Speakerphone using a secure audio connection to initiate a second secure connection
First Claim
1. A speakerphone for communicating with a remote conference endpoint that is not acting as a bridge, the speakerphone comprising:
- an audio processing unit;
a control module communicably coupled to the audio processing unit; and
a network interface communicably coupled to the control module;
wherein the control module is operable to send control data in combination with audio data to the remote conference endpoint via an audio connection; and
wherein the control data comprises an instruction from the speakerphone that the remote conference endpoint not acting as a bridge establish a secure second connection.
10 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are methods, systems, and devices for improved audio, video, and data conferencing. The present invention provides a conferencing system comprising a plurality of endpoints communicating data including audio data and control data according to a communication protocol. A local conference endpoint may control or be controlled by a remote conference endpoint. Data comprising control signals may be exchanged between the local endpoint and remote endpoint via various communication protocols. In other embodiments, the present invention provides for improved bridge architecture for controlling functions of conference endpoints including controlling functions of the bridge.
208 Citations
25 Claims
-
1. A speakerphone for communicating with a remote conference endpoint that is not acting as a bridge, the speakerphone comprising:
-
an audio processing unit; a control module communicably coupled to the audio processing unit; and a network interface communicably coupled to the control module; wherein the control module is operable to send control data in combination with audio data to the remote conference endpoint via an audio connection; and wherein the control data comprises an instruction from the speakerphone that the remote conference endpoint not acting as a bridge establish a secure second connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A conferencing system comprising:
-
a plurality of conference endpoints including a speakerphone and a remote conference endpoint that is not acting as a bridge; and a communication channel having a communication protocol coupling the plurality of conference endpoints including the speakerphone and the remote conference endpoint; wherein the speakerphone comprises a first control module operable to send control data in combination with audio data to the remote conference endpoint via an audio connection; wherein the control data comprises an instruction from the speakerphone that the remote conference endpoint not acting as a bridge establish a secure second communication channel; and wherein the remote conference endpoint establishes the secure second communication channel. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for establishing a secure second connection during an audio conference, the method comprising the steps of:
-
combining an audio signal and a control signal in a speakerphone; sending the combined audio and control signal from the speakerphone to one or more remote endpoints not acting as a bridge via an audio connection; instructing the one or more remote conference endpoints not acting as a bridge to establish a secure second connection; and establishing a secure second connection based on the control signal; wherein the control signal is substantially humanly inaudible. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium comprising instructions executable by a computer for establishing a secure connection during an audio conference by performing the steps of:
-
combining an audio signal and a control signal in a speakerphone; sending the combined audio and control signal from the speakerphone to one or more remote endpoints not acting as a bridge via an audio connection; and instructing the one or more remote conference endpoints not acting as a bridge to establish a secure second connection; and establishing a secure second connection based on the control signal; wherein the control signal is substantially humanly inaudible. - View Dependent Claims (22, 23, 24, 25)
-
Specification