Method and system for multipoint access within a mobile network

ABSTRACT

Aspects of the subject disclosure may include, for example, identifying a packet data protocol session that supports a first data exchange between a mobile application of a first mobile device and a first recipient device, wherein the first exchange of data comprises a directing of the first exchange of data through a network device. A second recipient device is determined, and a second data exchange is facilitated between the mobile application and the second recipient device by way of the packet data protocol session, wherein the second exchange of data also comprises a directing of the second exchange of data through the network device without modifying the first data exchange. Other embodiments are disclosed.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation of U.S. application Ser. No.15/590,646, filed May 9, 2017, which is incorporated herein by referencein its entirety.

BACKGROUND

Mobile applications are accessible by wireless communication devices,such as mobile phones, tablets, and more generally, any networkaccessible device, e.g., according to the Internet of Things (IoT).Depending upon the application and/or operating scenario an exampleconnected, or “smart” device is able to connect to multipledestinations, e.g., another device, a secure database server, and/or asecure streaming server, through a common packet data protocol session.In managing such data exchanges, one secure connection is torn downbefore another segregated secure connection is set up.

In some applications, distribution of data, such as multimedia, text andthe like, occurs using publicly accessible applications, such as variouspopular social media applications. In some instances, however, such dataexchanges can be subject to monitoring, censoring and/or restrictions,e.g., imposed by an employer, and/or another agency, such as agovernment agency, e.g., a school, a library, and so on. Accordingly,distribution of information such as pictures and videos to a largenumber of users and/or subscribers can be subject to restrictions beyondan individual's control.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 depicts an illustrative embodiment of a mobile communicationsystem that supports multipoint access;

FIG. 2 depicts an illustrative embodiment of another mobilecommunication system that supports multipoint access;

FIG. 3 depicts an illustrative embodiment of a process used in portionsof the systems described in FIGS. 1 and 2;

FIGS. 4-5 depict illustrative embodiments of communication systems thatprovide media services that support multipoint access;

FIG. 6 depicts an illustrative embodiment of a web portal forinteracting with the communication systems of FIGS. 1-2, and 4-5;

FIG. 7 depicts an illustrative embodiment of a communication device; and

FIG. 8 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methods describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments for enabling an application to have multiple segregated datasessions, including secure data sessions, from the same packet dataprotocol session to multiple destinations. Other embodiments aredescribed in the subject disclosure.

One or more aspects of the subject disclosure include a device, having aprocessing system that includes a processor, and a memory that storesexecutable instructions. The instructions, when executed by theprocessing system, facilitate performance of operations, includingidentifying a packet data protocol session that supports a firstexchange of data between a mobile application of a first mobile deviceand a first recipient device, by way of a network element. A secondrecipient device is identified, and a second exchange of data isinitiated between the mobile application and the second recipient deviceby way of the packet data protocol session, without modifying the firstexchange of data.

One or more aspects of the subject disclosure include a process thatincludes determining, by a processing system including a processor, apacket data protocol session that supports a first exchange of databetween a mobile application of a first mobile device and a firstrecipient device, by way of a network element. A second recipient deviceis determined by the processing, and a second exchange of data is alsofacilitated, by the processing system, between the mobile applicationand the second recipient device by way of the packet data protocolsession, without modifying the first exchange of data.

One or more aspects of the subject disclosure include a machine-readablestorage device, comprising executable instructions that, when executedby a processing system including a processor, facilitate performance ofoperations, including identifying a packet data protocol session thatsupports a first data exchange between a mobile application of a firstmobile device and a first recipient device, by way of a network device;determining a second recipient device; and facilitating a second dataexchange between the mobile application and the second recipient deviceby way of the packet data protocol session, without modifying the firstdata exchange.

FIG. 1 depicts an illustrative embodiment of a mobile communicationsystem 100 that supports multipoint access. A first mobile communicationdevice 102 includes at least one mobile application 104 adapted toaccess one or more network-accessible services 106 a, 106 b, 106 c, 106d, generally 106. In some embodiments, the system includes a privacyprofile register 108 that includes information obtained from theservices 106 accessed by the mobile application 104 of the first mobilecommunication device 102 a. For example, the privacy profile register108 can be used to facilitate access to information from the application104, by way of a streaming cloud service, e.g., a social streaming cloudservice 111.

By way of example, the privacy profile register 108 can includeinformation 100 that is synchronized with one or more of the mobileapplication 104, the services 106 used by the mobile application 104, ora combination thereof. Consider a user engaged in a communicationsession based on the mobile application 104, as information is entered,forwarded, received and/or otherwise modified through the mobile device,corresponding information 110 of the privacy profile register 108 isupdated, e.g., synchronized. Accordingly, information and/or status ofthe services 106 and/or the application 104 of the mobile device areavailable in an up-to-date manner at the privacy profile register 108.

In at least some embodiments, the privacy profile register 108 cantransfer, forward, or otherwise push information, such as thesynchronized information 110, to another mobile device 112 a. In someembodiments, the information 110 can be pushed continuously, allowingthe other mobile device 112 a to follow operation of the mobileapplication 104 and/or services 106 of the first mobile device 102.Alternatively or in addition, some and/or all of the information 110 canbe pushed periodically, e.g., according to a schedule and/or based on anevent. To the extent the communications and/or operation of the mobileapplication 104 and/or the services 106 are interrupted or otherwisecompromised, the other mobile device 112 a can establish apoint-to-point link that serves as a vehicle to exchange informationwith one or more recipient or destination devices, e.g., other mobiledevices 112 b, 112 c, 112 d, generally 112, a secure database 128,and/or other recipient devices.

Alternatively or in addition, the privacy profile register 108 canfacilitate an exchange of data between the mobile device 102, one ormore mobile devices at the event 114, and/or other recipient devices112. Data exchange can include, for example, streaming video and/oraudio associated with the event, e.g., video of a portion of a livesporting event obtained from equipment at the event 114 and distributedto other equipment, e.g., one or more of the mobile device 102 or theother mobile devices 212. In at least some embodiments, streaming mediafrom equipment at the event is accessed by way of a service 106 at thefirst mobile device 102. According to the techniques disclosed herein,the streaming media from the event 114 is distributed or otherwiseshared with one or more other recipient devices, such as the mobiledevices 112.

The system 100 further includes a carrier network 116 that facilitatescommunications between and/or among one or more of the first mobiledevice 102, the other mobile devices 112, and/or other recipientdevices. Other recipient devices can include, without limitation, one ormore of a secure database 128, an RPM database 130, fixed recipientdevices, e.g., workstations, datacenters, enterprise networks, servers,and other networks.

In at least some embodiments, the system 100 includes a network elementor device 118. The network element 118 can include, without limitation,one or more of a data selector and/or data switch, e.g., a multiplexer118. In the illustrative example, the multiplexer includes a firstseries of ports 120 associated with one or more data sources, e.g.,source ports 120: A, B, C, D, and a second series of ports 122associated with one or more distribution targets, e.g., datadestinations, including destination ports 122: W, X, Y, Z. In operation,an originating data device, e.g., the first mobile device 102,establishes an originating point-to-point (PTP) packet data connection124 between the first mobile device 102 and a source port 120, e.g.,source port B. The originating PTP connection 124 can be conveyed by anysuitable networking means, including fixed terrestrial networks, e.g.,fiberoptic networks, satellite networks, wireless networks, includingmobile radio networks, including 3GPP networks, e.g., 2G, 3G, 4G, LTE,LTE-A, 5G and/or non-3GPP networks, e.g., WiFi, Bluetooth, and so on.Generally speaking, the networking means can include one or more of widearea networks, e.g., the Internet, metropolitan networks, local areanetworks, personal area networks, public networks, private networks, andthe like.

It is understood that in at least some embodiments, the originating PTPconnection 124 can include a security protocol, e.g., IP sec,encryption, and the like. The multiplexer 118 applies port forwarding toestablish an association between the source port B and one or moredistribution ports 122, e.g., ports W, X, Y and Z. In the illustrativeexample, a first distribution data connection, e.g., PTP link 126 a, isestablished between the first distribution port W and a second mobiledevice 112 b. A second distribution data connection, e.g., PTP link 126b, is established between the second distribution port X and the securedatabase 128. Likewise, third and fourth distribution data connections,e.g., PTP links 126 c, 126 d, are respectively established between thethird and fourth distribution portions Y, Z and the third and fourthmobile devices 112 c, 112 d.

Ends of the originating PTP connection 124 include the application 104and/or service 106 of the first mobile device 102 and source port B ofthe multiplexer 118. It is understood that an encryption protocol can beapplied to this connection 124 to guard against unauthorizedinterception and/or access to exchanged data. The multiplexer 118applies one or more port forwarding algorithms to forward data betweenthe source port B and those distribution ports 122 employed in adistribution of data to equipment 112, 130 of intended recipients. Thesame and/or different security, e.g., encryption protocols can beapplied to the PTP links between the distribution ports 122 and therecipient devices 112, 130, e.g., to further guard against unauthorizedinterception and/or access to the exchanged data.

Accordingly, a single application 106 can instantiate multiplemedia-exchange connectivity within a single packet data protocolconnection session 124 by sending each secure connection 126 to adifferent predefined port 122 in the multiplexer 118. By way of example,the media exchange connectivity is based on a media exchange application106, such as WebRTC.

In at least some embodiments, the system 100 includes a multipointaccess server 134 (shown in phantom). The multipoint access server 134can be in communication with one or more of the privacy profile register108, the multiplexer 118, the originating device, e.g., the first mobiledevice 102 and one or more of equipment of the recipient devices 112,128. The multipoint access server 134, when provided, can participate inconfiguration of the multiplexer 118 and/or the rules engine 140. Theconfiguration can be based on user preferences, authorizationinformation, rules, and the like, e.g., obtained from one or more of therules engine 140, the policy database, 132, the privacy profile register108 and or the network devices 102, 112, 130.

It is understood that one or more of the multiplexer 118, the policydatabase, 132, the rules engine 140, and/or the multipoint access server134 can be operated and/or otherwise controlled by the same entity ordifferent entities. The entities can include, without limitation, amobile service provider, a service layer service provider, and/or asubscribed service provider, e.g., a third party unaffiliated with thecarrier network 116 and/or the social streaming cloud services. In atleast some embodiments, the multipoint access is provided as anover-the-top service to users of the carrier network 116.

In at least some embodiments, the system 100 includes a policy database.The policy database can include one or more predetermined policies thatcan be applied to multipoint distribution of data, e.g., streamingmedia, between an originating device 102 and one or more destinationdevices 112, 128. Policies can be identified and/or otherwise storedwithin the policy database 132. These policies can be applied and/orimposed by the system 100, e.g., by the multiplexer 118 and/or themultipoint access server 134.

In some embodiments, the system can include a rules engine 140 (shown inphantom). The rules engine 140 is in communication with one or more ofthe policy database 132, the multiplexer 118, and the multipoint accessserver 134. The rules engine 140 can receive policy information from thepolicy database 132 and identify one or more rules based on the policyinformation. The rules engine 140 can apply or otherwise impose the oneor more rules related to multipoint data exchanges. The rules can allowand/or deny port authorization and/or port forwarding. Alternatively orin addition, the rules can allow and/or deny participation of sourceand/or destination equipment 102, 112, 128. For example, policies may berelated to a user's access authorization, e.g., a subscription,equipment capabilities, allowing requests for multipoint access to beserviced while the authorization is valid. Alternatively or in additionthe rules can be based on one or more of various factors, such asservice level agreements of the originating user and/or the requestinguser(s). Other factors can include network conditions, e.g., restrictingdistribution based on congestion conditions, equipment capabilities,e.g., whether a requesting device is capable of receiving or accessingthe requested data. Equipment capabilities can include one or more ofradio type, mobility network software support, screen resolutions,available data, etc. Other factors can include a number of requestingusers, e.g., a threshold of supported recipients may be establishedafter which further requests are denied, at least until the number ofrecipients falls below the threshold, and/or the threshold is increased.Still other factor can include a priority level of the distributed data,the originating user and/or the recipient user, a location of theoriginating and/or requesting recipient device, and the like.

It is understood that in some instances, the first mobile device 102 canoriginate streaming media, e.g., video captured from a camera of thefirst mobile device 102, and/or audio captured from a microphone of thefirst mobile device 102. By way of example, a report may use a personalmobile communication device 102 to report on an event. The event mightbe a sporting event, or some other social event, e.g., includingsituations involving civil unrest. It is understood that some actors,e.g., governments, may attempt to censor, restrict and/or identifysources of information. To this end, such actors might imposerestrictions on applications and/or services, such as Facebook®,Twitter® and/or Instagram®, to monitor, identify, censor and/or restrictcertain data transfers. Beneficially, the techniques disclosed hereinfacilitate multipoint access or dissemination of information based onthe first mobile device 102.

Alternatively or in addition, other information from sensors of thefirst mobile device, such as geolocation, acceleration, speed,temperature, medical information, such as body temperature, heart rate,EKG, blood sugar level, blood oxygen level and the like.

Although the term recipient device is used in the illustrative examples,it is not meant to limit or otherwise suggest any limitation of adirection of data flow, an initiator or source of a data session versusa target of a data session, a calling party versus a called party, etc.For example, the first mobile device may initiate a first bidirectionaldata session, e.g., a first VoIP call to the first recipient device,followed by initiation of a second VoIP call to the second recipientdevice. Alternatively or in addition, the mobile device may be arecipient of a first data session, e.g., a first VoIP call from thefirst recipient device, followed by initiation of the second VoIP call.Without restriction, initiation of the second data session, e.g., VoIPcall, can result from action of any of the participating devices, e.g.,the first mobile device, the first recipient device, or the secondrecipient device. Alternatively or in addition, any of the data sessionscan be initiated by another source, such as an operator, an application,a third party subscriber, etc. Moreover, the data sessions can includebidirectional data sessions, such as the VoIP calls, or unidirectionalsessions, such as streaming video, audio, file transfer, download,upload, etc., in any direction, between any of the participatingdevices.

FIG. 2 depicts an illustrative embodiment of another mobilecommunication system 200 that supports multipoint access. The system 200includes a first mobile communication device 202 having at least onemobile application 204 adapted to access one or more network-accessibleservices 206 a, 206 b, 206 c, 206 d, generally 206. In some embodiments,the system 200 includes a privacy profile register 208 that includesinformation obtained from the services 206 accessed by the mobileapplication 204 of the first mobile communication device 202 a. Forexample, the privacy profile register 208 can be used to facilitateaccess to information from the application 204, by way of a cloudservice 211.

The privacy profile register 208 can include information 210 that issynchronized with one or more of the mobile application 204, theservices 206 used by the mobile application 204, or a combinationthereof. In at least some embodiments, the privacy profile register 208can transfer, forward, or otherwise push information, such as thesynchronized information 210, to another mobile device 212 a. In someembodiments, the information 110 can be pushed continuously, allowingthe other mobile device 112 a to follow operation of the mobileapplication 204 and/or services 206 of the first mobile device 202.Alternatively or in addition, some and/or all of the information 210 canbe pushed periodically, e.g., according to a schedule and/or based on anevent. To the extent the communications and/or operation of the mobileapplication 204 and/or the services 106 are interrupted or otherwisecompromised, the other mobile device 212 a can establish apoint-to-point link that serves as a vehicle to exchange informationwith one or more recipient or destination devices, e.g., other mobiledevices 212 b, 212 c, 212 d, generally 212, a secure database 228,and/or other recipient devices.

Alternatively or in addition, the privacy profile register 208 canfacilitate an exchange of data between the mobile device 202, one ormore mobile devices at the event 214, and/or other recipient devices212. Data exchange can include, for example, streaming video and/oraudio associated with the event, e.g., video of a portion of a livesporting event obtained from equipment at the event 214 and distributedto other equipment, e.g., one or more of the mobile device 202 or theother mobile devices 212.

The system 200 further includes a carrier network 216 that facilitatescommunications between and/or among one or more of the first mobiledevice 202, the other mobile devices 212, and/or other recipientdevices. The carrier network 216 can include terrestrial networks, e.g.,cable and/or fiberoptic networks, satellite networks, wireless networks,including mobile radio networks, including 3GPP networks, e.g., 2G, 3G,4G, LTE, LTE-A, 5G and/or non-3GPP networks, e.g., WiFi, Bluetooth, andso on. Other recipient devices can include, without limitation, one ormore of a secure database 228, fixed recipient devices, e.g.,workstations, datacenters, enterprise networks, servers, and othernetworks.

According to the illustrative example, the network 216 includes anadaptable network, such as a software defined network (SDN). SDNarchitectures can include a service layer that defines, identifies orotherwise instantiates one or more network infrastructures. Theinfrastructures can include virtual machines adapted to provide networkfunctions alone or in combination with traditional network elements. Ina 3GPP 5G scenario, the different network infrastructures are referredto generally as “slices.” One or more slices of a network can beconfigured to respective provide a predetermined level or type ofnetwork service. By way of example, available network slices can bebased on types of applications, priorities of users and/or data type,service level agreements, network congestion, subscription levels, andthe like.

Examples of network slices applied in 5G scenarios are disclosed in U.S.patent application Ser. No. 15/351,618, entitled “Method and Apparatusfor Dynamic Network Routing in a Software Defined Network,” filed onNov. 15, 2016, and incorporated herein by reference in its entirety.

SDN networks, such as the illustrative 5G example networks, typicallyinclude a network access and/or coordination device, referred to hereinas a management gateway. A first 5G management gateway 219 a isassociated with the first mobile device 202. The 5G management gateway219 a coordinates access to network services, including modifications tonetwork services as may be required during a course of operations. Themanagement gateway 219 a can facilitate access to one or more slices ofthe example 5G network based on requirements of the one or more services206 of the example application. It is understood that all services canbe provided by a single slice, or by a combination of more than oneslices. Combinations of network slices can be based on networkavailability, network management, and/or requirements related to theservice request, such as priorities, data type, application type, and soon.

The system includes a second 5G management gateway 219 servicing one ofthe destination mobile devices 212 b. The network 216 also includessession border control devices 217 a, 217 b, 217 c, generally 217.Session border control devices 217 can be deployed, e.g., in streamingmedia scenarios, such as VoIP, in which the session border controllerdevice 217 exert control over related signaling and sometimes mediastreams, involved in setting up, conducting and/or tearing down mediacommunications, including interactive media communications, such asVoIP.

Some networks 116, 216, such as the example 5G networks, separatecontrol signaling, handled by network resources sometimes referred to asa “control plane” from exchanges of user data, handled by networkresources sometimes referred to as a “user plane.” Beneficially,separation of the control and user planes allows the network toestablish requested connectivity and/or reconfigure, as required,without interrupting exchanges of data according to the user plane. Inparticular, it is understood that the techniques disclosed here, e.g.,in relation to the systems 100, 200 of FIGS. 1 and 2, can add and/ordrop recipient devices to an already established, and in at least someinstances, active data exchange.

The system 200 also includes an optional multipoint access server 234(shown in phantom) and a service platform 221. The multipoint accessserver 234, when provided, can be in communication with one or more ofthe privacy profile register 208, the 5G management gateway 219 and/orthe service platform 221. The multipoint access server 234 canfacilitate a preferred flow of information from a source application 204of a source device 202 to one or more destination devices 212 over thecarrier network.

Instead of using a switch or multiplexer configured with portforwarding, the present example, uses a forwarding technique. Namely,the source device 212, or an application 204 of the source device 212,establishes a first packet data protocol session in a point-to-pointlink to a destination device. The destination device can include one ofthe destination mobile devices 212, e.g., directly and/or by way ofanother device, such as one or more of the session border controllers217 and/or the 5G management gateway 219 b. In at least someembodiments, a first PDP session “A” between the source device 202 andthe 5G management gateway 219 a, can include a security protocol, e.g.,IP Sec or any suitable form of encryption, including proprietaryencryption, government encryption, commercial encryption, public keyencryption, and so on.

The first 5G management gateway 219 a, in turn, establishes apoint-to-point link with a first one of the other mobile devices 212 bby way of a first session boarder controller 217 a, along network links“B” & “C.” The first one of the other mobile devices 212 b, in turn,forwards the information to one or more other destinations by way ofother point-to-point links. In the illustrative example, the first oneof the other mobile devices 212 b establishes a point-to-point link witha second one of the other mobile devices 212 c by way of a second 5Gmanagement gateway 219 b and a second session boarder controller 217 b,along network links “D,” “E” & “F”.

The process can continue in a similar manner to extend to one or manyother recipient devices, access to a data exchange associated with theoriginating mobile device 202 and using the first point-to-point link“A.” Such an arrangement is sometimes casually referred to as a “daisychan.” Continuing with the illustrative example, the second one of theother mobile devices 212 c establishes a point-to-point link with athird one of the other mobile devices 212 d by way of the serviceplatform 221 and a third session boarder controller 217 c, along networklinks “G,” “H” & “I”.

In some applications, each of the devices 202, 212 incudes a respectivelist of recipient(s), e.g., recipient devices, to be used in forwardingmedia based on the originating device 202. Alternatively or in addition,the originating device 202 includes a list with multiple recipients thatcan include all or fewer than all recipients. A first point-to-pointlink with one of the listed recipients is instantiated. The list ofrecipients can be modified to identify that a distribution requirementand/or request associated with the one of the listed recipients has beensatisfied, e.g., crossed off the list. The one of the listed recipientsidentifies a second one of the remaining listed recipients andfacilitates establishment of a data session, e.g., a point-to-pointlink, with the second one of the remaining listed recipients. Theremaining list of recipients can be further modified to reflect that thesecond one of the remaining listed recipients has been serviced. Theprocess can continue in a like manner extending to as many, if not all,of the listed recipients.

Alternatively or in addition, a preferred distribution chain of thelisted recipient devices can be identified or otherwise imposed by atleast one device, e.g., the originating mobile device 202, themultipoint access server 234, the privacy profile register 208 and thelike.

In at least some embodiments, media data associated with the application204 of the originating device 202 is directed to a network storagelocation, such as a secure database 228. The data can be distributed ina like manner, e.g., using a chain of data sessions. It is understoodthat the media data, once stored, can be accessed and/or furtherdistributed coincidentally, or a later time, by one or more of equipmentof the same recipient devices and/or different recipient devices. Forexample, other equipment may place requests that are serviced after adata distribution has been initiated. It is understood that such laterrequests can be serviced from the secure database 228, e.g., as if itwere the originating recipient device. Namely, a first data session canbe initiated from the secure database 228, and distributed according tothe techniques disclosed herein, including the example systems 100, 200of FIGS. 1 and 2.

FIG. 3 depicts an illustrative embodiment of a process 300 used inportions of the systems described in FIGS. 1 and 2. The process 300identifies packet session having first data exchange between a referencenetwork device and a recipient device at 302. The reference networkdevice can be any network accessible device, such as a mobile device,e.g., a wireless device, or a fixed device. Wireless mobile devices caninclude, without limitation, a mobile phone, a connected device of ahome, e.g., a security sensor, a lock and/or lighting controls, avehicle, e.g., providing roadside assistance, manufacturer tracking,toll collections, a business, e.g., including business automation, pointof sale devices, manufacturing controls, enterprise networks, and thelike.

The exchange of data can be based on a service accessed by the referencenetwork device. Services can include, without limitation, subscribedservices, such as network services, e.g., VoIP, data, video, filetransfer, short message service, multimedia message service, email, filetransfer service using a file transfer protocol, web browsing, e.g.,based on hypertext transfer protocol, and the like. In at least someembodiments, the data exchange includes a data session. The data sessioncan include streaming media, such as voice and/or video.

The data session can be associated with one or more applicationsaccessed by the reference network device. For example, the referencenetwork device can participate in a WebRTC session including vide and/orvoice exchanged by way of web browsers of the reference network deviceand any recipient device.

A determination is made at 304, as to whether an extension and/ormodification is necessary. Examples of extensions and/or modificationscan include an identification of any other recipient devices that shouldparticipate in the aforementioned packet or data session. For example,it may be requested or otherwise determined that access to the WebRTCsession should be provided to one or more other recipient devices.Identification of any recipient devices can be obtained by equipment ofan originating user, e.g., the first mobile device 102, 202 (FIGS. 1-2).For example, the first mobile device 102, 202 can include an applicationthat accepts a user input, e.g., through a user interface, identifyingone or more recipient devices.

Such identifications can be made based on any of a variety oftechniques, such as identification of a network reference and/or addressof the recipient device, identification of a user or group of users andthe like. In some embodiments, a user can select recipient devices,e.g., users, from a local address book, a predetermined distributionlist, a modifiable list, e.g., allowing recipients to be added and/ordropped based on a previously defined list, and the like.

Alternatively or in addition, the identification of recipient devicescan be based on requests. The requests can be received from otherdevices and/or systems, such as the equipment of other recipientdevices, a data session coordinator, e.g., a service and/or application,an employer, a friend or family, a subscriber, etc. In at least someembodiments, requests are presented to an originating user and/or asession controller. For example, the requests can be presented in atable, a drop-down list, and the like. The originating user and/orsession controller can be presented with an option to accept or deny theentire list. Alternatively or in addition the individual members and/orgroups of members can be authorized and/or excluded based on theiridentification in a listing of requesters.

To the extent a request to extend and/or modify the recipients isdetected at 304, the process 300 proceeds to 306. Otherwise, the process300 can continue to monitor at 304. A second recipient device isidentified at 306. In some embodiments, the second recipient deviceincludes a group of recipient devices, e.g., two or more additionalrecipient devices.

A subsequent data exchange is initiated with second recipient deviceand/or group of recipient devices at 308, without interrupting packetsession.

It is understood that in at least some embodiments, the determining ofthe request to extend and/or modify occurs prior to or at a time ofinitiation of a data session of the first data exchange. Accordingly,the recipient devices and corresponding point-to-point links can beconfigured at an initiation time. Alternatively or in addition, thedetermining of the request to extend and/or modify occurs after a datasession of the first data exchange has been established. Namely, data isbeing exchanged, e.g., in a PDP session, between the reference networkdevice and at least one destination network device before the request toextend or modify is determined at 304. In establishing subsequent dataconnections, e.g., point-to-point links to service the second recipientdevice(s), this can be accomplished without a need for tearing down,interrupting and/or otherwise disturbing the first packet session. It isunderstood that the initiation of the second data exchange can includeany of the example techniques disclosed herein, such as the multiplexerusing a port-forwarding algorithm, the daisy-chain, in which equipmentof the first recipient device establishes a data connection, e.g., asecond point-to-point link with the second recipient device allowingdata obtained by the equipment of the first recipient device to beprovided to the equipment of the second recipient device by way of thesecond point-to-point link, without interrupting operations of the firstpoint-to-point link.

While for purposes of simplicity of explanation, the respectiveprocesses are shown and described as a series of blocks in FIG. 3, it isto be understood and appreciated that the claimed subject matter is notlimited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Moreover, not all illustrated blocks maybe required to implement the methods described herein.

Beneficially, the illustrative techniques disclosed herein provide anability to communicate with other recipient devices, e.g., subscribers,securely and efficiently. Such communications provide an ability tobypass regular social media network to share content with select numberof recipient devices, e.g., including equipment associated with apredefined individuals. The techniques disclosed herein provide anability to share private information, e.g., corporate information, witha relatively large number of people securely without risk of leaks inoutside any particular group. By way of reference, the numbers ofdistributions can be a handful, scores, hundreds, thousands, tens ofthousands, or more.

In at least some embodiments, other features include an ability todynamically change the list of recipients while sending the content, anability to store and use online backup in a secure cloud storage for anygiven media while gathering the information and transmitting to thelist.

FIG. 4 depicts an illustrative embodiment of a communication system 400for providing various communication services, such as delivering mediacontent. The communication system 400 can represent an interactive medianetwork, such as an interactive television system (e.g., an InternetProtocol Television (IPTV) media system). Communication system 400 canbe overlaid or operably coupled with mobile communication systems thatsupports multipoint access of FIGS. 1 and/or 2 as another representativeembodiment of communication system 400. For instance, one or moredevices illustrated in the communication system 400 of FIG. 4 canidentify a packet data protocol session that supports a first dataexchange between a mobile application of a first mobile device and afirst recipient device, determine a second recipient device, andfacilitate a second data exchange between the mobile application and thesecond recipient device by way of the packet data protocol session,without modifying the first data exchange.

In one or more embodiments, the communication system 400 can include asuper head-end office (SHO) 410 with at least one super headend officeserver (SHS) 411 which receives media content from satellite and/orterrestrial communication systems. In the present context, media contentcan represent, for example, audio content, moving image content such as2D or 3D videos, video games, virtual reality content, still imagecontent, and combinations thereof. The SHS server 411 can forwardpackets associated with the media content to one or more video head-endservers (VHS) 414 via a network of video head-end offices (VHO) 412according to a multicast communication protocol. The VHS 414 candistribute multimedia broadcast content via an access network 418 tocommercial and/or residential buildings 402 housing a gateway 404 (suchas a residential or commercial gateway).

The access network 418 can represent a group of digital subscriber lineaccess multiplexers (DSLAMs) located in a central office or a servicearea interface that provide broadband services over fiber optical linksor copper twisted pairs 419 to buildings 402. The gateway 404 can usecommunication technology to distribute broadcast signals to mediaprocessors 406 such as Set-Top Boxes (STBs) which in turn presentbroadcast channels to media devices 408 such as computers or televisionsets managed in some instances by a media controller 407 (such as aninfrared or RF remote controller).

The gateway 404, the media processors 406, and media devices 408 canutilize tethered communication technologies (such as coaxial, powerlineor phone line wiring) or can operate over a wireless access protocolsuch as Wireless Fidelity (WiFi), Bluetooth®, Zigbee®, or other presentor next generation local or personal area wireless network technologies.By way of these interfaces, unicast communications can also be invokedbetween the media processors 406 and subsystems of the IPTV media systemfor services such as video-on-demand (VoD), browsing an electronicprogramming guide (EPG), or other infrastructure services.

A satellite broadcast television system 429 can be used in the mediasystem of FIG. 4. The satellite broadcast television system can beoverlaid, operably coupled with, or replace the IPTV system as anotherrepresentative embodiment of communication system 400. In thisembodiment, signals transmitted by a satellite 415 that include mediacontent can be received by a satellite dish receiver 431 coupled to thebuilding 402. Modulated signals received by the satellite dish receiver431 can be transferred to the media processors 406 for demodulating,decoding, encoding, and/or distributing broadcast channels to the mediadevices 408. The media processors 406 can be equipped with a broadbandport to an Internet Service Provider (ISP) network 432 to enableinteractive services such as VoD and EPG as described above.

In yet another embodiment, an analog or digital cable broadcastdistribution system such as cable TV system 433 can be overlaid,operably coupled with, or replace the IPTV system and/or the satelliteTV system as another representative embodiment of communication system400. In this embodiment, the cable TV system 433 can also provideInternet, telephony, and interactive media services. System 400 enablesvarious types of interactive television and/or services including IPTV,cable and/or satellite.

The subject disclosure can apply to other present or next generationover-the-air and/or landline media content services system.

Some of the network elements of the IPTV media system can be coupled toone or more computing devices 430, a portion of which can operate as aweb server for providing web portal services over the ISP network 432 towireline media devices 408 or wireless communication devices 416.

Communication system 400 can also provide for all or a portion of thecomputing devices 430 to function as a device that supports multipointaccess in a mobile communication system (herein referred to as amultipoint access server 430). The multipoint access server 430 can usecomputing and communication technology to perform function 462, whichcan include among other things, the multipoint access techniquesdescribed by process 300 of FIG. 3. For instance, function 462 ofmultipoint access server 430 can be similar to the functions describedfor the multipoint access servers 134, 234 of FIGS. 1, 2 in accordancewith process 300. The media processors 406 and wireless communicationdevices 416 can be provisioned with software functions 464 and 466,respectively, to utilize the services of multipoint access server 430.For instance, functions 464 and 466 of media processors 406 and wirelesscommunication devices 416 can be similar to the functions described forthe communication devices 102, 202, 112, 212 of FIGS. 1-2 in accordancewith the process 300, FIG. 3.

Multiple forms of media services can be offered to media devices overlandline technologies such as those described above. Additionally, mediaservices can be offered to media devices by way of a wireless accessbase station 417 operating according to common wireless access protocolssuch as Global System for Mobile or GSM, Code Division Multiple Accessor CDMA, Time Division Multiple Access or TDMA, Universal MobileTelecommunications or UMTS, World interoperability for Microwave orWiMAX, Software Defined Radio or SDR, Long Term Evolution or LTE, and soon. Other present and next generation wide area wireless access networktechnologies can be used in one or more embodiments of the subjectdisclosure.

FIG. 5 depicts an illustrative embodiment of a communication system 500employing an IP Multimedia Subsystem (IMS) network architecture tofacilitate the combined services of circuit-switched and packet-switchedsystems. Communication system 500 can be overlaid or operably coupledwith system 100, 200 of FIGS. 1 and/or 2 and communication system 400 asanother representative embodiment of communication system 400. Forinstance, one or more devices illustrated in the communication system200 of FIG. 5, can identify a packet data protocol session that supportsa first data exchange between a mobile application of a first mobiledevice and a first recipient device, determine a second recipientdevice, and facilitate a second data exchange between the mobileapplication and the second recipient device by way of the packet dataprotocol session, without modifying the first data exchange.

Communication system 500 can comprise a Home Subscriber Server (HSS)540, a tElephone NUmber Mapping (ENUM) server 530, and other networkelements of an IMS network 550. The IMS network 550 can establishcommunications between IMS-compliant communication devices (CDs) 501,502, Public Switched Telephone Network (PSTN) CDs 503, 505, andcombinations thereof by way of a Media Gateway Control Function (MGCF)520 coupled to a PSTN network 560. The MGCF 520 need not be used when acommunication session involves IMS CD to IMS CD communications. Acommunication session involving at least one PSTN CD may utilize theMGCF 520.

IMS CDs 501, 502 can register with the IMS network 550 by contacting aProxy Call Session Control Function (P-CSCF) which communicates with aninterrogating CSCF (I-CSCF), which in turn, communicates with a ServingCSCF (S-CSCF) to register the CDs with the HSS 540. To initiate acommunication session between CDs, an originating IMS CD 501 can submita Session Initiation Protocol (SIP INVITE) message to an originatingP-CSCF 504 which communicates with a corresponding originating S-CSCF506. The originating S-CSCF 506 can submit the SIP INVITE message to oneor more application servers (ASs) 517 that can provide a variety ofservices to IMS subscribers.

For example, the application servers 517 can be used to performoriginating call feature treatment functions on the calling party numberreceived by the originating S-CSCF 506 in the SIP INVITE message.Originating treatment functions can include determining whether thecalling party number has international calling services, call IDblocking, calling name blocking, 7-digit dialing, and/or is requestingspecial telephony features (e.g., *72 forward calls, *73 cancel callforwarding, *67 for caller ID blocking, and so on). Based on initialfilter criteria (iFCs) in a subscriber profile associated with a CD, oneor more application servers may be invoked to provide various calloriginating feature services.

Additionally, the originating S-CSCF 506 can submit queries to the ENUMsystem 530 to translate an E.164 telephone number in the SIP INVITEmessage to a SIP Uniform Resource Identifier (URI) if the terminatingcommunication device is IMS-compliant. The SIP URI can be used by anInterrogating CSCF (I-CSCF) 507 to submit a query to the HSS 540 toidentify a terminating S-CSCF 514 associated with a terminating IMS CDsuch as reference 502. Once identified, the I-CSCF 507 can submit theSIP INVITE message to the terminating S-CSCF 514. The terminating S-CSCF514 can then identify a terminating P-CSCF 516 associated with theterminating CD 502. The P-CSCF 516 may then signal the CD 502 toestablish Voice over Internet Protocol (VoIP) communication services,thereby enabling the calling and called parties to engage in voiceand/or data communications. Based on the iFCs in the subscriber profile,one or more application servers may be invoked to provide various callterminating feature services, such as call forwarding, do not disturb,music tones, simultaneous ringing, sequential ringing, etc.

In some instances the aforementioned communication process issymmetrical. Accordingly, the terms “originating” and “terminating” inFIG. 5 may be interchangeable. It is further noted that communicationsystem 500 can be adapted to support video conferencing. In addition,communication system 500 can be adapted to provide the IMS CDs 501, 502with the multimedia and Internet services of communication system 400 ofFIG. 4.

If the terminating communication device is instead a PSTN CD such as CD503 or CD 505 (in instances where the cellular phone only supportscircuit-switched voice communications), the ENUM system 530 can respondwith an unsuccessful address resolution which can cause the originatingS-CSCF 506 to forward the call to the MGCF 520 via a Breakout GatewayControl Function (BGCF) 519. The MGCF 520 can then initiate the call tothe terminating PSTN CD over the PSTN network 560 to enable the callingand called parties to engage in voice and/or data communications.

It is further appreciated that the CDs of FIG. 5 can operate as wirelineor wireless devices. For example, the CDs of FIG. 5 can becommunicatively coupled to a cellular base station 521, a femtocell, aWiFi router, a Digital Enhanced Cordless Telecommunications (DECT) baseunit, or another suitable wireless access unit to establishcommunications with the IMS network 550 of FIG. 5. The cellular accessbase station 521 can operate according to common wireless accessprotocols such as GSM, CDMA, TDMA, UMTS, WiMax, SDR, LTE, and so on.Other present and next generation wireless network technologies can beused by one or more embodiments of the subject disclosure. Accordingly,multiple wireline and wireless communication technologies can be used bythe CDs of FIG. 5.

Cellular phones supporting LTE can support packet-switched voice andpacket-switched data communications and thus may operate asIMS-compliant mobile devices. In this embodiment, the cellular basestation 521 may communicate directly with the IMS network 550 as shownby the arrow connecting the cellular base station 521 and the P-CSCF516.

Alternative forms of a CSCF can operate in a device, system, component,or other form of centralized or distributed hardware and/or software.Indeed, a respective CSCF may be embodied as a respective CSCF systemhaving one or more computers or servers, either centralized ordistributed, where each computer or server may be configured to performor provide, in whole or in part, any method, step, or functionalitydescribed herein in accordance with a respective CSCF. Likewise, otherfunctions, servers and computers described herein, including but notlimited to, the HSS, the ENUM server, the BGCF, and the MGCF, can beembodied in a respective system having one or more computers or servers,either centralized or distributed, where each computer or server may beconfigured to perform or provide, in whole or in part, any method, step,or functionality described herein in accordance with a respectivefunction, server, or computer.

The multipoint access server 430 of FIG. 4 can be operably coupled tocommunication system 500 for purposes similar to those described above.The multipoint access server 430 can perform function 462 and therebyprovide multipoint access services to the CDs 501, 502, 503 and 505 ofFIG. 5, similar to the functions described for server 430 of FIG. 4 inaccordance with process 300 of FIG. 3. CDs 501, 502, 503 and 505, whichcan be adapted with software to perform function 572 to utilize theservices of the multipoint access server 430, similar to the functionsdescribed for communication devices 102, 112, 202, 212 of FIGS. 1 and/or2 in accordance with process 300 of FIG. 3. The multipoint access server430 can be an integral part of the application server(s) 517 performingfunction 574, which can be substantially similar to function 462 andadapted to the operations of the IMS network 550.

For illustration purposes only, the terms S-CSCF, P-CSCF, I-CSCF, and soon, can be server devices, but may be referred to in the subjectdisclosure without the word “server.” It is also understood that anyform of a CSCF server can operate in a device, system, component, orother form of centralized or distributed hardware and software. It isfurther noted that these terms and other terms such as DIAMETER commandsare terms can include features, methodologies, and/or fields that may bedescribed in whole or in part by standards bodies such as 3^(rd)Generation Partnership Project (3GPP). It is further noted that some orall embodiments of the subject disclosure may in whole or in partmodify, supplement, or otherwise supersede final or proposed standardspublished and promulgated by 3GPP.

FIG. 6 depicts an illustrative embodiment of a web portal 602 of acommunication system 600. Communication system 600 can be overlaid oroperably coupled with systems 100, 200 of FIGS. 1 and/or 2,communication system 400, and/or communication system 500 as anotherrepresentative embodiment of systems 100, 200 of FIGS. 1 and/or 2,communication system 400, and/or communication system 500. The webportal 602 can be used for managing services of systems 100, 200 ofFIGS. 1 and/or 2 and communication systems 400-500. A web page of theweb portal 602 can be accessed by a Uniform Resource Locator (URL) withan Internet browser using an Internet-capable communication device suchas those described in FIGS. 1 and/or 2 and FIGS. 4-5. The web portal 602can be configured, for example, to access a media processor 406 andservices managed thereby such as a Digital Video Recorder (DVR), a Videoon Demand (VoD) catalog, an Electronic Programming Guide (EPG), or apersonal catalog (such as personal videos, pictures, audio recordings,etc.) stored at the media processor 406. The web portal 602 can also beused for provisioning IMS services described earlier, provisioningInternet services, provisioning cellular phone services, and so on.

The web portal 602 can further be utilized to manage and provisionsoftware applications 462-466, and 572-574 to adapt these applicationsas may be desired by subscribers and/or service providers of systems100, 200 of FIGS. 1 and/or 2, and communication systems 400-500. Forinstance, users of the services provided by server 134, 234 or server430 can log into their on-line accounts and provision the servers 134,234 or server 430 with lists of recipient devices, users, and/or deviceswith which data will be exchanged using a common point-to-pointprotocol. For example, an originating user can configure accomplish oneor more of identifying destination(s), configure security features,e.g., encryption, establish, review and/or revise policies related todata distribution, and the like. The originating user can include usersthat provide a data stream to be distributed according to the techniquesdisclosed herein.

In some embodiments, the users of the services provided by the servers134, 234, 430 can request data distributed by the originating user. Forexample, requests of data recipients can be lodged through anapplication. The application can present the requests to an entity,e.g., equipment of the originating user, for review, acceptance and/ordenial. Alternatively or in addition, the application can review, acceptand/or deny such requests based on a predetermine set of rules and/orpolicies. By way of example, rules or policies can be based on one ormore of various factors, such as service level agreements of theoriginating user and/or the requesting user(s). Other factors caninclude network conditions, e.g., restricting distribution based oncongestion conditions, equipment capabilities, e.g., whether arequesting device is capable of receiving or accessing the requesteddata. Equipment capabilities can include one or more of radio type,mobility network software support, screen resolutions, available data,etc. Other factors can include a number of requesting users, e.g., athreshold of supported recipients may be established after which furtherrequests are denied, at least until the number of recipients falls belowthe threshold, and/or the threshold is increased. Still other factor caninclude a priority level of the distributed data, the originating userand/or the recipient user, a location of the originating and/orrequesting recipient device, and the like.

Features, such as one or more of any of the foregoing examples can beprogrammed, for example, in user profiles that can be used to providerelated information to the server 134, 234, 430 to enable it tocommunication with devices described in FIGS. 1-5, such as theapplications 104, 204, the multiplexer 118, the policy database 132, thesecure database 128, the RPM database 130, the policy profile register108, 208, the mobile devices 112, 212, the management gateways, 219, thesession border controllers 217, the service platform, 221, and so on.Service providers can log onto an administrator account to provision,monitor and/or maintain the systems 100, 200 of FIGS. 1 and/or 2 orserver 430.

FIG. 7 depicts an illustrative embodiment of a communication device 700.Communication device 700 can serve in whole or in part as anillustrative embodiment of the devices depicted in FIGS. 1 and/or 2, andFIGS. 4-5 and can be configured to perform portions of the process 300of FIG. 3.

Communication device 700 can comprise a wireline and/or wirelesstransceiver 702 (herein transceiver 702), a user interface (UI) 704, apower supply 714, a location receiver 716, a motion sensor 718, anorientation sensor 720, and a controller 706 for managing operationsthereof. The transceiver 702 can support short-range or long-rangewireless access technologies such as Bluetooth®, ZigBee®, WiFi, DECT, orcellular communication technologies, just to mention a few (Bluetooth®and ZigBee® are trademarks registered by the Bluetooth® Special InterestGroup and the ZigBee® Alliance, respectively). Cellular technologies caninclude, for example, CDMA-1X, UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO,WiMAX, SDR, LTE, as well as other next generation wireless communicationtechnologies as they arise. The transceiver 702 can also be adapted tosupport circuit-switched wireline access technologies (such as PSTN),packet-switched wireline access technologies (such as TCP/IP, VoIP,etc.), and combinations thereof.

The UI 704 can include a depressible or touch-sensitive keypad 708 witha navigation mechanism such as a roller ball, a joystick, a mouse, or anavigation disk for manipulating operations of the communication device700. The keypad 708 can be an integral part of a housing assembly of thecommunication device 700 or an independent device operably coupledthereto by a tethered wireline interface (such as a USB cable) or awireless interface supporting for example Bluetooth®. The keypad 708 canrepresent a numeric keypad commonly used by phones, and/or a QWERTYkeypad with alphanumeric keys. The UI 704 can further include a display710 such as monochrome or color LCD (Liquid Crystal Display), OLED(Organic Light Emitting Diode) or other suitable display technology forconveying images to an end user of the communication device 700. In anembodiment where the display 710 is touch-sensitive, a portion or all ofthe keypad 708 can be presented by way of the display 710 withnavigation features.

The display 710 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 700 can be adapted to present a user interface withgraphical user interface (GUI) elements that can be selected by a userwith a touch of a finger. The touch screen display 710 can be equippedwith capacitive, resistive or other forms of sensing technology todetect how much surface area of a user's finger has been placed on aportion of the touch screen display. This sensing information can beused to control the manipulation of the GUI elements or other functionsof the user interface. The display 710 can be an integral part of thehousing assembly of the communication device 700 or an independentdevice communicatively coupled thereto by a tethered wireline interface(such as a cable) or a wireless interface.

The UI 704 can also include an audio system 712 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 712 can further include amicrophone for receiving audible signals of an end user. The audiosystem 712 can also be used for voice recognition applications. The UI704 can further include an image sensor 713 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 714 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 700 to facilitatelong-range or short-range portable applications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 716 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 700 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor 718can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 700 in three-dimensional space. Theorientation sensor 720 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device700 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 700 can use the transceiver 702 to alsodetermine a proximity to a cellular, WiFi, Bluetooth®, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 706 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 700.

Other components not shown in FIG. 7 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 700 can include a reset button (not shown). The reset button canbe used to reset the controller 706 of the communication device 700. Inyet another embodiment, the communication device 700 can also include afactory default setting button positioned, for example, below a smallhole in a housing assembly of the communication device 700 to force thecommunication device 700 to re-establish factory settings. In thisembodiment, a user can use a protruding object such as a pen or paperclip tip to reach into the hole and depress the default setting button.The communication device 700 can also include a slot for adding orremoving an identity module such as a Subscriber Identity Module (SIM)card. SIM cards can be used for identifying subscriber services,executing programs, storing subscriber data, and so forth.

The communication device 700 as described herein can operate with moreor less of the circuit components shown in FIG. 7. These variantembodiments can be used in one or more embodiments of the subjectdisclosure.

The communication device 700 can be adapted to perform the functions ofdevices of FIGS. 1 and/or 2, the media processor 406, the media devices408, or the portable communication devices 416 of FIG. 4, as well as theIMS CDs 501-502 and PSTN CDs 503-505 of FIG. 5. It will be appreciatedthat the communication device 700 can also represent other devices thatcan operate in systems of FIGS. 1 and/or 2, communication systems400-500 of FIGS. 4-5 such as a gaming console and a media player. Inaddition, the controller 706 can be adapted in various embodiments toperform the functions 462-466 and 572-574, respectively.

Upon reviewing the aforementioned embodiments, it would be evident to anartisan with ordinary skill in the art that said embodiments can bemodified, reduced, or enhanced without departing from the scope of theclaims described below. For example, the concepts of a multiplexer usinga port forwarding algorithm and a daisy chain technique can be appliedin various combinations. In a first example, a first multiplexerestablishes network connections between a reference or source recipientdevice and multiple recipient devices, wherein, one of the recipientdevices comprises a second multiplexer. The second multiplexer applies asecond port forwarding algorithm, by which data obtained by way of adata connection from the first multiplexer at an input port of thesecond multiplexer, is distributed to one or more output ports of thesecond multiplexer. The process can be repeated in a like manner anynumber of times to very quickly achieve a very large number of recipientdevices. In at least one example, a multiplexer can have up to about64,000 ports.

Other configurations can include combinations of daisy chaining withmultiplexer with port forwarding. For example, a multiplexer maintains afirst data connection, e.g., a point-to-point connection with anoriginating network device, and multiple outputs to other recipientdevices. At least one of the other recipient devices can establishsubsequent data connections to yet other recipient devices, allowing fordata obtained from the multiplexer to be distributed according to thesubsequent data connections. The multiplexer and daisy chain techniquescan be applied repeatedly in various combinations, without restriction.Other embodiments can be used in the subject disclosure.

It should be understood that devices described in the exemplaryembodiments can be in communication with each other via various wirelessand/or wired methodologies. The methodologies can be links that aredescribed as coupled, connected and so forth, which can includeunidirectional and/or bidirectional communication over wireless pathsand/or wired paths that utilize one or more of various protocols ormethodologies, where the coupling and/or connection can be direct (e.g.,no intervening processing device) and/or indirect (e.g., an intermediaryprocessing device such as a router).

FIG. 8 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 800 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethods described above. One or more instances of the machine canoperate, for example, as the multipoint access server 134, 234, 430, themedia processor 406, to enable it to communication with entitiesdescribed in FIGS. 1-5, such as the applications 104, 204, themultiplexer 118, the policy database 132, the secure database 128, theRPM database 130, the policy profile register 108, 208, the mobiledevices 112, 212, the management gateways, 219, the session bordercontrollers 217, the service platform, 221 and other devices of FIGS.1-2 and 4-7. In some embodiments, the machine may be connected (e.g.,using a network 826) to other machines. In a networked deployment, themachine may operate in the capacity of a server or a client user machinein a server-client user network environment, or as a peer machine in apeer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet, a smart phone, a laptop computer, adesktop computer, a control system, a network router, switch or bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a communication device of the subject disclosureincludes broadly any electronic device that provides voice, video ordata communication. Further, while a single machine is illustrated, theterm “machine” shall also be taken to include any collection of machinesthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methods discussed herein.

The computer system 800 may include a processor (or controller) 802(e.g., a central processing unit (CPU)), a graphics processing unit(GPU, or both), a main memory 804 and a static memory 806, whichcommunicate with each other via a bus 808. The computer system 800 mayfurther include a display unit 810 (e.g., a liquid crystal display(LCD), a flat panel, or a solid state display). The computer system 800may include an input device 812 (e.g., a keyboard), a cursor controldevice 814 (e.g., a mouse), a disk drive unit 816, a signal generationdevice 818 (e.g., a speaker or remote control) and a network interfacedevice 820. In distributed environments, the embodiments described inthe subject disclosure can be adapted to utilize multiple display units810 controlled by two or more computer systems 800. In thisconfiguration, presentations described by the subject disclosure may inpart be shown in a first of the display units 810, while the remainingportion is presented in a second of the display units 810.

The disk drive unit 816 may include a tangible computer-readable storagemedium 822, e.g., a device, on which is stored one or more sets ofinstructions (e.g., software 824) embodying any one or more of themethods or functions described herein, including those methodsillustrated above. The instructions 824 may also reside, completely orat least partially, within the main memory 804, the static memory 806,and/or within the processor 802 during execution thereof by the computersystem 800. The main memory 804 and the processor 802 also mayconstitute tangible computer-readable storage media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Application specific integrated circuits andprogrammable logic array can use downloadable instructions for executingstate machines and/or circuit configurations to implement embodiments ofthe subject disclosure. Applications that may include the apparatus andsystems of various embodiments broadly include a variety of electronicand computer systems. Some embodiments implement functions in two ormore specific interconnected hardware modules or devices with relatedcontrol and data signals communicated between and through the modules,or as portions of an application-specific integrated circuit. Thus, theexample system is applicable to software, firmware, and hardwareimplementations.

In accordance with various embodiments of the subject disclosure, theoperations or methods described herein are intended for operation assoftware programs or instructions running on or executed by a computerprocessor or other computing device, and which may include other formsof instructions manifested as a state machine implemented with logiccomponents in an application specific integrated circuit or fieldprogrammable gate array. Furthermore, software implementations (e.g.,software programs, instructions, etc.) including, but not limited to,distributed processing or component/object distributed processing,parallel processing, or virtual machine processing can also beconstructed to implement the methods described herein. Distributedprocessing environments can include multiple processors in a singlemachine, single processors in multiple machines, and/or multipleprocessors in multiple machines. It is further noted that a computingdevice such as a processor, a controller, a state machine or othersuitable device for executing instructions to perform operations ormethods may perform such operations directly or indirectly by way of oneor more intermediate devices directed by the computing device.

While the tangible computer-readable storage medium 822 is shown in anexample embodiment to be a single medium, the term “tangiblecomputer-readable storage medium” should be taken to include a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “tangible computer-readable storage medium” shallalso be taken to include any non-transitory medium that is capable ofstoring or encoding a set of instructions for execution by the machineand that cause the machine to perform any one or more of the methods ofthe subject disclosure. The term “non-transitory” as in a non-transitorycomputer-readable storage includes without limitation memories, drives,devices and anything tangible but not a signal per se.

The term “tangible computer-readable storage medium” shall accordinglybe taken to include, but not be limited to: solid-state memories such asa memory card or other package that houses one or more read-only(non-volatile) memories, random access memories, or other re-writable(volatile) memories, a magneto-optical or optical medium such as a diskor tape, or other tangible media which can be used to store information.Accordingly, the disclosure is considered to include any one or more ofa tangible computer-readable storage medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are from time-to-timesuperseded by faster or more efficient equivalents having essentiallythe same functions. Wireless standards for device detection (e.g.,RFID), short-range communications (e.g., Bluetooth®, WiFi, Zigbee®), andlong-range communications (e.g., WiMAX, GSM, CDMA, LTE) can be used bycomputer system 800. In one or more embodiments, information regardinguse of services can be generated including services being accessed,media consumption history, user preferences, and so forth. Thisinformation can be obtained by various methods including user input,detecting types of communications (e.g., video content vs. audiocontent), analysis of content streams, and so forth. The generating,obtaining and/or monitoring of this information can be responsive to anauthorization provided by the user. In one or more embodiments, ananalysis of data can be subject to authorization from user(s) associatedwith the data, such as an opt-in, an opt-out, acknowledgementrequirements, notifications, selective authorization based on types ofdata, and so forth.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Theexemplary embodiments can include combinations of features and/or stepsfrom multiple embodiments. Other embodiments may be utilized and derivedtherefrom, such that structural and logical substitutions and changesmay be made without departing from the scope of this disclosure. Figuresare also merely representational and may not be drawn to scale. Certainproportions thereof may be exaggerated, while others may be minimized.Accordingly, the specification and drawings are to be regarded in anillustrative rather than a restrictive sense.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement which achieves thesame or similar purpose may be substituted for the embodiments describedor shown by the subject disclosure. The subject disclosure is intendedto cover any and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, can be used in the subject disclosure.For instance, one or more features from one or more embodiments can becombined with one or more features of one or more other embodiments. Inone or more embodiments, features that are positively recited can alsobe negatively recited and excluded from the embodiment with or withoutreplacement by another structural and/or functional feature. The stepsor functions described with respect to the embodiments of the subjectdisclosure can be performed in any order. The steps or functionsdescribed with respect to the embodiments of the subject disclosure canbe performed alone or in combination with other steps or functions ofthe subject disclosure, as well as from other embodiments or from othersteps that have not been described in the subject disclosure. Further,more than or less than all of the features described with respect to anembodiment can also be utilized.

Less than all of the steps or functions described with respect to theexemplary processes or methods can also be performed in one or more ofthe exemplary embodiments. Further, the use of numerical terms todescribe a device, component, step or function, such as first, second,third, and so forth, is not intended to describe an order or functionunless expressly stated so. The use of the terms first, second, thirdand so forth, is generally to distinguish between devices, components,steps or functions unless expressly stated otherwise. Additionally, oneor more devices or components described with respect to the exemplaryembodiments can facilitate one or more functions, where the facilitating(e.g., facilitating access or facilitating establishing a connection)can include less than every step needed to perform the function or caninclude all of the steps needed to perform the function.

In one or more embodiments, a processor (which can include a controlleror circuit) has been described that performs various functions. Itshould be understood that the processor can be multiple processors,which can include distributed processors or parallel processors in asingle machine or multiple machines. The processor can be used insupporting a virtual processing environment. The virtual processingenvironment may support one or more virtual machines representingcomputers, servers, or other computing devices. In such virtualmachines, components such as microprocessors and storage devices may bevirtualized or logically represented. The processor can include a statemachine, application specific integrated circuit, and/or programmablegate array including a Field PGA. In one or more embodiments, when aprocessor executes instructions to perform “operations”, this caninclude the processor performing the operations directly and/orfacilitating, directing, or cooperating with another device or componentto perform the operations.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, it can beseen that various features are grouped together in a single embodimentfor the purpose of streamlining the disclosure. This method ofdisclosure is not to be interpreted as reflecting an intention that theclaimed embodiments require more features than are expressly recited ineach claim. Rather, as the following claims reflect, inventive subjectmatter lies in less than all features of a single disclosed embodiment.Thus the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separately claimedsubject matter.

What is claimed is:
 1. A device, comprising: a processing systemincluding a processor; and a memory that stores executable instructionsthat, when executed by the processing system, facilitate performance ofoperations, comprising: identifying a packet data protocol session thatsupports a first exchange of data between a mobile application of afirst mobile device and a first recipient device, wherein the firstexchange of data comprises a directing of the first exchange of datathrough a network element; obtaining a request to identify a secondrecipient device, prior to a time of initiation of the first exchange ofdata; in accordance with the request, identifying the second recipientdevice; and initiating a second exchange of data between the mobileapplication and the second recipient device by way of the packet dataprotocol session, wherein the packet data protocol session comprises afirst point-to-point link between the mobile application and the networkelement and a second point-to-point link between the network element andthe first recipient device, and wherein the second exchange of datacomprises a directing of the second exchange of data through the networkelement without modifying the first exchange of data.
 2. The device ofclaim 1, wherein the first point-to-point link is between the mobileapplication and a first port of the network element and the secondpoint-to-point link is between a second port of the network element andthe first recipient device.
 3. The device of claim 2, wherein the secondport of the network element is one of a plurality of ports of thenetwork element providing a plurality of secure data connections.
 4. Thedevice of claim 3, wherein each of the plurality of secure dataconnections is associated with a different predefined port of theplurality of ports of the network element.
 5. The device of claim 2,wherein the packet data protocol session comprises a port forwardingbetween the first port of the network element and the second port of thenetwork element.
 6. The device of claim 5, wherein the network elementcomprises a multiplexer.
 7. The device of claim 6, wherein the firstpoint-to-point link, the second point-to-point link or a combinationthereof further comprises application of an encryption protocol to thefirst exchange of data, the second exchange of data, or both.
 8. Thedevice of claim 1, wherein the initiating of the second exchange of databetween the mobile application and the second recipient device by way ofthe packet data protocol session occurs without interrupting thedirecting of the first exchange of data through the network element. 9.The device of claim 1, wherein the first exchange of data between amobile application of a first mobile device and a first recipient deviceand the second exchange of data between the mobile application and thesecond recipient device use a common tunneling protocol.
 10. The deviceof claim 9, wherein the common tunneling protocol comprises a real-time,peer-to-peer, streaming media exchange protocol.
 11. A method,comprising: identifying, by a processing system including a processor, apacket data protocol session that supports a first exchange of databetween a mobile application of a first mobile device and a firstrecipient device, wherein the first exchange of data comprises adirecting of the first exchange of data through a network element;obtaining, by the processing system, a request to identify a secondrecipient device, prior to a time of initiation of the first exchange ofdata; in accordance with the request, identifying, by the processingsystem, the second recipient device; and initiating, by the processingsystem, a second exchange of data between the mobile application and thesecond recipient device by way of the packet data protocol session,wherein the packet data protocol session comprises a firstpoint-to-point link between the mobile application and the networkelement and a second point-to-point link between the network element andthe first recipient device.
 12. The method of claim 11, wherein thesecond exchange of data comprises a directing of the second exchange ofdata through the network element without modifying the first exchange ofdata.
 13. The method of claim 11, wherein the first point-to-point linkis between the mobile application and a first port of the networkelement and the second point-to-point link is between a second port ofthe network element and the first recipient device.
 14. The method ofclaim 13, wherein the second port of the network element is one of aplurality of ports of the network element providing a plurality ofsecure data connections, and wherein each of the plurality of securedata connections is associated with a different predefined port of theplurality of ports of the network element.
 15. The method of claim 13,wherein the packet data protocol session comprises a port forwardingbetween the first port of the network element and the second port of thenetwork element.
 16. The method of claim 11, wherein the initiating ofthe second exchange of data between the mobile application and thesecond recipient device by way of the packet data protocol sessionoccurs without interrupting the directing of the first exchange of datathrough the network element.
 17. A machine-readable medium comprisingexecutable instructions that, when executed by a processing systemincluding a processor, facilitate performance of operations comprising:identifying a packet data protocol session that supports a firstexchange of data between a mobile application of a first mobile deviceand a first recipient device, wherein the first exchange of datacomprises a directing of the first exchange of data through a networkelement; obtaining a request to identify a second recipient device,prior to a time of initiation of the first exchange of data; inaccordance with the request, identifying the second recipient device;and initiating a second exchange of data between the mobile applicationand the second recipient device by way of the packet data protocolsession, wherein the packet data protocol session comprises a firstpoint-to-point link between the mobile application and the networkelement and a second point-to-point link between the network element andthe first recipient device, and wherein the second exchange of datacomprises a directing of the second exchange of data through the networkelement.
 18. The machine-readable medium of claim 17, wherein thedirecting of the second exchange of data through the network elementoccurs without modifying the first exchange of data.
 19. Themachine-readable medium of claim 17, wherein the initiating of thesecond exchange of data between the mobile application and the secondrecipient device by way of the packet data protocol session occurswithout interrupting the directing of the first exchange of data throughthe network element.
 20. The machine-readable medium of claim 17,wherein the network element comprises a multiplexer, and wherein thefirst point-to-point link, the second point-to-point link or acombination thereof further comprises application of an encryptionprotocol to the first exchange of data, the second exchange of data, orboth.