Wearable group communication device bypass connectivity

ABSTRACT

Upon detection of a failure of a communication link between a remote management system and a communication node, a bypass link is established. The remote management system evaluates whether additional communication nodes can act as a bypass for management communications between the remote management system and the communication node whose management communication link has failed. The remote management system instructs a selected bypass communication node to establish the bypass management communication link between the bypass node and the disconnected node whose management communication link has failed. Depending on the relationship between nodes, management communications sent using the bypass link may be secured. The bypass link in some implementations may include multiple bypass communication nodes linked together to provide a chain of bypass management communication links between the remote management system and the disconnected communication node.

RELATED APPLICATIONS

This application hereby claims the benefit of and priority to U.S.Provisional Patent Application 62/232,659, entitled “DENIED CONNECTIVITYAVAILABILITY FOR WEARABLE GROUP COMMUNICATION DEVICES,” filed Sep. 25,2015, and which is hereby incorporated by reference in its entirety.

TECHNICAL FIELD

Aspects of the disclosure are related to the field of communicationsand, in particular, to bypass connectivity for group communications.

TECHNICAL BACKGROUND

Various communication devices can be employed to facilitatecommunication between users. These devices can include cellulartelephones, smartphones, discrete devices, computers, and tablets, amongothers, which provide an efficient way for users to communicate withoutbeing in the same physical location. Often it is desirable to groupthese communication devices together so that multiple users may easilycommunicate with each other while excluding from the group those notinvolved in the discussion. However, due to the limited nature ofwireless communications, it is possible for one or more devices withinone or more groups to lose contact with each other or with centralizedmanagement systems, which may result in lost communications for thosedevices.

OVERVIEW BACKGROUND

When a communication link fails between a remote management system and acommunication node in a group communication system, a bypasscommunication link is established. When the link failure is detected,the remote management system can evaluate whether one or more additionalcommunication nodes are available that can act as a bypass formanagement communications between the remote management system and thecommunication node whose management communication link has failed. Afterselecting a bypass communication node, the remote management systeminstructs the bypass communication node to establish a bypass managementcommunication link between the bypass node and the node whose managementcommunication link has failed.

If the original communication node and the bypass node are in the samecommunication group or are otherwise affiliated, managementcommunications may be sent as usual. If the bypass communication node isoutside a communication group to which the original communication nodebelongs, then the management communications sent using the bypass linkmay be secured (e.g., through encryption). Moreover, the bypass link insome implementations may include multiple bypass communication nodeslinked together to provide a chain of bypass management communicationlinks.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the disclosure can be better understood with referenceto the following drawings. The components in the drawings are notnecessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the present disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views. While several embodiments are described inconnection with these drawings, the disclosure is not limited to theembodiments disclosed herein. On the contrary, the intent is to coverall alternatives, modifications, and equivalents.

FIG. 1 illustrates a communication system.

FIG. 2 illustrates a communication system.

FIG. 3 illustrates a communication system.

FIG. 4 illustrates a remote management system.

FIG. 5 illustrates a method for operating a remote management system.

FIG. 6 illustrates a communication node.

DETAILED DESCRIPTION

In the examples below, personal communication nodes are discussed whichallow group communication sessions among various users. These personalcommunication nodes can include discrete devices specialized for groupcommunications that include one or more wireless transceivers and userinterface elements tailored to streamlined group communications. Thegroup communications can be initiated and altered by user interventionand/or automatically by a shared remote management system which canrespond to one or more dynamic factors to form or change groups or groupstatus. In some examples, one or more features of the discrete devicescan be incorporated into other devices, such as personal communicationdevices which comprise cellular smartphones, gaming devices, personalcomputers, tablet computers, and the like. Voice command features can beincluded that comprise group forming and alteration features,keyword-based searching, productivity assistance, or navigationassistance, among other features. Further features can includeconversational interaction for information transmittal or retrieval,such as activity reminders, weather, stocks, messaging, email, calendar,contacts, notes, music, clocks, web browsers, maps and otherapplications.

Once a group has been formed, communication nodes that are members ofthe group may exchange secure communications with each other whilemaintaining communication (e.g., via wireless and/or other connectivity)with a remote management system that configures and controls the group.However, if a member node loses communication and/or connectivity withthe remote management system, that management system may no longer beable to update group configurations and/or provide other services. Inorder to prevent the disconnected member node from losing itsfunctionality, bypass connectivity communication with the remotemanagement system is provided securely, either through other membernodes within the group or through non-member nodes.

In a first non-limiting example, FIG. 1 illustrates communication system100, which can be employed to provide intelligent agent features forcommunication nodes 102-105. System 100 includes communication nodes102-105, and remote management system 150. Communication nodes 102-105typically operate in groups, such as Group A 110 and Group B 120 forexample. These groups are defined by remote management system 150 (e.g.,based on dynamic attributes communicated to remote management system 150from communication nodes 102-105 or monitored by remote managementsystem 150, or based on node user inputs). Group A 110 and Group B 120can each comprise a nexus of specified communication nodes 102-105 forinteractive communications, information sharing, data exchange, andother mutual exchange.

Communication nodes 102-105 may each comprise transceivers, audiotransducers, processing systems, communication interfaces, environmentalsensors, accelerometers, gyroscopes, Global Positioning System (GPS)receivers, user interfaces, and other systems. Remote management system150 may comprise a computing system comprising one or more computingdevices capable of managing services to a plurality of communicationnodes, such as communication nodes 102-105.

Communication nodes 102-105 communicate with each other or with othercommunication nodes or intelligent agents over associated links 131-134.Communication links 131-134 can be used to connect communication nodes102-105 to each other and/or to other personal communication nodes. Insome examples, links 131-134 may comprise a mesh network amongcommunication nodes 102-105. Communication nodes 102-105 can alsocommunicate with remote management system 150 over associated ones ofmanagement communication links 141-144, which can comprise one or morenetwork links in this example. Management communication links 141-144connect communication nodes 102-105 to remote management system 150.

Links 131-134 and 141-144 can each comprise one or more wireless linksthat can each further include Long Term Evolution (LTE), Global SystemFor Mobile Communications (GSM), Code Division Multiple Access (CDMA),IEEE 802.11 WiFi, Bluetooth, Personal Area Networks (PANs), Wide AreaNetworks, (WANs), Local Area Networks (LANs), or Wireless Local AreaNetworks (WLANs), including combinations, variations, and improvementsthereof. These links can carry any communication protocol suitable forwireless communications, such as Internet Protocol (IP) or Ethernet.

Furthermore, links 131-134 can comprise Bluetooth, IEEE 802.11 WiFi,infrared, ultrasonic, or any wireless communication format includingcombinations, variations or improvements thereof. Communication links131-134 can each use air or space as the transport media. Additionally,links 141-144 can include one or more wired portions which can comprisesynchronous optical networking (SONET), hybrid fiber-coax (HFC), TimeDivision Multiplex (TDM), asynchronous transfer mode (ATM),circuit-switched, communication signaling, or some other communicationsignaling, including combinations, variations or improvements thereof.Communication links 141-144 can each use metal, glass, optical, air,space, or some other material as the transport media. Communicationlinks 131-134 and 141-144 may each be a direct link, or may includeintermediate networks, systems, or devices, and may include a logicalnetwork link transported over multiple physical links.

In FIG. 1, each communication node 102-105 monitors one or moreattributes from associated positional sensors, audio transducers, GPSreceivers, accelerometers, wireless transceivers, environmental sensors,or other sensors or devices capable of monitoring the attributesdiscussed herein. These attributes comprise any data or information thatmay be used for dynamically forming and changing node groups, as well asfor intelligent agent features for communication nodes 102-105. Forexample, one or more of the sound level of an environment, userpreferences, proximity of one personal communication node to another,location, communication status, identity, and traveling speed may beattributes used for dynamically forming and changing groups of nodes aswell as for intelligent agent features for communication nodes 102-105.

Communication nodes 102-105 periodically transfer messages for deliveryto remote management system 150 (e.g., indicating dynamic changes in oneor more attributes, user inputs, and/or other data useful in managing anode or a group). Communication nodes 102-105 may transfer a message toremote management system 150 whenever an attribute changes and/or atperiodic intervals. Remote management system 150 can use dynamic changesin one or more attributes to form, modify and/or terminate groups ofcommunication nodes 102-105 and for intelligent agent features forcommunication nodes 102-105. Although remote management system 150 andnodes 102-105 are each shown as separate entities in FIG. 1, it shouldbe understood that features of remote management system 150 can beincluded in any of personal communication nodes 102-105.

A communication node may use secure communication methods forcommunicating with members of a communication group, with non-membersand/or with a remote management system or the like. Secure communicationmethods include systems, techniques, protocols, methods and otherapproaches enabling users and nodes to securely share communications andother information with one another without interception or monitoring ofthe information or associated communications by non-members and/orthird-party. Secure communication methods may comprise symmetric keyencryption, asymmetric key encryption, public-key encryption, or someother type of encryption, including combinations thereof. The actualcommunications between personal communication nodes can employ securecommunication methods, and the associated links can employ securecommunication methods independently.

End to end encryption of communications, such as audio communications,can be established among members of the group. These end-to-endencrypted communications can include transport layer security (TLS) orsecure sockets layer (SSL) communications, among other secure linktypes. For example, a secure communication session can be establishedamong nodes 102-105 in Group B 120 of FIG. 1, as well as among nodes102-104 in Group A 110.

FIG. 2 illustrates communication system 100 of FIG. 1, where managementcommunication link 141 between node 102 and remote management system 150has been disrupted or has failed (step (A)). The disruption can occur inwireless communications due to many factors, such as overloading ofwireless network equipment, wireless signal fading, out-of-rangeconditions, weather, structures, movement, or other factors, includingcombinations thereof. In this example, remote management system 150determines (step (B)) which communication node(s) can act as a bypassfor the failed management communication link. Remote management system150 identifies and communicates with node 103 (step (C)) and instructsnode 103 to initiate management communications link 200 with node 102,where communication link 200 functions as a failover bypass of failedlink 141. Node 103 then acts (step (D)) to relay communications betweennode 102 and remote management system 150 through bypass communicationlinks 200 and 142. Since communication node 102 is in the same group(Group A 110) as communication node 103, there may be no security riskin having communication node 103 relay group-related communicationsbetween communication node 102 and remote management system 150.

FIG. 3 illustrates communication system 100 as shown in FIG. 1, whereall of Group A 110'S management communication links (i e , managementcommunication link 141 between communication node 102 and remotemanagement system 150, management communication link 142 betweencommunication node 103 and remote management system 150, and managementcommunication link 143 between communication node 104 and remotemanagement system 150) have been disrupted or have failed. In thisexample, remote management system 150 thus has lost contact with allmembers of Group A 110.

Since remote management system 150 still maintains one or moremanagement communication links with communication nodes of other groups(e.g., Group B 120's communication node 105 through managementcommunication link 144), remote management system 150 is able toinstruct communication node 105 to configure a bypass to make contactwith one or more of the communication nodes 102-104 in Group A 110 toresume management contact with Group A 110. Here, remote managementsystem 150 instructs communication node 105 to open managementcommunication link 300 to communication node 104. Managementcommunication link 300 can be encrypted so that communication node 105is unable to decode communications between node 104 and remotemanagement system 150. Remote management system 150 is thus able tocommunicate with node 104 via non-member bypass management link 300 andinstruct node 104 to open member bypass management communication link301 with node 103. Remote management system 150 is then able tocommunicate with communication node 103 and instruct node 103 to openmember bypass management communication link 302 with node 102. In otherexamples, communication node 104 may open communication links with bothnode 103 and node 102 so that node 103 is not required to forwardcommunications from node 102 to node 104.

FIG. 4 illustrates one or more implementations of a remote managementsystem 400. System 400 is a non-limiting example (e.g., of a computingenvironment that can execute features of remote management system 150 ofFIG. 1 and/or remote management systems discussed herein). Furthermore,elements of remote management system 400 can be distributed over one ormore computing devices (including one or more communication nodes).Remote management system 400 includes processing circuitry 401, storagesystem 402, software 403, communication interface system 407, and userinterface system 408.

It may be understood that remote management system 400 is generallyintended to represent one or more computing systems on which software403 may be deployed and executed (e.g., in order to implement remotemanagement system 150). However, remote management system 400 may alsobe suitable as any computing system on which software 403 may be stagedand from where one or both may be distributed, transported, downloaded,or otherwise provided to yet another computing system for deployment andexecution, or yet additional distribution.

Communication interface system 407 may include communication connectionsand devices that allow for communication with other computing systemsover a communication network. Examples of connections and devices thattogether allow for inter-system communication may include networkinterface cards, antennas, power amplifiers, RF circuitry, transceivers,and other communication circuitry. The connections and devices maycommunicate over communication media to exchange communications withother computing systems or networks of systems, such as metal, glass,air, or any other suitable communication media.

User interface system 408 may include a keyboard, a mouse, a voice inputdevice, a touch input device for receiving a touch gesture from a user,a motion input device for detecting non-touch gestures and other motionsby a user, and other comparable input devices and associated processingelements capable of receiving user input from a user. Output devicessuch as a display, speakers, haptic devices, and other types of outputdevices may also be included in user interface system 408. In somecases, the input and output devices may be combined in a single device,such as a display capable of displaying images and receiving touchgestures.

User interface system 408 may also include associated user interfacesoftware executable by processing circuitry 401 in support of thevarious user input and output devices discussed above. Separately or inconjunction with each other and other hardware and software elements,the user interface software and user interface devices may support agraphical user interface, a natural user interface, or any other type ofuser interface. In addition, user input made with respect to the userinterfaces may be input via user interface system 408.

Communication between remote management system 400 and any othercomputing system may occur over a communication network or networks andin accordance with various communication protocols, combinations ofprotocols, or variations thereof. Examples of such communicationnetworks include intranets, internets, the Internet, local areanetworks, wide area networks, wireless networks, wired networks, virtualnetworks, software defined networks, data center buses, computingbackplanes, or any other type of network, combination of network, orvariation thereof. Some communication protocols that may be usedinclude, but are not limited to, the Internet protocol (IP, IPv4, IPv6),the transfer control protocol (TCP), and the user datagram protocol(UDP), as well as any other suitable communication protocol, variation,or combination thereof.

Processing circuitry 401 can comprise one or more microprocessors andother processing circuitry that retrieves and executes software 403 fromstorage system 402. Processing circuitry 401 can be implemented within asingle processing device but can also be distributed across multipleprocessing devices or sub-systems that cooperate in executing programinstructions. Examples of processing circuitry 401 include generalpurpose central processing units, application specific processors, andlogic devices, as well as any other type of processing device,combinations, or variations thereof. In some examples, portions ofprocessing circuitry 401 is physically separate from some elements ofremote management system 400 and area included in remote servers,cloud-based processing systems, or virtualized computing systems.

Storage system 402 can comprise any non-transitory computer readablestorage media capable of storing software 403 that is executable byprocessing circuitry 401. Storage system 402 can also include variousdata structures which comprise one or more databases, tables, lists, orother data structures. Storage system 402 can include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information, such as computer readableinstructions, data structures, program modules, or other data. Storagesystem 402 can be implemented as a single storage device but can also beimplemented across multiple storage devices or sub-systems co-located ordistributed relative to each other. Storage system 402 can compriseadditional elements, such as a controller, capable of communicating withprocessing circuitry 401. Examples of storage media include randomaccess memory, read only memory, magnetic disks, optical disks, flashmemory, virtual memory and non-virtual memory, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand that can be accessed by an instruction execution system, as well asany combination or variation thereof.

Software 403 can be implemented in program instructions and among otherfunctions can, when executed by remote management system 400 in generalor processing circuitry 401 in particular, direct remote managementsystem 400, or processing circuitry 401 to operate as described hereinfor a remote management system or other functional systems. Software 403can include additional processes, programs, or components, such asoperating system software, database software, or application software.Software 403 can also comprise firmware or some other form ofmachine-readable processing instructions executable by elements ofprocessing circuitry 401.

In at least one implementation, the program instructions can includeattributes module 404, group module 405, and security module 406.Attributes module 404 monitors one or more attributes of communicationnodes (e.g., transferring messages for delivery to a management systemindicating dynamic changes in one or more attributes). These attributesand dynamic changes in attributes can be used to form and change dynamiccommunication groups among communication nodes and intelligent agentnodes. Attributes module 404 may periodically or continuously monitorattributes associated with communication node sensors or communicationnodes may send messaging or alerts to attributes module 404 when changesare detected. Attributes module 404 receives attributes (e.g., fromcommunication nodes 102-105) and transmits attributes (e.g., tocommunication nodes 102-105 over management communication links141-144).

Group module 405 monitors group membership status among communicationnodes, and changes the group membership of communication nodes (e.g.,based on the attributes and the group membership status). Group module405 further monitors management communication links (e.g., betweenremote management system 150 and associated communication nodes 102-105in implementations such as the one shown in FIG. 1). When a managementcommunication link failure is detected, group module 405 determines anidentity of a bypass communication node that can be used to communicatewith communication nodes that have been disconnected due to themanagement communication link failure. Group module 405 then directs thebypass communication node to establish a management communication linkwith the communication node that has experienced the communication linkfailure. This enables the bypass communication node to forwardmanagement communications between remote management system 400 and thecommunication node experiencing the communication link failure.

Security module 406 initiates, controls, and maintains securecommunications between remote management system 400 and associatedcommunication nodes, and among communication nodes. For example, whengroup module 405 identifies a bypass communication node that is externalto a group of communication nodes whose management communication linkswith remote management system 400 have failed, security module 406establishes secure communication links through the bypass communicationnode between management system 400 and the group of disconnectedcommunication nodes. This enables the bypass communication node to actas a conduit to forward communications between the remote managementsystem 400 and the other group of communication nodes without having theability to decode the communications.

In general, software 403 can, when loaded into processing circuitry 401and executed, transform processing circuitry 401 overall from ageneral-purpose computing system into a special-purpose computing systemcustomized to operate as described herein for a remote managementsystem, among other operations. Encoding software 403 on storage system402 can transform the physical structure of storage system 402. Thespecific transformation of the physical structure can depend on variousfactors in different implementations of this description. Examples ofsuch factors can include, but are not limited to the technology used toimplement the storage media of storage system 402 and whether thecomputer-storage media are characterized as primary or secondarystorage. For example, if the computer-storage media are implemented assemiconductor-based memory, software 403 can transform the physicalstate of the semiconductor memory when the program is encoded therein.For example, software 403 can transform the state of transistors,capacitors, or other discrete circuit elements constituting thesemiconductor memory. A similar transformation can occur with respect tomagnetic or optical media. Other transformations of physical media arepossible without departing from the scope of the present description,with the foregoing examples provided only to facilitate this discussion.

FIG. 5 illustrates a method for operating a remote management system(e.g., remote management system 150 as illustrated in one or more of theFigures). A remote management system detects a failure in a firstmanagement communication link used for communications between a firstcommunication node and the remote management system (operation 500). Theremote management system then determines that one or more additionalcommunication nodes are capable of acting as a bypass communication nodeand identifies a second communication node as such (operation 502).

The remote management system transmits instructions to establish abypass management communication link with the first communication node(operation 504) and subsequently communicates with the first nodethrough the bypass management communication link (e.g., as shown withlink 200 of FIG. 2), the second (bypass) communication node (e.g., node103 of FIG. 2), and the second node's communication link (e.g., link 142of FIG. 2) with the remote management system (operation 506). Operation504 can be performed by having the second (bypass) communication nodeset up the bypass management communication link directly with the firstcommunication node. In other implementations the bypass instructions mayinclude the second node establishing a bypass management communicationlink with a third communication node and that third node establishing anadditional bypass management communication link with the firstcommunication node (directly or through one or more additionalcommunication nodes acting as bypass nodes), creating a multiple bypassnode chain somewhat similar to the implementation(s) shown in FIG. 3.

FIG. 6 illustrates one or more implementations of a communication node600. Communication node 600 is a non-limiting example (e.g., of acomputing environment that can execute features of communication nodes102-105 of FIG. 1 and/or communication nodes discussed herein).Furthermore, elements of communication node 600 can be distributed overone or more computing devices. Communication node 600 includesprocessing circuitry 601, storage system 602, software 603,communication interface system 607, and user interface system 608.

It may be understood that communication node 600 is generally intendedto represent one or more computing systems on which software 603 may bedeployed and executed (e.g., in order to implement communication nodes102-105). However, communication node 600 may also be suitable as anycomputing system on which software 603 may be staged and from where oneor both may be distributed, transported, downloaded, or otherwiseprovided to yet another computing system for deployment and execution,or yet additional distribution.

In this example, wireless communication device 610 is shown separate andindependent from communication node 600. Wireless communication device610 may comprise a smartphone, tablet device, computer, gaming device,laptop computer, or some other communication device capable ofcommunicating using packet networks or some other communication network.In another example, communication node 600 may be incorporated assoftware within wireless communication device 610. In other examplescommunication node 600 may be a discrete node that communicates throughwireless communication device 610 such as a Bluetooth device to asmartphone and cellular service from the smartphone to othercommunication nodes and remote management system 150.

Communication interface system 607 may include communication connectionsand devices that allow for communication with other computing systemsover a communication network. Examples of connections and devices thattogether allow for inter-system communication may include networkinterface cards, antennas, power amplifiers, RF circuitry, transceivers,and other communication circuitry. The connections and devices maycommunicate over communication media to exchange communications withother computing systems or networks of systems, such as metal, glass,air, or any other suitable communication media.

Communication interface system 607 further comprises transceiver 609 forcommunicating with wireless communication device 610. Transceiver 609comprises communication components, such as ports, signal processingcircuitry, memory, software, and the like. Transceiver 609 communicateswith wireless communication device 610 over a link that may comprise aBluetooth communication link, WiFi link, infrared, ultrasonic or anyother communication link between communication node 600 and wirelesscommunication device 610.

User interface system 608 may include a keyboard, a mouse, a voice inputdevice, a touch input device for receiving a touch gesture from a user,a motion input device for detecting non-touch gestures and other motionsby a user, and other comparable input devices and associated processingelements capable of receiving user input from a user. Output devicessuch as a display, speakers, haptic devices, and other types of outputdevices may also be included in user interface system 608. In somecases, the input and output devices may be combined in a single device,such as a display capable of displaying images and receiving touchgestures.

User interface system 608 may also include associated user interfacesoftware executable by processing circuitry 601 in support of thevarious user input and output devices discussed above. In communicationnode 600, user interface system 608 is optional as some embodiments ofcommunication node 600 do not require any user interaction. Separatelyor in conjunction with each other and other hardware and softwareelements, the user interface software and user interface devices maysupport a graphical user interface, a natural user interface, or anyother type of user interface. In addition, user input made with respectto the user interfaces may be input via user interface system 608.

Communication between communication node 600 and any other computingsystem may occur over a communication network or networks and inaccordance with various communication protocols, combinations ofprotocols, or variations thereof. Examples of such communicationnetworks include intranets, internets, the Internet, local areanetworks, wide area networks, wireless networks, wired networks, virtualnetworks, software defined networks, data center buses, computingbackplanes, or any other type of network, combination of network, orvariation thereof. Some communication protocols that may be usedinclude, but are not limited to, the Internet protocol (IP, IPv4, IPv6),the transfer control protocol (TCP), and the user datagram protocol(UDP), as well as any other suitable communication protocol, variation,or combination thereof.

Processing circuitry 601 can comprise one or more microprocessors andother processing circuitry that retrieves and executes software 603 fromstorage system 602. Processing circuitry 601 can be implemented within asingle processing device but can also be distributed across multipleprocessing devices or sub-systems that cooperate in executing programinstructions. Examples of processing circuitry 601 include generalpurpose central processing units, application specific processors, andlogic devices, as well as any other type of processing device,combinations, or variations thereof. In some examples, portions ofprocessing circuitry 601 is physically separate from some elements ofcommunication node 600 and area included in remote servers, cloud-basedprocessing systems, or virtualized computing systems.

Storage system 602 can comprise any non-transitory computer readablestorage media capable of storing software 603 that is executable byprocessing circuitry 601. Storage system 602 can also include variousdata structures which comprise one or more databases, tables, lists, orother data structures. Storage system 602 can include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information, such as computer readableinstructions, data structures, program modules, or other data. Storagesystem 602 can be implemented as a single storage device but can also beimplemented across multiple storage devices or sub-systems co-located ordistributed relative to each other. Storage system 602 can compriseadditional elements, such as a controller, capable of communicating withprocessing circuitry 601. Examples of storage media include randomaccess memory, read only memory, magnetic disks, optical disks, flashmemory, virtual memory and non-virtual memory, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand that can be accessed by an instruction execution system, as well asany combination or variation thereof.

Software 603 can be implemented in program instructions and among otherfunctions can, when executed by communication node 600 in general orprocessing circuitry 601 in particular, direct communication node 600,or processing circuitry 601 to operate as described herein for acommunication node among other functional systems. Software 603 caninclude additional processes, programs, or components, such as operatingsystem software, database software, or application software. Software603 can also comprise firmware or some other form of machine-readableprocessing instructions executable by elements of processing circuitry601.

In at least one implementation, the program instructions can includeattributes module 604, group module 605, and security module 606.Attributes module 604 monitors one or more attributes of communicationnodes (e.g., transferring messages for delivery to a remote managementsystem (e.g., system 150) indicating dynamic changes in one or moreattributes). These attributes and dynamic changes in attributes can beused to form and change dynamic communication groups among communicationnodes and intelligent agent nodes. Attributes module 604 mayperiodically or continuously monitor attributes associated withcommunication node sensors or communication nodes may send messaging oralerts to attributes module 604 when changes are detected. Attributesmodule 604 receives attributes (e.g., from remote management system 150)and transmits attributes (e.g.) to remote management system 150 overmanagement communication links 141-144).

Group module 605 monitors group membership status among communicationnodes, and changes the group membership of communication nodes (e.g.,based on the attributes and the group membership status). Group module605 further receives instructions (e.g., from remote management system150) related to groups in which it is a member. In one non-limitingexample, remote management system 150 detects a management communicationlink failure and determines an identity of a bypass communication node(e.g., from one or more nodes capable of acting as a bypass node) thatmay be used to communicate with communication nodes that have beendisconnected due to the management communication link failure. Groupmodule 605 then receives direction from the remote management systemdirecting the communication node to operate as a bypass managementcommunication node and to establish a management communication link withthe communication node that has experienced the communication linkfailure. This enables the bypass communication node to act as a conduitto forward communications between a remote management system and thecommunication node experiencing the communication link failure.

Security module 606 initiates, controls, and maintains securecommunications between communication node 600 and other communicationnodes 102-105 (e.g., management communications between node 600 and aremote management system). For example, when communication node 600operates as a bypass communication node that is external to the group ofcommunication nodes whose communication link(s) with a remote managementsystem have failed, security module 606 establishes secure managementcommunication links between the bypass communication node and anydisconnected communication nodes. This enables the bypass communicationnode to forward management communications between the remote managementsystem and the disconnected communication nodes without having theability to decode the communications.

In general, software 603 can, when loaded into processing circuitry 601and executed, transform processing circuitry 601 overall from ageneral-purpose computing system into a special-purpose computing systemcustomized to operate as described herein for a communication nodeand/or to perform other operations. Encoding software 603 on storagesystem 602 can transform the physical structure of storage system 602.The specific transformation of the physical structure can depend onvarious factors in different implementations of this description.Examples of such factors can include, but are not limited to thetechnology used to implement the storage media of storage system 602 andwhether the computer-storage media are characterized as primary orsecondary storage. For example, if the computer-storage media areimplemented as semiconductor-based memory, software 603 can transformthe physical state of the semiconductor memory when the program isencoded therein. For example, software 603 can transform the state oftransistors, capacitors, or other discrete circuit elements constitutingthe semiconductor memory. A similar transformation can occur withrespect to magnetic or optical media. Other transformations of physicalmedia are possible without departing from the scope of the presentdescription, with the foregoing examples provided only to facilitatethis discussion

The included descriptions and figures depict specific embodiments toteach those skilled in the art how to make and use the best mode. Forthe purpose of teaching inventive principles, some conventional aspectshave been simplified or omitted. Those skilled in the art willappreciate variations from these embodiments that fall within the scopeof the invention. Those skilled in the art will also appreciate that thefeatures described above may be combined in various ways to formmultiple embodiments. As a result, the invention is not limited to thespecific embodiments described above, but only by the claims and theirequivalents.

What is claimed is:
 1. A method of operating a remote management system,the method comprising: establishing a first management communicationlink between the remote management system and a first communicationnode; establishing a second management communication link between theremote management system and a second communication node; detecting afailure in the first management communication link; selecting the secondcommunication node as a bypass communication node; transmittinginstructions to establish a first bypass management communication linkbetween the second communication node and the first communication node;and the remote management system communicating with the firstcommunication node through the first bypass management communicationlink.
 2. The method of claim 1 wherein the first and secondcommunication nodes are members of a first communication group.
 3. Themethod of claim 1 wherein the first communication node is a member of afirst communication node group and further wherein the secondcommunication node is not a member of the first communication nodegroup.
 4. The method of claim 3 wherein the remote management systemcommunicates with the first communication node through the bypassmanagement communication link using end-to-end secure managementcommunications sent from the remote management system via the secondmanagement communication link, the second communication node and thebypass communication link.
 5. The method of claim 3 wherein the firstcommunication node group further comprises a third communication node;further wherein transmitting instructions to establish a first bypassmanagement communication link between the second communication node andthe first communication node comprises: sending instructions to thesecond communication node to establish a second bypass managementcommunication link between the second communication node and the thirdcommunication node; and sending instructions to the third communicationnode to establish a third bypass management communication link betweenthe third communication node and the first communication node; whereinthe first bypass management communication link comprises the second andthird bypass management communication links.
 6. The method of claim 1wherein each communication node comprises a wireless communicationdevice.
 7. The method of claim 6 wherein each wireless communicationdevice comprises a cellular smartphone, gaming device, personalcomputer, or tablet computer.
 8. A remote management system for managinggroup communications among communication nodes, the system comprising:one or more processors; a computer readable storage medium havinginstructions stored thereon that, when executed by the one or moreprocessors, cause the management system to: detect a failure in a firstmanagement communication link between the remote management system and afirst communication node; select a second communication node as a bypasscommunication node; transmit instructions to establish a first bypassmanagement communication link between the second communication node andthe first communication node; and communicate with the firstcommunication node through the first bypass management communicationlink.
 9. The system of claim 8 wherein the first and secondcommunication nodes are members of a first communication group.
 10. Thesystem of claim 8 wherein the first communication node is a member of afirst communication node group and further wherein the secondcommunication node is not a member of the first communication nodegroup.
 11. The system of claim 10 wherein the remote management systemcommunicates with the first communication node through the bypassmanagement communication link using end-to-end secure managementcommunications sent from the remote management system via the secondmanagement communication link, the second communication node and thebypass communication link.
 12. The system of claim 10 wherein the firstcommunication node group further comprises a third communication node;further wherein transmitting instructions to establish a first bypassmanagement communication link between the second communication node andthe first communication node comprises: sending instructions to thesecond communication node to establish a second bypass managementcommunication link between the second communication node and the thirdcommunication node; and sending instructions to the third communicationnode to establish a third bypass management communication link betweenthe third communication node and the first communication node; whereinthe first bypass management communication link comprises the second andthird bypass management communication links.
 13. The system of claim 8wherein each communication node comprises a wireless communicationdevice.
 14. The system of claim 13 wherein each wireless communicationdevice comprises a cellular smartphone, gaming device, personalcomputer, or tablet computer.
 15. A method of operating a remotemanagement system, comprising: detecting a failure in a communicationlink with a first communication node engaged in a group communicationsession comprising a plurality of communication nodes; selecting a firstbypass communication node; instructing the first bypass communicationnode to establish a first bypass communication link with the firstcommunication node; and communicating with the first communication nodethrough the first bypass communication link.
 16. The method of claim 15wherein the first bypass communication node is a member of the pluralityof communication nodes engaging in a group communication session. 17.The method of claim 15 wherein the first bypass communication node isnot a member of the plurality of communication nodes engaging in a groupcommunication session.
 18. The method of claim 15 wherein eachcommunication node comprises a wireless communication device.
 19. Themethod of claim 18 wherein each wireless communication device comprisesa cellular smartphone, gaming device, personal computer, or tabletcomputer.