Method for uniform network access

ABSTRACT

According to some embodiments, a registry is displayed. The registry may, for example, indicate resources available from a plurality of remote network access devices via a communications network. Moreover, a personal network address may be associated with each available resource, the personal network address including an destination address portion and an application program identifier portion. A direct communications link may then be established between a first network access device hosting an available resource and a second network address device using the personal network address associated with the resource.

RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 12/661,483, filed Mar. 17, 2010, now U.S. Pat. No. 7,941,540which is a continuation of U.S. patent application Ser. No. 11/173,856,filed Jun. 30, 2005 (issued as U.S. Pat. No. 7,860,921), which is acontinuation of U.S. patent application Ser. No. 10/361,920, filed Feb.10, 2003 (issued as U.S. Pat. No. 6,961,748), which is acontinuation-in-part of U.S. patent application Ser. No. 09/310,411,filed May 12, 1999 (issued as U.S. Pat. No. 6,519,625), which claims thebenefit of U.S. Provisional Patent Application Ser. No. 60/105,858 filedOct. 27, 1998. The entire contents of each of the above applications areincorporated herein by reference.

BACKGROUND

Communications networks, including the Internet, have been used toaccess resources located on various network access devices. Typically, auser may transfer data files, including text, application files, voiceand video with electronic network access devices. As the size andcomplexity of available communications networks has increased, methodsof conveniently transferring data across various software platforms havebeen sought.

In order to deliver a message to an agent via an electroniccommunications network, it is necessary to address the computer and theapplication software accessed by the agent. Typically, an InternetProtocol (IP) address is used to identify the computer. Applicationsoftware is commonly addressed to a port number on the computer. Acomputer may have thousands of ports available. Each port can connect toonly one application. However, an application may connect to multipleports. A combination of the IP address and port number allows a messageto be delivered properly to a designated application program. In thisway, an Internet message is first delivered to an IP address associatedwith a computer and then delivered to the specific port on the computerrunning application software associated with the message.

Fixed IP addresses are not widely available to independent users. It iscommon for domestic and small business users to access a network such asthe Internet via an Internet Service Provider (ISP). ISPs can act as aredirecting service and assign a temporary IP address to a computercontacting the service provider. The temporary IP address is used bythat computer during one contiguous computing session. When a computingsession ends, the ISP, or other re-directing service, makes a previouslyallocated computer address available to a subsequent request to initiatean Internet computing session. An address is consistent for a userduring any continuous computing session.

Similarly, port numbers are not commonly allocated on a fixed basis. Ona shared processor, such as a mainframe, shared port numbers areallocated to application programs as various users invoke theapplications. On single user machines such as PCs, all port numbers areavailable to a user. However, multiple instances of an applicationprogram may be enabled for concurrent execution. Each instance must beassigned a unique port Ports are therefore assigned on an as-requestedbasis.

Due to the allocation and re-allocation of IP addresses and port numberswith each new computing session, it is difficult for a user to track theaddress of another party with which the user may wish to communicate.Without an address, it is difficult to communicate directly across anetwork.

In response to the problem of changing addresses, systems have beenimplemented using centralized servers that maintain a permanent IPaddress and port number. Often, specially designated programs may beallocated a port number for that special program's permanent exclusiveuse. In this way, an agent can locate the centralized server andcommunicate with it. If appropriate, the centralized server can forwarda message to another agent who has also identified itself to thecommunications server. The centralized server acts as a hub for allcommunication. However, if the centralized server or a communicationslink to the server should fail, all communications cease.

In addition, permanent address centralized servers typically require setup and maintenance by technical personnel. Applications running on theservers, such as an email or database application, may require aparticular computing platform to execute the application software. Withthe proliferation of computing platforms such as Microsoft Windows,Unix, DOS, and IBM OS2, it becomes increasingly difficult to supportmultiple platforms.

Multiple services in the form of resources and applications can beavailable on a network. Typically, a discrete service requires a uniqueaccess interface. In addition, different operating systems are oftenmanifested in different interfaces.

It would be useful therefore to have a method of communicating that doesnot require a centralized server and is executable across multipleplatforms.

SUMMARY

A uniform network access mechanism, or interface, can enable a networkagent to access multiple discrete network services; the uniform networkaccess mechanism can include software operative on multiple operatingsystems and executed on a network access device. In one aspect, groupsof loosely interconnected agents can communicate contemporaneously or atvarious times without intermediaries such as servers.

Communications can include text, voice, files and database access.Agents can include human users utilizing network access devices, such asa personal computer, or robot machines that are programmed to respondlike humans. In another aspect, agents operating on different operatingsystem platforms can use an equivalent interface.

The operating systems can include the Disk Operating System (DOS)™,Windows 95™, Windows NT™, UNIX, Apple Mac OS, or other operatingsystems. The software can display a registry of discrete servicesavailable on a network and implement communication with a discreteresource listed on the registry as available.

In general, in one aspect, a discrete resource is identified with aPersonal Network (PeN) address comprising an Internet Protocol addressand a port number. In another aspect, the software can be additionallyoperative to coordinate the sending and receipt of data packets. A datapacket can be received and parsed wherein an action responsive to thecontent of a received packet can be performed.

In general, one response to packet content can construct a networksocket with associated input and output streams and add it as a tripletto a multiplexer IOStreamList. A multiplexer can coordinate multiplecommunications to a discrete service available on the network.

In another aspect, in general, a discrete service can include a databasequery, a mail message, a chat message or a file transfer request. Acommunication or other data stream can also be encrypted to providesecurity against unauthorized access.

In general, in another aspect, the invention includes a uniform userinterface invocable by a command on a network access device. The userinterface can include a first display region for a registry to listavailable network agents and resources. In a second display region, alog of communication events occurring between resources and agents can edisplayed. A third display region can include user interactive controlsto perform registry functions. A fourth display region can listavailable network functions and user interactive controls to enable ordisable said network functions. In still another aspect, a PeN virtualnetwork can coordinate network access devices linked by a communicationsnetwork. Software running on a network access device can create aregistry coordinating PeN resources, the registry can list unique PeNaddresses for each resource and facilitate communications directlybetween network access devices.

DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a computer.

FIG. 2 illustrates a communications network.

FIG. 3 illustrates a PeN address.

FIG. 4 shows a Uniform User Interface.

FIG. 5 shows a PeN Registry.

FIG. 6 shows a PeN General Settings display.

FIG. 7 illustrates a PeN multiplexer.

FIG. 8 illustrates an exemplary program flow for a network agent.

FIG. 9 illustrates an exemplary program flow for network functions.

FIG. 10 illustrates an exemplary program flow for registry functions.

DETAILED DESCRIPTION

FIG. 1 depicts physical resources of a computer 100. The computer 100has a processor 101, such as a Central Processing Unit (CPU) connectedto a processor host bus 102 over which it provides data, address andcontrol signals. The processor 101 may be any conventional, generalpurpose, single-or multi-chip microprocessor such as a Pentium®processor, a Pentium® Pro processor, a Pentium II® processor, a MIPS®processor, a Power PC® processor or an ALPHA® processor. In addition,the processor 101 may be any conventional special purpose microprocessorsuch as a digital signal processor or a graphics processor. Theprocessor 101 has conventional address, data and control lines couplingit to the processor host bus 102.

The computer I 00 includes a system controller 103 having, an integratedRAM memory controller 104. The system controller 103 can be connected tothe processor host bus 102 and provide an interface to Random AccessMemory (RAM) 105. The system controller 103 can also provide a host busto peripheral bus bridging functions. The system controller 103 canthereby permit signals on the processor host bus 102 to be compatiblyexchanged with signals on a peripheral bus 110. The peripheral bus 110may be, for example, a Peripheral Component Interconnect (PCI) bus, anIndustry Standard Architecture (ISA) bus or a MicroChannel bus.Additionally, the system controller 103 can provide data buffering, anddata transfer rate matching, between the host processor bus 102 andperipheral bus 110. The system controller 103 can thereby allow, forexample, a processor 101 having a 64-bit 66 MHz interface and a 533Mbytes/second data transfer rate to interface to a PCI bus 110 having adata path differing in data path bit width, clock speed, or datatransfer rate.

Accessory devices including, for example, a video controller 112 andnetwork adapter 114 can be coupled to the peripheral bus 110. Thenetwork adapter 114 may be a modem, an Ethernet networking card, a cablemodem or other network access circuitry.

The computer 100 can also include nonvolatile Read Only Memory (ROM) 122to store basic computer software routines. An operating system bootoperation can occur after the computer 100 is turned on and power-onself-test (POST) routines stored in the BIOS 123 complete execution.During the boot process, the processor 101 executes BIOS 123 software toaccess a bridge controller 111 (e.g., including a disk controller) ornetwork adapter 114 and thereby obtain a high-level operating system.The high-level operating system may be for example, the Disk Operating,System (DOS)™, Windows 95™, Windows NT™, UNIX, Apple Mac OS™ or otheroperating systems.

An operating system may be fully loaded in the RAM memory 105 or mayinclude portions in RAM memory 105, disk drive storage 113, or storageat a network location. An operating system, such as Windows 95™ orWindows NT™, provides functionality to control computer peripherals,such as devices 112-114, 121, and 124, and to execute user applications.User applications may be commercially available software programs suchas personal network software, word processing, spreadsheets, Internetaccess software and many other types of software. User applications mayaccess computer system peripherals 112-114 through an ApplicationProgramming Interface (API) provided by the operating system and/or maydirectly interact with underlying computer system 100 hardware.

A collection of computers 100 can serve as components of acommunications network. Referring to FIG. 2, a communications network200 can include network access devices such as client computers 211-213that are part of a local area network 205, independent computers 214-216and other network access devices 217-219. Other network access devicescan include, for example, cellular communications devices, interactiveWEB devices, portable handheld devices or any device that providescommunication on an electronic communication network such as theInternet.

A network agent can include a person or machine seeking to communicateover the communications network 200. Agents can communicate via anetwork access device 211-219. Network communication can be accomplishedover a medium such as a combination of public switched telephone networkdial-up connections and packet network interconnections. Network accessdevices 211-219 can connect through dial-up, direct cable access,wireless technologies, satellite or other communications media. Aterminal server 225 or 226 may have both dial-up and packet networkinterfaces allowing the server 225 or 226 to receive data from networkaccess devices 214-216 and 217-219, respectively, segment the receiveddata into data packet segments, add overhead information to thesegments, and send the resultant data packets over a link 221 to apacket data network 220 for delivery to the local area network 205.Terminal servers 225 and 226 may also be referred to as a networkservice provider's Point-Of-Presence (POP). A registry 262 can reside onany network access device 211-219 to list and coordinate resourcesavailable on the network.

Software code operative with a processor on a network access device211-219 can provide a personal network (PeN) with a uniform networkaccess mechanism, such as a Uniform User Interface (UUI), to accesslocal resources or resources available via the communications network200. The UUI an be used across multiple software platforms and accessdevice types to facilitate sharing resources and sending and receivingdata. Establishing and maintaining a communications link between two ormore network access devices 211-219 enables a UUI to manage dataqueries, messaging, chat and other application requests. Utilization ofa multi-platform software language, such as the Java programminglanguage, allows the UUI to present a universal interface to a user. Theuniversal interface frees a user from having to learn a differentinterface for each operating system such as DOS™, Windows 95™, WindowsNT™, UNIX™, Apple Mac OS™ or other operating systems.

A UUI can operate directly on a network access device 211-219 toeliminate the need for a specialized server dedicated to performingcommunications functions. Communications can be established directlybetween participating network access devices 211-219. Each networkaccess device 211-219 can specify the extent to which it will make itsresources available and participate in activities such as network chatand messaging.

Referring now to FIG. 4, program code can be executed on a networkaccess device 211-219 to present a UUI 400 to an agent. The UUI 400 caninclude user interactive controls, such as a push button icons, tofacilitate operation of PeN functions. PeN functions can include systemapplication programs 410, file transfer 420, chat sessions 430,messaging 440 or other discrete services. User interactive controls canalso be utilized to offer UUI 400 specific functions such as displayinga log 480, displaying a clock 470, re-starting a PeN session 460,displaying a software version 455 or entering a setup utility 450. Inaddition, the UUI 400 can include user interactive controls for PeNfunctions. For example, a button may be used to enable or disable systemapplication programs 415, file transfer 420, chat sessions 435 andmessaging 445. Restarting a session can include an automated download ofa new version of PeN and running the new version with minimal intrusionto the user.

A UUI can also include a drop down menu 490 of resources available onthe PeN or locally on the network access device 211-219. A resourceavailable on the PeN can be accessed by choosing it from a resource dropdown menu 490 or by specifying a destination PeN address. A PeN addressidentifies the location at which a resource can be located. In oneembodiment, as illustrated in FIG. 3, a PeN address can include adestination address 310 concatenated with an application programidentifier 320. The destination address 310 can be a network addresssuch as an IP address specifying a network access device 211-219 onwhich a resource is being made available. The application programidentifier 320 can be a port number associated with an applicationprogram administering the resource.

To commence communications, the UUI 400 can poll a network 200 todetermine whether a network access device 211-219 with which anoriginating agent wishes to communicate is available. Polling can beaccomplished, for instance, with a ping of an IP address portion of aPeN address. A successful ping can signify that a corresponding resourceis online and available.

Referring now to FIG. 5, PeN addresses maintained in a registry 262 canbe displayed in an interface 500 to facilitate location of variousagents 506 and resources 507. A registry 262 can include a name 520 orother identifier for each resource listed, and a PeN address 525 atwhich the identified resource can be communicated with. A PeN utilizinga registry 262 enables communication amongst the addresses 525 listed.In one embodiment, a menu 560 can be presented listing availableresources 580. Selection of a resource 580 from the registry canautomatically open a communication session with that resource 580. A PeNcan include one or more available agents 506. In a multi-agent PeN,communication can be directed to an individual destination or tomultiple destinations. In addition, an agent can participate in morethan one PeN simultaneously.

The interface 500 can include an identifier 510. In one embodiment, theidentifier can be indicative of the network access device 211-219hosting the registry 262. Other embodiments can include a description ofthe agents 506 and resources 507 listed, or an arbitrary name. Aregistry interface 500 can include a region displaying user interactivecontrols such as push buttons 570, Push buttons 570 can actuate registryfunctions such as refresh the display, clear the log, save the log andexit.

Human agents, robotic agents, and other resources utilizing a PeNregistry 262 can be identified by multiple identification data,including a short “user-name” to uniquely identify a user to a registry;an optional password that can enable a registry to verify a user'sidentity; a user's full name, location, affiliations and/or otherdetails provided by the user; or an optional digital portrait or otherdigital image of the user.

Identification data items can be made available to users of the registry262, whereby correspondents may be identified by their real names andlikenesses, obviating the need to memorize user-names or emailaddresses.

A network access device 211-219 hosting a registry 262 may poll agents506 and resources 507 listed on the registry periodically and update theavailability of the agents 506 and resources 507 listed according to theresults of the poll. For example, a network access device 211-219 maypublish a registry 262 that allows agents 506 to log in and declare anaddress 525 at which they can be reached. In addition, the registry 262may list other resources 507, such as a database or file library. A pollmay consist of a ping on a periodic basis to ascertain the continuedpresence of an agent 506 or resource 507. In addition, a network accessdevice 211-219 can ping a registry on a periodic or other basis. Asuccessful ping will certify that the registry is accurate.

In one embodiment, a network access device 211-219 with a permanent PeNaddress 525 maintains a registry 262 allowing other agents 506 listed inthe registry 262 to declare their current PeN address 525 as an agent506 becomes available online. The permanent address of the networkaccess device 211-219 maintaining the PeN can act as a known originationpoint for the PeN.

In other instances, a network access device 211-219 with a permanentaddress may not be available, and a network access device 211-219 with atemporary PeN address 525 will publish a registry 262. The temporaryaddress 525 needs to be conveyed to an agent 506 seeking to log into theregistry 262. A temporary PeN address 525 can be considered via email,telephone. bulletin board or other communications method. Moreover, atemporary address might be, for example, allocated by the Dynamic HostConfiguration Protocol (DHCP) mechanism.

In one embodiment, multiple network access devices 211-219 included in aPeN will host a registry 262 concurrently. One of the registries 262 canbe active and coordinate the communications. However, messaging or otherPeN functions do not flow through the registry. The registry simplycoordinates network access devices 211-219 and PeN resources. In theevent the network access device 211-219 hosting the active registry 262drops out, another registry 262 can automatically become active. Inaddition, an active registry 262 can proactively transfer the activestatus to another registry 262.

Referring now to FIG. 6, a General Settings display 600 can display PeNinformation. The General Settings 600 can include the user-name of anagent 635, a password 636 and an actual name 637. The General Settings600 can also include user interactive controls such as check boxes toenable PeN functions such as messaging 630, file transfer 631 and chatsessions 632. In addition, a drop down menu or other listing ofavailable registries 625 can be included. Selecting a registry byclicking on a listed registry 626 can log an agent into the selectedregistry 626. A function to change 650 or edit 655 a greeting presentedto an agent loc into a PeN registry can also be included in the GeneralSettings 600.

Referring now to FIG. 7, a network access device 211-219 making aresource such as a database, chat session or other shared application770 available to access by other agents 506 can accommodate multipleconcurrent access with a resource sharing mechanism such as amultiplexer 71 0.

A multiplexer 710 can manage multiple streams 720-727 of data beingreceived and sent. Each data stream 720-727 is conveyed via acommunications link such as an Internet socket 740. A data stream720-727 can include one or more data packets 265 received from a networkagent. A packet 265 is collected from an input stream 720, 722, 724 or726, as it is received and transferred to a single input line 750 ofcommunication providing input to a shared application 770. Responsesfrom the shared application 770 are directed back on an output stream755 through the multiplexer 710 to an output stream 721, 723, 725, 727connected to the original Internet socket 740 from which it wasreceived.

One embodiment of a multiplexer 710 utilizes a software program, such asa Network Agent software program, to initiate new corrections, constructa network socket 740 with associated input and output streams 720-727,and connect them as a triplet to a multiplexer IOStreamList 720-727. Themultiplexer 710 can continuously scan the list. A communication receivedfrom the input stream on this list is transmitted to the sharedresource. Responses are transmitted on an associated output stream. Whena session is terminated, the multiplexer 710 closes the associatedsocket and removes its triplet from the list. A typical programming loopfor a multiplexer is illustrated in Table 1.

TABLE I Main Loop: 1. While message queue from application is not empty:A. remove response and tag from queue, B. identify output streamcorresponding to tag, C. transmit response on that output stream, and D.discard response and tag. 2. When message queue from application isempty: Start scanning IOStreamList from beginning. For each triplet: A.While inputstream is not empty: I. receive input from inputstream; II.if input is request to terminate: a. close corresponding socket, b.remove triplet from IOStreamList; III. otherwise (not a request toterminate): a. generate tag identifying this triplet. b. send input andtag on message queue to application. B. When inputstream is empty: Moveon to next triplet when at end of IOStreamList.

Referring now to FIG. 8, a flow diagram 800 illustrates one embodimentof a process for receipt of a data packet 265 by a network access device211-219. An agent can wait for a packet arrival or user command 805. Ifa packet is received it can be tested 810 to determine if it is amessage. If it is a message, the message can be tested for private mode811 indicating encryption. If the message is received encrypted, it canbe decrypted 812 and processed 814. Processing can include displayingthe content of the message or other action indicated by the message. Ifthe input is a user command, it can be tested to determine if it is acommand to initiate communication with an agent 506 listed in theregistry address list 820. If it is the communication requested can bemade 821. If the input is not a command to initiate communication 820,it can be tested to see if it is a command to modify the registry 830.If it is a command to modify, the registry 830, the registry can bemodified accordingly 831. If it is not, the packet 265 can be tested fora command to exit 840 or proceed to additional routines 851. Datapackets 265 can also include email. A network agent can additionally beprogrammed to receive. send, store, archive and otherwise participate inemail.

Referring to FIG. 9, a file request 910 received by an agent can beresponded to with a search for the file 911, a test for permission tosend a particular file found to the requestor 912, a check to see ifencryption is appropriate 913, and if all conditions are met, sendingthe file to the requester 914 or 915. In response to a request to push afile 920, the file can be received 921 and tested for private modeindicating encryption 922. If appropriate, it can be decrypted 923 andsaved to local disk 924.

Referring now to FIG. 10, which illustrates functions of a registry forprocessing a packet requesting login 1010, logout 1020, confirmation1030 or database query 1040. A login request 1010 may receive a responseof an OK message and a list of records representing all agents logged in1011. A logout request may be responded to with an OK message back tosender 1021 and a notification to all other agents 1022. A confirmationrequest 1030 may receive a search 1031, a status set equal to good 1032and an OK message back to the sender 1034. A database query request 1040response may be a query search 1041 and a positive response 1042 ornegative response 1043 sent back to the requester. A completedtransaction can also be used to confirm a sender's status as good 1044.

The above flow illustrations are exemplary and should not be viewed aslimiting. Data packet 265 formats, switching equipment within the packetnetwork 220, and networking protocols used within the network 200 mayconform to the transaction control protocol/Internet protocol (TCP/IP).In a TCP/IP implementation, the local area network 205, packet network220, and terminal servers 225, 226 can each be assigned a unique IPnetwork address. Implementations may use other networking protocols andpacket formats.

The present invention may be implemented in digital electroniccircuitry, or in computer hardware, firmware, software, or incombinations thereof. Apparatus of the invention may be implemented in acomputer program product tangibly embodied in a machine-readable storagedevice for execution by a programmable processor; and method steps ofthe invention may be performed by a programmable processor executing aprogram of instructions to perform functions of the invention byoperating on input data and generating output. Note that the computerprogram might be transmitted from a server to a user device (e.g., hisor her PC) and then locally stored and executed.

The invention may advantageously be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object orientedprogramming language, or in assembly or machine language if desired;and, in any case, the language may be a compiled or interpretedlanguage. Suitable processors include, by way of example, both generaland special purpose microprocessors. Generally, a processor will receiveinstructions and data from a ROM and/or a RAM. Storage devices suitablefor tangibly embodying computer program instructions and data includeall forms of non-volatile memory, including, by way of example,semiconductor memory devices, such as EPROM and flash memory devices,magnetic disks such as internal hard disks and removable disks,magneto-optical disks; and CD-ROM disks. Any of the foregoing, may besupplemented by, or incorporated in, specially-designed ApplicationSpecific Integrated Circuits (ASICs).

A number of embodiments of the present invention have been described.Nevertheless, it will be understood that various modifications may bemade without departing from the spirit and scope of the invention. Forexample, various application programs can be accessed as resources by anetwork access device 211-219, or a network access device 211-219 may bea receive only device. Commands can be forwarded to a receive onlydevice to control a function of the device, however, no response isreceived back from a receive only device.

According to some other embodiments, the resource that is shared in apeer-to-peer fashion is an interface application that is controlled by(or communicating with) a human user or an automated process. Forexample, an automated process might use artificial intelligencetechniques to simulate human operators, such as to provide basiccustomer service when no human representatives are available (e.g.,technical support) or acting on the behalf of a human user to transactbusiness.

Moreover, the resource may provide controlled or uncontrolled access totraditional software applications, such as database systems,spread-sheets, and search engines. For example, the resource might valida user name and/or password before letting that user access information.

According to one embodiment, the resource is associated with a commondepository of messages from a plurality of other agents, creating a“bulletin-board” service.

According to still other embodiments, the resource is associated with aremote shopping service, guiding users through a collection ofcommercial wares (e.g., products and services). For example, users mightreceive graphical representations, descriptions, pricing information,and other information about products and services. Moreover, theresource might facilitate a sale of such items to a user.

According to yet other embodiments, the resource lets human users atremote locations communicate in various ways, including typed words,speech, pictures, and transmitted files. In this case, the resourcemight store a historic record of previous interactions with the samecorrespondent or correspondents, such that each new message appears inits proper conversational context. In this way, a consistent record ofan entire long-term interaction might be created (e.g., including text,graphical elements, and/or file transfers). Moreover, the historicalrecord might contain time-stamps indicating when each transaction wassent and/or received. In addition, the record might use encryption andother techniques to ensure that it is a complete and accurate record(e.g., to prevent unauthorized tampering). According to anotherembodiment, users might be allowed to modify the historical record(e.g., to provide a mechanism for collaborative writing).

In another embodiment, the resources are intermediary applications,receiving transmissions from a plurality of other resources andforwarding them unmodified to corresponding other resources, providing acontrolled bridge or access point suitable for crossing firewalls.

Transmissions between resources may be encrypted, digitally signed, orsubject to other security measures.

1. A method performed by a plurality of network access devices includinga processor and in communication via a communications network, themethod comprising: transmitting, via the communications network, to afirst network access device at least a portion of data residing in aregistry of resources available from at least a second network accessdevice remote from the first network access device; associating apersonal network address with at least a first available resource; andestablishing, using the associated personal network address, aconnection over the communications network between the second networkaccess device from which the first available resource is available andthe first network access device.
 2. The method of claim 1, wherein thepersonal network address comprises an Internet Protocol address and portnumber.
 3. The method of claim 1, wherein the first available resourcecomprises an application providing a service.
 4. The method of claim 1,wherein the first available resource comprises a depository of messagesfrom a plurality of agents.
 5. The method of claim 1, wherein the firstavailable resource comprises a shared application.
 6. The method ofclaim 1, wherein the first available resource comprises a chat session.7. The method of claim 1, wherein at least one of the first and secondnetwork access devices is a cellular communication device.
 8. The methodof claim 1, wherein at least one of the first and second network accessdevices is a portable handheld device.
 9. The method of claim 1, whereinthe first available resource enables communication between agents at thefirst and second network access devices.
 10. The method of claim 9,wherein the communication includes at least one of: (i) textinformation, (ii) audio information, (iii) image information, and (iv)executable information.
 11. The method of claim 9, wherein thecommunication comprises voice data.
 12. The method of claim 9, whereinat least one of the agents comprises a user.
 13. The method of claim 9,wherein at least one of the agents comprises an automated process. 14.The method of claim 9, wherein the communication comprises video data.15. A method performed by one or more network access devices including aprocessor, the method comprising: storing at a first network accessdevice a first registry of resources available via a communicationsnetwork to a plurality of network access devices; associating at thefirst network access device personal network addresses with one or moreresources comprising the first registry; receiving at the first networkaccess device a request from a second network access device;transmitting over the communications network from the first networkaccess device to the second network access device a personal networkaddress associated with one or more of the resources comprising theregistry of resources available; and establishing a connection over thecommunications network between the first network access device and thesecond network access device using the personal network addressassociated with a first available resource.
 16. The method of claim 15,further comprising determining that the first registry at the firstnetwork access device is an active registry.
 17. The method of claim 15,further comprising arranging for a second registry at a third networkaccess device to become an active registry.
 18. The method of claim 15,wherein the first available resource comprises a shared application. 19.The method of claim 15, wherein the first available resource comprises achat session.
 20. The method of claim 15, wherein at least one of thefirst and second network access devices is a cellular communicationdevice.
 21. The method of claim 15, wherein at least one of the firstand second network access devices is a portable handheld device.
 22. Themethod of claim 15, wherein the plurality of network access devices eachhave active registries.
 23. The method of claim 22, wherein at leastsome of the active registries are redundant.
 24. The method of claim 15,wherein at least one of the first and second network access devices is aportable handheld device and the first available resource comprises ashared application.
 25. A method performed by a plurality of networkaccess devices with access to a communications network, wherein eachnetwork access device comprises a processor, the method comprising:storing a first registry on at least one of the network access devices;receiving into the first registry a personal network address associatedwith a first resource available on the network access device;transmitting the personal network address associated with the firstresource to a requesting network access device; and establishing aconnection over the communications network between the requestingnetwork access device and a network access device hosting the firstresource using the associated personal network address associated withthe first resource.
 26. The method of claim 25, wherein the personalnetwork address comprises an Internet Protocol address and a portnumber.
 27. The method of claim 26, further comprising polling theInternet Protocol address to certify accuracy of the first registry. 28.The method of claim 25, further comprising storing a second registry ona second network access device, wherein the second registry comprisesthe same resource as the first registry, and making the second registryavailable to the network access devices if the first registry becomesunavailable via the communications network.
 29. The method of claim 25,wherein the first resource comprises a shared application.
 30. Themethod of claim 25, wherein the first resource comprises a chat session.31. The method of claim 25, wherein at least one of the requestingnetwork access device and the network access device hosting the firstresource is a cellular communication device.
 32. The method of claim 25,wherein at least one of the requesting network access device and thenetwork access device hosting the first resource is a portable handhelddevice.
 33. The method of claim 25, wherein at least one of the firstand second network access devices is a portable handheld device and thefirst available resource comprises a shared application.