SECURING MULTIMEDIA NETWORK COMMUNICATION
First Claim
1. A computer controlled method for securing human to human communication over a network, the method comprising:
- receiving, by a first computer, an incoming authenticated data stream from a second computer over a first communication channel, the incoming authenticateed data stream having been computed using an incoming digital experiential data stream and a first imprint;
extracting the first imprint from the incoming authenticated data stream;
presenting the incoming authenticated data stream, the presenting suitable for sensory experience by a human;
inputting an outgoing digital experiential data stream;
computing a second imprint associated with the first computer;
computing an outgoing authenticated data stream using the outgoing digital experiential data stream and the second imprint;
securing a second communication channel from the first computer to the second computer using the first imprint, the second communication channel suitable for sending the outgoing authenticated data stream to the second computer.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for securing human to human communication over a network includes receiving, by a first computer, an incoming authenticated data stream from a second computer over a first communication channel, the incoming authenticateed data stream having been computed using an incoming digital experiential data stream and a first imprint, and extracting the first imprint from the incoming authenticated data stream. The incoming authenticated data stream is then presented for sensory experience by a human. An outgoing digital experiential data stream is then input and the method computes a second imprint associated with the first computer and computes an outgoing authenticated data stream using the outgoing digital experiential data stream and the second imprint. A second communication channel is then secured from the first computer to the second computer using the first imprint, the second communication channel suitable for sending the outgoing authenticated data stream to the second computer.
26 Citations
19 Claims
-
1. A computer controlled method for securing human to human communication over a network, the method comprising:
-
receiving, by a first computer, an incoming authenticated data stream from a second computer over a first communication channel, the incoming authenticateed data stream having been computed using an incoming digital experiential data stream and a first imprint; extracting the first imprint from the incoming authenticated data stream; presenting the incoming authenticated data stream, the presenting suitable for sensory experience by a human; inputting an outgoing digital experiential data stream; computing a second imprint associated with the first computer; computing an outgoing authenticated data stream using the outgoing digital experiential data stream and the second imprint; securing a second communication channel from the first computer to the second computer using the first imprint, the second communication channel suitable for sending the outgoing authenticated data stream to the second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 14)
-
-
12. A computer controlled method for securing human to human communication over a network, the method comprising:
-
initiating, at a sender, a connection with a recipient over network; generating an authenticated outgoing experiential stream having a first imprint; transmitting the authenticated outgoing experiential stream through a first communication channel; receiving, over a second communication channel, an authenticated incoming experiential stream secured using the first imprint; extracting a second imprint from the authenticated incoming experiential stream; securing the first communication channel using the second imprint; and transmitting the authenticated outgoing experiential stream through the first communication channel. - View Dependent Claims (13, 15, 16, 17, 18, 19)
-
Specification