System and method for establishing secondary channels
First Claim
1. A method for establishing a secondary communication channel between at least two computing devices over a network medium, comprising:
- connecting a first computing device with a first telephonic unit over a primary low-bandwidth channel, wherein said primary low-bandwidth channel is a location-limited channel with the following properties;
human operators can control which devices are communicating with each other,transmission is physically limited,pre-authentication information is authentic,eavesdropping is possible, but information injection can be detected by communicating parties, andeavesdroppers on the location-limited channel are not able to create connections with the secondary communication channel;
connecting a second computing device with a second telephonic unit;
determining whether said first telephonic unit is in communication over said primary low-bandwidth channel with said second telephonic unit;
transmitting a network address of said first computing device to said second computing device over said primary low-bandwidth channel, wherein the second computing device does not have knowledge of the first computing device'"'"'s network address prior to the transmission; and
creating a one-to-one secondary communication channel between said second computing device and said first computing device through the Internet.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
-
Citations
21 Claims
-
1. A method for establishing a secondary communication channel between at least two computing devices over a network medium, comprising:
-
connecting a first computing device with a first telephonic unit over a primary low-bandwidth channel, wherein said primary low-bandwidth channel is a location-limited channel with the following properties; human operators can control which devices are communicating with each other, transmission is physically limited, pre-authentication information is authentic, eavesdropping is possible, but information injection can be detected by communicating parties, and eavesdroppers on the location-limited channel are not able to create connections with the secondary communication channel; connecting a second computing device with a second telephonic unit; determining whether said first telephonic unit is in communication over said primary low-bandwidth channel with said second telephonic unit; transmitting a network address of said first computing device to said second computing device over said primary low-bandwidth channel, wherein the second computing device does not have knowledge of the first computing device'"'"'s network address prior to the transmission; and creating a one-to-one secondary communication channel between said second computing device and said first computing device through the Internet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An article of manufacture comprising a computer usable medium having computer readable program code embodied in said medium which, when said program code is executed by said computer causes said computer to perform method steps for establishing a secondary communication channel between at least two computing devices over a network medium, said method comprising:
-
connecting a first computing device with a first telephonic unit over a primary low-bandwidth channel, wherein said primary low-bandwidth channel is a location-limited channel with the following properties; human operators can control which devices are communicating with each other; transmission is physically limited, pre-authentication information is authentic, eavesdropping is possible, but information injection can be detected by communicating parties, and eavesdroppers on the location-limited channel are not able to create connections with the secondary communication channel; connecting a second computing device with a second telephonic unit; determining whether said first telephonic unit is in communication over a primary low-bandwidth channel with a second telephonic unit; transmitting the network address of said first computing device to said second computing device over said primary low-bandwidth channel, the second computing device does not have knowledge of the first computing device'"'"'s network address prior to the transmission; and creating a one-to-one secondary communication channel between said second computing device and said first computing device through the Internet.
-
Specification