Security and support for flexible conferencing topologies spanning proxies, firewalls and gateways
First Claim
1. A method for setting up a dynamic-secure-conference over a computer network wherein said method comprises:
- communicating with a potential new node from an existing-trusted-conference node;
authenticating a potential new-entrant-to-the-conference by examining a certificate corresponding to the new node;
permitting the potential new-entrant-to-the-conference to become an additional conference node if the certificate is valid; and
recalculating a dynamic-secure-conference topology to minimize network traffic.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.
40 Citations
20 Claims
-
1. A method for setting up a dynamic-secure-conference over a computer network wherein said method comprises:
-
communicating with a potential new node from an existing-trusted-conference node; authenticating a potential new-entrant-to-the-conference by examining a certificate corresponding to the new node; permitting the potential new-entrant-to-the-conference to become an additional conference node if the certificate is valid; and recalculating a dynamic-secure-conference topology to minimize network traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer storage device comprising computer executable instructions that, when executed by at least one processor, perform a method for setting up a dynamic-secure-conference over a computer network wherein said method comprises:
-
communicating with a potential new node from an existing-trusted-conference node; authenticating a potential new-entrant-to-the-conference by examining a certificate corresponding to the new node; permitting the potential new-entrant-to-the-conference to become an additional conference node if the certificate is valid; and recalculating a dynamic-secure-conference topology to minimize network traffic. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
at least one processor; and a computer readable medium comprising computer executable instructions that, when executed by at least one processor, perform a method for setting up a dynamic-secure-conference over a computer network wherein said method comprises; communicating with a potential new node from an existing-trusted-conference node; authenticating a potential new-entrant-to-the-conference by examining a certificate corresponding to the new node; permitting the potential new-entrant-to-the-conference to become an additional conference node if the certificate is valid; and recalculating a dynamic-secure-conference topology to minimize network traffic. - View Dependent Claims (18, 19, 20)
-
Specification