 of the processing system 101.

As shown in FIG. 7C, the processing system 102 transmits its postcard702 to the processing system 101 via the connection 130 (see arrow 132).In this way, the processing system 101 stores both its own postcard 701and the postcard 702 of the processing system 102.

As shown in FIG. 7D, a connection 740 is formed between the processingsystem 102 and another processing system, namely the processing system204. This can occur, for example, after the connection 130 between theprocessing systems 101, 102 is terminated. The processing system 102still has copies of its own postcard 702 as well as the postcard 701 ofthe processing system 101 while the processing system 204 has a copy ofits own postcard 704.

As shown in FIG. 7E, the processing system 204 transmits its postcard704 to the processing system 102 via the connection 740 (see arrow 741).In this way, the processing system 102 stores its own postcard 702, thepostcard 701 of the processing system 101, and the postcard 704 of theprocessing system 204.

As shown in FIG. 7F, the processing system 102 transmits its postcard702 and the postcard 701 of the processing system 101 to the processingsystem 204 via the connection 704 (see arrow 742). In this way, theprocessing system 204 stores its own postcard 704, the postcard 701 ofthe processing system 101, and the postcard 702 of the processing system102.

One or more of the processing systems 101, 102, 204 shown in FIGS. 7A-7Fcan then transmit any postcards for which they have copies to a cloudcomputing node of a cloud computing environment. For example, FIG. 8depicts a block diagram of mesh-based communication for transmittingpostcards between processing systems and a cloud computing environment,such as cloud computing environment 50 of FIG. 10, according to one ormore embodiments described herein.

In this example, as in FIGS. 7A-7F, the processing systems 101, 102, 204each have an associated postcard 701, 702, 704 respectively. Thepostcards 701, 702, 704 can be transmitted to a cloud computing node 10of the cloud computing environment 50 and stored in a postcard database(“PC DB”) 850 within the cloud computing environment 50 or elsewhere asappropriate. The postcards 701, 702, 704 can also be transmitted toanother processing system (e.g., the processing system 210), which maynot be directly in connection with (or is not even in the same physicalproximity to) the processing systems 101, 102, 204. In this way,information about the processing systems 101, 102, 204 can be sharedwith the processing system 210 via the cloud computing environment 50 bysharing the postcards 701, 702, 704.

It should be appreciated that the processing system 210 can include itsown postcard 810, which can be shared with the processing systems 101,102, 204 via the cloud computing environment in much the same way thatit received the postcards 701, 702, 704.

FIG. 9 depicts a flow diagram of a method 900 for mesh-basedcommunication for transmitting postcards between processing systemsaccording to one or more embodiments described herein. The method 900can be implemented by any suitable processing system (e.g., theprocessing systems 101, 102 of FIG. 1 or FIG. 2; any of the processingsystems 203-207, 215-217 of FIGS. 2A, 2B; the processing system 1200 ofFIG. 12; etc.), any suitable processing device (e.g., the processingdevice 1221 of FIG. 12), and/or the like including combinations thereof.

At block 902, a first connection (e.g., the connection 130) between afirst processing system (e.g., the processing system 101) and a secondprocessing system (e.g., the processing system 102) is established. Atblock 904, the first processing system transmits a first postcard (e.g.,the postcard 701) to the second processing system via the firstconnection. The first postcard includes information associated with thefirst processing system. For example, the first postcard can includeunencrypted data and encrypted data. The unencrypted data can include apublic key. The encrypted data can include global positioning systemdata associated with a location of the first processing system at a timethat the first postcard was transmitted to the second processing system,a timestamp defining the time that the first postcard was transmitted tothe second processing system, and a message. At block 906, the firstconnection between the first processing system and a second processingsystem is terminated.

At block 908, a second connection (e.g., the connection 740) between thesecond processing system and a third processing system (e.g., theprocessing system 204) is established. At block 910, the secondprocessing system transmits a second postcard (e.g., the postcard 702)to the third processing system via the second connection. The secondpostcard includes information associated with the second processingsystem. For example, the second postcard can include unencrypted dataand encrypted data. The unencrypted data can include a public key. Theencrypted data can include global positioning system data associatedwith a location of the first processing system at a time that the secondpostcard was transmitted to the third processing system, a timestampdefining the time that the second postcard was transmitted to the thirdprocessing system, and a message. At block 912, the second processingsystem transmits the first postcard to the third processing system viathe second connection. In this way, the third processing system receivesthe postcards of both the first and second processing systems (e.g.,both postcards 701, 702).

According to one or more embodiments described herein, additionalprocesses also may be included. For example, the method 900 can includeestablishing a third connection between the third processing system anda cloud computing node of a cloud computing environment. The method 900can further include transmitting, by the third processing systems, athird postcard to the cloud computing node via the third connection. Thethird postcard includes information associated with the third processingsystem. The method 900 further includes transmitting, by the secondprocessing system, the first postcard to the cloud computing node viathe third connection and/or transmitting, by the second processingsystem, the first postcard to the cloud computing node via the thirdconnection. In some examples, the method 900 further includes receiving,by the third processing system, one or more additional postcards fromthe cloud computing node of the cloud computing environment via thethird connection. the one or more additional postcards are selected froma plurality of postcards (e.g., the postcards stored in the postcard DB850), the selection being based at least in part on global positioningsystem data and a timestamp associated with each of the plurality ofpostcards. It should be understood that the process depicted in FIG. 9represents an illustration, and that other processes may be added orexisting processes may be removed, modified, or rearranged withoutdeparting from the scope of the present disclosure.

It is to be understood that, although this disclosure includes adetailed description on cloud computing, implementation of the teachingsrecited herein are not limited to a cloud computing environment. Rather,embodiments of the present invention are capable of being implemented inconjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g., networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as Follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported, providing transparency for both theprovider and consumer of the utilized service.

Service Models are as Follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as Follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure that includes anetwork of interconnected nodes.

Referring now to FIG. 10, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 includes one or morecloud computing nodes 10 with which local computing devices used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Nodes 10 maycommunicate with one another. They may be grouped (not shown) physicallyor virtually, in one or more networks, such as Private, Community,Public, or Hybrid clouds as described hereinabove, or a combinationthereof. This allows cloud computing environment 50 to offerinfrastructure, platforms and/or software as services for which a cloudconsumer does not need to maintain resources on a local computingdevice. It is understood that the types of computing devices 54A-N shownin FIG. 10 are intended to be illustrative only and that computing nodes10 and cloud computing environment 50 can communicate with any type ofcomputerized device over any type of network and/or network addressableconnection (e.g., using a web browser).

Referring now to FIG. 11, a set of functional abstraction layersprovided by cloud computing environment 50 (FIG. 10) is shown. It shouldbe understood in advance that the components, layers, and functionsshown in FIG. 11 are intended to be illustrative only and embodiments ofthe invention are not limited thereto. As depicted, the following layersand corresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage devices 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may include applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and transmitting and receiving postcards 96.

It is understood that one or more embodiments described herein iscapable of being implemented in conjunction with any other type ofcomputing environment now known or later developed. For example, FIG. 12depicts a block diagram of a processing system 1200 for implementing thetechniques described herein. In accordance with one or more embodimentsdescribed herein, the processing system 1200 is an example of a cloudcomputing node 10 of FIG. 10. In examples, processing system 1200 hasone or more central processing units (“processors” or “processingresources”) 1221 a, 1221 b, 1221 c, etc. (collectively or genericallyreferred to as processor(s) 1221 and/or as processing device(s)). Inaspects of the present disclosure, each processor 1221 can include areduced instruction set computer (RISC) microprocessor. Processors 1221are coupled to system memory (e.g., random access memory (RAM) 1224) andvarious other components via a system bus 1233. Read only memory (ROM)1222 is coupled to system bus 1233 and may include a basic input/outputsystem (BIOS), which controls certain basic functions of processingsystem 1200.

Further depicted are an input/output (I/O) adapter 1227 and a networkadapter 1226 coupled to system bus 1233. I/O adapter 1227 may be a smallcomputer system interface (SCSI) adapter that communicates with a harddisk 1223 and/or a storage device 1225 or any other similar component.I/O adapter 1227, hard disk 1223, and storage device 1225 arecollectively referred to herein as mass storage 1234. Operating system1240 for execution on processing system 1200 may be stored in massstorage 1234. The network adapter 1226 interconnects system bus 1233with an outside network 1236 enabling processing system 1200 tocommunicate with other such systems.

A display (e.g., a display monitor) 1235 is connected to system bus 1233by display adapter 1232, which may include a graphics adapter to improvethe performance of graphics intensive applications and a videocontroller. In one aspect of the present disclosure, adapters 1226,1227, and/or 1232 may be connected to one or more I/O busses that areconnected to system bus 1233 via an intermediate bus bridge (not shown).Suitable I/O buses for connecting peripheral devices such as hard diskcontrollers, network adapters, and graphics adapters typically includecommon protocols, such as the Peripheral Component Interconnect (PCI).Additional input/output devices are shown as connected to system bus1233 via user interface adapter 1228 and display adapter 1232. Akeyboard 1229, mouse 1230, and speaker 1231 may be interconnected tosystem bus 1233 via user interface adapter 1228, which may include, forexample, a Super I/O chip integrating multiple device adapters into asingle integrated circuit.

In some aspects of the present disclosure, processing system 1200includes a graphics processing unit 1237. Graphics processing unit 1237is a specialized electronic circuit designed to manipulate and altermemory to accelerate the creation of images in a frame buffer intendedfor output to a display. In general, graphics processing unit 1237 isvery efficient at manipulating computer graphics and image processing,and has a highly parallel structure that makes it more effective thangeneral-purpose CPUs for algorithms where processing of large blocks ofdata is done in parallel.

Thus, as configured herein, processing system 1200 includes processingcapability in the form of processors 1221, storage capability includingsystem memory (e.g., RAM 1224), and mass storage 1234, input means suchas keyboard 1229 and mouse 1230, and output capability including speaker1231 and display 1235. In some aspects of the present disclosure, aportion of system memory (e.g., RAM 1224) and mass storage 1234collectively store the operating system 1240 such as the AIX® operatingsystem from IBM Corporation to coordinate the functions of the variouscomponents shown in processing system 1200.

Various embodiments of the invention are described herein with referenceto the related drawings. Alternative embodiments of the invention can bedevised without departing from the scope of this invention. Variousconnections and positional relationships (e.g., over, below, adjacent,etc.) are set forth between elements in the following description and inthe drawings. These connections and/or positional relationships, unlessspecified otherwise, can be direct or indirect, and the presentinvention is not intended to be limiting in this respect. Accordingly, acoupling of entities can refer to either a direct or an indirectcoupling, and a positional relationship between entities can be a director indirect positional relationship. Moreover, the various tasks andprocess steps described herein can be incorporated into a morecomprehensive procedure or process having additional steps orfunctionality not described in detail herein.

The following definitions and abbreviations are to be used for theinterpretation of the claims and the specification. As used herein, theterms “comprises,” “comprising,” “includes,” “including,” “has,”“having,” “contains” or “containing,” or any other variation thereof,are intended to cover a non-exclusive inclusion. For example, acomposition, a mixture, process, method, article, or apparatus thatcomprises a list of elements is not necessarily limited to only thoseelements but can include other elements not expressly listed or inherentto such composition, mixture, process, method, article, or apparatus.

Additionally, the term “exemplary” is used herein to mean “serving as anexample, instance or illustration.” Any embodiment or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other embodiments or designs. The terms “at least one”and “one or more” may be understood to include any integer numbergreater than or equal to one, i.e. one, two, three, four, etc. The terms“a plurality” may be understood to include any integer number greaterthan or equal to two, i.e. two, three, four, five, etc. The term“connection” may include both an indirect “connection” and a direct“connection.”

The terms “about,” “substantially,” “approximately,” and variationsthereof, are intended to include the degree of error associated withmeasurement of the particular quantity based upon the equipmentavailable at the time of filing the application. For example, “about”can include a range of ±8% or 5%, or 2% of a given value.

For the sake of brevity, conventional techniques related to making andusing aspects of the invention may or may not be described in detailherein. In particular, various aspects of computing systems and specificcomputer programs to implement the various technical features describedherein are well known. Accordingly, in the interest of brevity, manyconventional implementation details are only mentioned briefly herein orare omitted entirely without providing the well-known system and/orprocess details.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instruction by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdescribed herein.

What is claimed is:
 1. A computer-implemented method comprising:establishing, by a second processing system, a first connection with afirst processing system; receiving, by the second processing system,standard characteristics from the first processing system; transmitting,by the second processing system, a request to the first processingsystem for a payload size and payload characteristics for data to betransmitted from the first processing system to the second processingsystem; receiving, by the second processing system, the payload size andthe payload characteristics; receiving, by the second processing systembased at least in part on the payload size and the payloadcharacteristics, a first postcard from the first processing system viathe first connection, the first postcard comprising informationassociated with the first processing system; terminating, by the secondprocessing system, the first connection with the first processingsystem; establishing, by the second processing system, a secondconnection with a third processing system; transmitting, by the secondprocessing system, a second postcard to the third processing system viathe second connection, the second postcard comprising informationassociated with the second processing system; and transmitting, by thesecond processing system, the first postcard to the third processingsystem via the second connection.
 2. The computer-implemented method ofclaim 1, wherein the first postcard comprises unencrypted data andencrypted data, wherein the unencrypted data comprises a public key, andwherein the encrypted data comprises global positioning system dataassociated with a location of the first processing system at a time thatthe first postcard was transmitted to the second processing system, atimestamp defining the time that the first postcard was transmitted tothe second processing system, and a message.
 3. The computer-implementedmethod of claim 1, wherein the second postcard comprises unencrypteddata and encrypted data.
 4. The computer-implemented method of claim 3,wherein the unencrypted data comprises a public key, and wherein theencrypted data comprises global positioning system data associated witha location of the first processing system at a time that the secondpostcard was transmitted to the third processing system, a timestampdefining the time that the second postcard was transmitted to the thirdprocessing system, and a message.
 5. The computer-implemented method ofclaim 1, wherein one or both of the first connection or the secondconnection utilizes Bluetooth Low Energy.
 6. The computer-implementedmethod of claim 1, further comprising: establishing a third connectionbetween the third processing system and a cloud computing node of acloud computing environment.
 7. The computer-implemented method of claim6, further comprising: transmitting, by the third processing system, athird postcard to the cloud computing node via the third connection, thethird postcard comprising information associated with the thirdprocessing system.
 8. The computer-implemented method of claim 7,further comprising: transmitting, by the third processing system, thefirst postcard to the cloud computing node via the third connection. 9.The computer-implemented method of claim 7, further comprising:transmitting, by the third processing system, the second postcard to thecloud computing node via the third connection.
 10. Thecomputer-implemented method of claim 6, further comprising: receiving,by the third processing system, one or more additional postcards fromthe cloud computing node of the cloud computing environment via thethird connection.
 11. The computer-implemented method of claim 10,wherein the one or more additional postcards are selected from aplurality of postcards, the selection being based at least in part onglobal positioning system data and a timestamp associated with each ofthe plurality of postcards.
 12. A system comprising: a memory comprisingcomputer readable instructions; and one or more processing devices forexecuting the computer readable instructions, the computer readableinstructions controlling the one or more processing devices to performoperations comprising: establishing, by a second processing system, afirst connection with a first processing system; receiving, by thesecond processing system, standard characteristics from the firstprocessing system; transmitting, by the second processing system, arequest to the first processing system for a payload size and payloadcharacteristics for data to be transmitted from the first processingsystem to the second processing system; receiving, by the secondprocessing system, the payload size and the payload characteristics;receiving, by the second processing system based at least in part on thepayload size and the payload characteristics, a first postcard from thefirst processing system via the first connection, the first postcardcomprising information associated with the first processing system;terminating, by the second processing system, the first connection withthe first processing system; establishing, by the second processingsystem, a second connection with a third processing system;transmitting, by the second processing system, a second postcard to thethird processing system via the second connection, the second postcardcomprising information associated with the second processing system; andtransmitting, by the second processing system, the first postcard to thethird processing system via the second connection.
 13. The system ofclaim 12, wherein the first postcard comprises unencrypted data andencrypted data, wherein the unencrypted data comprises a public key, andwherein the encrypted data comprises global positioning system dataassociated with a location of the first processing system at a time thatthe first postcard was transmitted to the second processing system, atimestamp defining the time that the first postcard was transmitted tothe second processing system, and a message.
 14. The system of claim 12,wherein the second postcard comprises unencrypted data and encrypteddata.
 15. The system of claim 14, wherein the unencrypted data comprisesa public key, and wherein the encrypted data comprises globalpositioning system data associated with a location of the firstprocessing system at a time that the second postcard was transmitted tothe third processing system, a timestamp defining the time that thesecond postcard was transmitted to the third processing system, and amessage.
 16. The system of claim 12, wherein one or both of the firstconnection or the second connection utilizes Bluetooth Low Energy.
 17. Acomputer program product comprising a computer readable storage mediumhaving program instructions embodied therewith, the program instructionsexecutable by one or more processors to cause the one or more processorsto perform operations comprising: establishing, by a first processingsystem, a first connection with a first processing system; receiving, bythe second processing system, standard characteristics from the firstprocessing system; transmitting, by the second processing system, arequest to the first processing system for a payload size and payloadcharacteristics for data to be transmitted from the first processingsystem to the second processing system; receiving, by the secondprocessing system, the payload size and the payload characteristics;receiving, by the second processing system based at least in part on thepayload size and the payload characteristics, a first postcard from thefirst processing system via the first connection, the first postcardcomprising information associated with the first processing system;terminating, by the second processing system, the first connection withthe first processing system; establishing, by the second processingsystem, a second connection with a third processing system;transmitting, by the second processing system, a second postcard to thethird processing system via the second connection, the second postcardcomprising information associated with the second processing system; andtransmitting, by the second processing system, the first postcard to thethird processing system via the second connection.