Secure anonymity in a media exchange network
First Claim
1. A method for secure communication of information in a communication network, the method comprising:
- receiving media containing a security code from a first communication device at a third communication device, wherein said security code is acquired by said first communication device from a second communication device;
translating said security code to an IP address corresponding to said second communication device at said third communication device; and
routing said received media to said second communication device based on said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device.
7 Assignments
0 Petitions
Accused Products
Abstract
Secure communication of information in a communication network may comprise acquiring a security code from a second communication device by a first communication device and receiving media containing the security code such as a pin code from the first communication device. The security code may be translated into an IP address corresponding to the second communication device. The received media may be routed to the second communication device based on the IP address of the second communication device. In this regard, the IP address of the second communication device remains anonymous or unknown to the first communication device. A duration for which the security code is valid may be limited to a specific time period and/or for a particular number of uses. Notwithstanding, the security code may be acquired out-of-band.
-
Citations
42 Claims
-
1. A method for secure communication of information in a communication network, the method comprising:
-
receiving media containing a security code from a first communication device at a third communication device, wherein said security code is acquired by said first communication device from a second communication device; translating said security code to an IP address corresponding to said second communication device at said third communication device; and routing said received media to said second communication device based on said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (2, 3, 4)
-
-
5. A machine-readable storage having stored thereon, a computer program having at least one code section for secure communication of information in a communication network, the at least one code section being executable by a machine for causing the machine to perform steps comprising:
-
receiving media containing a security code from a first communication device at a third communication device, wherein said security code is acquired by said first communication device from a second communication device; translating said security code to an IP address corresponding to said second communication device at said third communication device; and routing said received media to said second communication device based on said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (6, 7, 8)
-
-
9. A system for secure communication of information in a communication network, the system comprising:
-
at least one processor receives media containing a security code from a first communication device at a third communication device, wherein said security code is acquired by said first communication device from a second communication device; said at least one processor translates said security code to an IP address corresponding to said second communication device at said third communication device; and said at least one processor routes said received media to said second communication device based on said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for secure communication of information in a communication network, the method comprising:
-
receiving a security code from a first communication device desiring to communicate with a second communication device at a third communication device; transferring security information associated with said second communication device from said third device to said first communication device; receiving media along with at least a portion of said transferred security information from said first communication device at said third communication device; if said security information from said first communication device is valid, transferring said received media from said third communication device to said second communication device; and translating said at least a portion of said transferred security information received from said first communication device into an IP address of said second device at said third communication device, said transferring of said received media to said second communication device utilizing said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A machine-readable storage having stored thereon, a computer program having at least one code section for secure communication of information in a communication network, the at least one code section being executable by a machine for causing the machine to perform steps comprising:
-
receiving a security code from a first communication device desiring to communicate with a second communication device at a third communication device; transferring security information associated with said second communication device from said third device to said first communication device; receiving media along with at least a portion of said transferred security information from said first communication device at said third communication device; if said security information from said first communication device is valid, transferring said received media from said third communication device to said second communication device; and translating said at least a portion of said transferred security information received from said first communication device into an IP address of said second device at said third communication device, said transferring of said received media to said second communication device utilizing said IP address of said second communication device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A system for secure communication of information in a communication network, the system comprising:
-
at least one processor at a third communication device that receives a security code from a first communication device desiring to communicate with a second communication device; said at least one processor transfers security information associated with said second communication device from said third communication device to said first communication device; said at least one processor receives media along with at least a portion of said transferred security information from said first communication device at said third communication device; if said security information from said first communication device is valid, transferring said received media from said third communication device to said second communication device; and said at least one processor translates said at least a portion of said transferred security information received from said first communication device into an IP address of said second device at said third communication device, said transferring of said received media to said second communication device utilizing said IP address of said second device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
30. A method for secure communication of information in a communication network, the method comprising:
-
receiving media containing a security code from a first communication device, wherein said security code is acquired by said first communication device from a second communication device; and translating said security code received from said first communication device into an IP address of said second device at said third communication device, and transferring of said received media from said third communication device to said second communication device utilizing said IP address of said second device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (31, 32, 33)
-
-
34. A machine-readable storage having stored thereon, a computer program having at least one code section for secure communication of information in a communication network, the at least one code section being executable by a machine for causing the machine to perform steps comprising:
-
receiving media containing a security code from a first communication device, wherein said security code is acquired by said first communication device from a second communication device; and translating said security code received from said first communication device into an IP address of said second device at said third communication device, and transferring of said received media from said third communication device to said second communication device utilizing said IP address of said second device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (35, 36, 37)
-
-
38. A system for secure communication of information in a communication network, the system comprising:
-
at least one processor at a third communication device receives media containing a security code from a first communication device, wherein said security code is acquired by said first communication device from a second communication device; and said at least one processor translates said security code received from said first communication device into an IP address of said second device at said third communication device, and transferring of said received media from said third communication device to said second communication device utilizing said IP address of said second device, said IP address of said second communication device remaining anonymous to said first communication device. - View Dependent Claims (39, 40, 41, 42)
-
Specification