US20050185638A1 - Out-of-band signaling for network based computer session synchronization with crossbars - Google Patents
Out-of-band signaling for network based computer session synchronization with crossbars Download PDFInfo
- Publication number
- US20050185638A1 US20050185638A1 US11/107,095 US10709505A US2005185638A1 US 20050185638 A1 US20050185638 A1 US 20050185638A1 US 10709505 A US10709505 A US 10709505A US 2005185638 A1 US2005185638 A1 US 2005185638A1
- Authority
- US
- United States
- Prior art keywords
- network
- computer
- connection
- telephone
- coupled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000011664 signaling Effects 0.000 title abstract description 10
- 230000005236 sound signal Effects 0.000 claims abstract description 28
- 230000008859 change Effects 0.000 claims description 6
- 238000004891 communication Methods 0.000 abstract description 13
- 230000002269 spontaneous effect Effects 0.000 abstract description 5
- 238000000034 method Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000012549 training Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/10—Packet switching elements characterised by the switching fabric construction
- H04L49/101—Packet switching elements characterised by the switching fabric construction using crossbar or matrix
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the present disclosure relates to simultaneous use of two separate networks, and the leveraging of connectivity on one network to create a logical connection on the second network.
- IP Internet protocol
- IP address is used alone, or in conjunction with software endpoints called ports, by applications and communication stacks to establish an Internet connection between two intelligent devices such as computers.
- the IP address for a computer can be static or assigned dynamically when the computer connects to an intranet or the Internet.
- a dynamic IP address can change each time the computer connects to an intranet or the Internet.
- An IP connection is established after one of the computers discovers the other computer's IP and port addresses before establishing the IP connection.
- a computer can publish its IP and port addresses in a known location with a known IP address so that another computer can access the first computer's IP and port addresses. These known locations are sometimes referred to as “buddy lists”. This method of establishing an IP connection employs a pre-arranged agreement to establish the connection.
- establishing a network connection includes: establishing a connection across a first communication network that carries audio signals; encoding a computer network address for a specified network different from the first network into an encoded network address and sending the encoded network address across the first network; and using said network address to establish a network connection on said second network.
- network connectivity functionality of a computer can be automatically accessed using telephone connectivity.
- Out-of-band signaling provides a spontaneous network collaboration capability by sending an Internet protocol (“IP”) address across a public switched telephone network (“PSTN”) connection.
- IP Internet protocol
- PSTN public switched telephone network
- Internet connectivity provides privacy across a telephone network through encryption including: establishing a connection across a voice communication network between a first party and a second party; establishing a connection across a computer network between the first party and the second party; transmitting an encryption key across the computer network so that both said first and second parties have said encryption key; encrypting an audio signal using the encryption key; and transmitting the encrypted audio signal across the voice telephone network.
- Internet connectivity provides identity authentication of a party to a telephone connection including: establishing a connection across a voice communication network between a calling telephone and a receiving telephone; establishing a connection across a computer network between a calling computer and a receiving computer; and verifying that the calling computer is coupled to the calling telephone by sending a signal from the receiving telephone to the calling telephone across the voice communication network and sending the signal from the calling computer to the receiving computer across the computer network.
- a crossbar switch provides dynamic allocation of audio input signals and output signals in a computer system and across a network or networks.
- the crossbar switch includes: a plurality of input ports, where one input port is coupled to an audio source; a plurality of output ports, where one output port is coupled to a telephone network, and one output port is coupled to a computer network; and a control element which physically s connects at least one input port to at least one output port and can dynamically change which input port is coupled to which output port.
- the switch can be implemented in hardware or software, or a combination of both.
- FIG. 1 shows a block diagram of two computers coupled to respective telephones and interconnected by a computer network and a telephone network.
- FIG. 2 is a flowchart of spontaneously establishing an IP connection between users using the PSTN and the configuration shown in FIG. 1 .
- FIG. 3A is a block diagram showing an audio crossbar switch.
- FIG. 3B is a block diagram showing a crossbar switch coupled to a computer.
- FIG. 4 is a flowchart of encrypting an audio signal sent over a telephone network, such as the PSTN, using a computer network connection, such as an IP connection.
- FIG. 5 is a flowchart of authenticating a caller during a telephone connection across a telephone network, such as the PSTN, using a computer network connection, such as an IP connection.
- FIG. 6 is a flowchart of verifying the telephone-computer connection between user B's telephone and computer.
- FIG. 1 shows a block diagram 100 of an out-of-band signaling system.
- a first computer 105 is coupled to a first telephone 110 through a path 107 that allows audio signals and/or data to be exchanged between computer 105 and telephone 110 .
- a second computer 115 is coupled to a second telephone 120 through a path 117 that allows audio signals and data to be exchanged between computer 115 and telephone 120 .
- Computers 105 and 115 can be conventional desktop computers, lean clients, web phones, or workstations.
- Telephones 110 and 120 can be analog or digital and can be separate from or part of computers 105 and 115 , respectively.
- application programs or agents e.g., software routines that wait in the background and perform an action when a specified event occurs
- computers 105 and 115 can monitor analog and/or digital signals sent to telephones 110 and 120 , respectively.
- Computers 105 and 115 are connected to a computer network 125 .
- Computer network 125 can be an Internet protocol (“IP”) network, such as the global Internet or an intranet.
- IP Internet protocol
- computers 105 and 115 are connected to the Internet logically independent of the telephones' PSTN network connections, such as by a xDSL phone line, a cable modem connection, ISDN connection, Internet accessible LAN connection, or second POTS line.
- Telephones 110 and 120 are connected to a communication network 130 , e.g., a voice telephone network such as a public switched telephone network (“PSTN”, or plain old telephone service network, “POTS”) or a private branch exchange (“PBX”).
- PSTN public switched telephone network
- POTS plain old telephone service network
- PBX private branch exchange
- the connections to telephone network 130 can be analog and/or digital, depending upon the nature of telephones 110 and 120 and any equipment such as PBXs which might be in the connection path.
- Computers 105 and 115 can be used to augment the telephone communications by leveraging their connections to computer network 125 and telephone network 130 . While users are talking across telephone network 130 using telephones 110 and 120 , they can automatically (e.g., by using the computers to establish a computer network connection) and spontaneously (e.g., without pre-arrangement between the users) access functionality provided by applications running on computers 105 and 115 by utilizing computer network 125 . By accessing both the telephone connection and the computer network connection, the users can work together (e.g., collaborate) across both connections.
- Users can access spontaneous network collaboration during a telephone connection by sending a computer network address across the communication network 130 which is different than the computer network connection. This can be done, for example, by a touch tone Dual Tone Multi Frequency (DTMF) sequence, a modem sequence or by transmitting the data network address with the caller ID.
- DTMF Dual Tone Multi Frequency
- the computer network address information is sent across a different network than the computer network and so is “out-of-band” relative to the computer network.
- the system used is automatic and done with reduced negotiation time faster than training sequences.
- Training is an initial connection process a modem receiver uses to synchronize to a remote modem's transmit signal. Training may also occur during a connection usually to correct for extreme disruptions such as line outages or bursts of line noise. Training is actually the result of many interim tasks a modem performs to make a connection, such as automatic gain control adjustment, receiver timing acquisition, half-duplex equaliser convergence, echo cancellation convergence, full-duplex echo cancellation, equalizer convergence, and more. These tasks all occur during the initial handshake of the connection. During training, no data is transmitted, so from an application perspective it's lost time. A conventional fast train sequence can last about seven seconds.
- the recipient uses this computer network address to establish a substantially simultaneous and related connection across computer network 125 , e.g., via the Internet.
- This connection provides users with the ability to spontaneously access computer network connectivity and computer functionality, such as for a graphical link to access network collaboration software, simultaneously with a telephone connection.
- collaboration software is a synchronized web browser, where one party's navigation of the web drives the navigation of the web of the other party.
- video conferencing where the PSTN's ability to provide a high quality of service complements by video transmitted over the Internet.
- This technique provides benefits such as: lowered complexity of using a computer, software applications, and the Internet to enhance phone conversations through automatic connection, voice enabled computer collaboration without audio quality problems associated with Internet telephony, spontaneous connection without requiring a directory service to keep track of dynamic or unknown IP addresses.
- Computers 105 and 115 can also be configured with crossbar switches (e.g., N ⁇ N switches) to dynamically allocate audio input ports and output ports during a telephone connection, as described below.
- a user can connect one or more input ports to one or more output ports and change these connections without terminating the telephone connection.
- the crossbar switches allow users to dynamically set up and tear down connections between input ports and output ports in real-time. This allows a single device to be used for multiple speech interactions, such as telephony over the PSTN, Internet telephony, web-to-phone communications established through a remote web site, and local or remote voice control of a computer.
- Application programs executing on a computer can monitor audio signals on a connected PSTN line or Internet telephonic connection.
- the switch can also provide a uniform audio interface for application vendors independent of devices and connection media.
- Users can enhance privacy of communications across a telephone connection by using the computer to encrypt audio signals (e.g., electrical signals representing audible sounds) before transmission.
- Users establish a telephone connection and a computer network connection.
- a user at telephone 110 sends a secret key across computer network 125 .
- the user then encrypts audio signals using computers 105 and sends the encrypted signals across telephone network 130 .
- the recipient decrypts the signal using computer 115 .
- This encryption provides cost-effective crypto-phone capabilities and enhanced security by utilizing, for example, computer processing power, computer security features such as random number generators, private/public key pairs, and hidden execution capabilities.
- Users can also enhance telephone communications by authenticating the identity of a caller using computer network 125 and telephone network 130 , in applications such as commercial transactions.
- Users establish a telephone connection and a computer network connection.
- a user at telephone 110 sends a secret key generated by 105 across telephone network 130 using a mechanism such as DTMF to a user at telephone 120 .
- the user at telephone 120 returns the secret key across computer network 125 .
- the computer at telephone 110 verifies that the received secret key is the same as the secret key originally sent. This verification confirms that telephone 120 is coupled to computer 115 .
- the users can then use conventional digital certification techniques to verify the identity of computers 105 and 115 .
- the user at telephone 110 can attribute to the user at telephone 120 the level of trust provided by the identification credentials stored on, or transmitted via computer 115 .
- Mechanisms to ascertain the validity of the credentials can proceed using the Internet, as if the transaction were initiated on the computer using the Internet.
- Computers 105 and 115 can be coupled directly to telephone network 130 via a PBX, key system, or cellular network. Computers 105 and 115 can be individually connected to computer network 125 , or collectively with other computers via a local or wide area network (“LAN” or “WAN”). Computers 105 , 115 and telephones 110 , 120 can be connected to computer network 125 and telephone network 130 through digital subscriber line (“DSL” or “xDSL”) connections. An xDSL connection provides two logical signal paths across a signal physical line. Hence, computer 105 and telephone 110 can share a single physical connection to telephone network 130 . Computer 105 can access computer network 125 through a PoP connection to the Internet. In addition, more than two computers and telephones can be connected, such as in a conference call.
- LAN local or wide area network
- xDSL digital subscriber line
- FIG. 2 is a flowchart 200 showing the operations of spontaneously, e.g., without previous arrangements, establishing an IP connection between computers of user A and user B using the public switched telephone network (“PSTN”) and the configuration shown in FIG. 1 .
- PSTN public switched telephone network
- Users A and B each establish active connections to the Internet at 205 .
- the computers for users A and B each receive an IP address if addresses are dynamically assigned.
- User A calls user B across the PSTN, establishing a telephone connection, 210 .
- An application or agent on computer 105 causes the IP address for user A's computer to be encoded by either the computer 105 or the attached phone 110 in a form that can be sent across the PSTN, 215 .
- This encoding can be using a dual tone multi-frequency (“DTMF”) coding.
- the application or agent can supply a reference to the IP address of computer 105 , such as an entry in a known directory.
- User A sends the encoded IP address to user B's computer 115 across the PSTN 130 , through user B's phone 120 , 220 .
- User A can send the IP address in various ways.
- the IP address can be sent using DTMF signaling over the same channel as the user information (e.g., speech) or digitally encoded and sent along with caller ID through the telephone signaling channel.
- User A sends the encoded IP address for a computer network connection across the telephone network connection, a separate network from the computer network, so the signaling is “out-of-band signaling.”
- a telephone can include a “SEND” button. When user A presses the SEND button, the telephone requests the IP address from the computer 105 through connection 107 .
- the IP address can be provided in any format.
- the telephone then transmits the tones in a predetermined format such as hexadecimal encoding, using a mechanism such as DTMF encoding across the PSTN connection to user B's telephone.
- An application program or agent executing on user B's computer detects the encoded IP address as the address. This is received at user B's telephone at 225 . To facilitate this detection, the encoding can include a pre-defined flag to indicate an IP address.
- the agent decodes the IP address, 230 .
- the agent establishes communications, such as by sending a network connection request, across the Internet using the decoded IP address for user A's computer to connect to user A's computer, 235 .
- user A's telephone can send the encoded IP address for user A's computer as header information when the telephone connection is initially established, similar to information identifying user A's telephone (e.g., “caller ID”).
- user A can cause the IP address for user A's computer to be sent to all or some of the users. These users can then select whether to establish an IP connection.
- User A can initiate the transmission of the IP address by executing an application which employs an IP connection, such as network collaboration software. Operations performed by the agent on user B's computer can alternatively be performed by an application program under the control of user B.
- the computers can open an Internet telephony connection and cause the PSTN connection to end.
- FIG. 3A is a block diagram 300 of a second embodiment.
- An audio source 305 is coupled to an audio crossbar switch 310 .
- Audio source 305 supplies an audio signal to crossbar switch 310 .
- Audio source 305 can be a telephone or some other audio source, such as a microphone, computer sound system, or a connection to a network.
- Crossbar switch 310 has output ports respectively coupled to a telephone network 315 , such as the PSTN, a computer network 320 , such as the Internet, and a computer 325 . Output ports of crossbar switch 310 can be coupled to other devices as well, such as audio speakers or recording equipment.
- a control element 330 supplies control signals to crossbar switch 310 to cause crossbar switch 310 to output the audio signal from one or more of the output ports of crossbar switch 310 .
- crossbar switch 310 is shown with one input port and three output ports.
- crossbar switch 310 can have more or less input ports and output ports.
- Control element 330 can cause crossbar switch 310 to connect any combination of available input ports to any combination of available output ports.
- input ports and output ports can support two-way signaling, so that, for example, crossbar switch 310 can send signals to and receive signals from computer 325 .
- each input port or output port can provide a pair of couplings, one for input and one for output.
- FIG. 3B is a block diagram 350 showing a crossbar switch 310 coupled to a computer, such as computer 105 in FIG. 1 .
- Telephone 110 is coupled to an input port of crossbar switch 310 .
- Computer 105 , and telephone network 130 are coupled to output ports of crossbar switch 310 .
- Computer 105 is also coupled to control element 330 .
- Crossbar switch 310 can be implemented as an internal component of computer 105 or telephone 110 .
- a user at telephone 110 can route audio signals from telephone 110 through crossbar switch 310 to any one or more of its output ports: telephone network 130 , computer 105 , and computer network 125 through computer 105 .
- the user can command crossbar switch 310 to change the routing dynamically, without terminating a telephone connection.
- Crossbar switch 310 can preserve the telephone connection by establishing a second network connection before terminating the original network connection. For example, in one implementation, when the user has established a telephone connection across telephone network 130 and commands crossbar switch 310 to switch to a telephone connection across computer network 125 , after the computer network connection has been established as described above, crossbar switch 310 connects the ports corresponding to telephone 110 and computer network 130 while maintaining the connection between the ports corresponding to telephone 110 and telephone network 125 .
- crossbar switch 310 After connecting the ports for telephone 110 and computer network 125 , crossbar switch 310 ends the connection between the ports for telephone 110 and telephone network 130 .
- Crossbar switch 310 can also route information from computer 105 and telephone network 130 to telephone 110 , using the configurable two-way nature of the input ports and output ports.
- crossbar switch 310 can be used to support encrypting a conversation being sent across telephone network 130 .
- a user speaks into telephone 110 and crossbar switch 310 sends the audio signal to telephone network 130 .
- the user then activates encryption so that computer 105 adjusts control element 330 .
- crossbar switch 310 routes the audio signal to computer 105 .
- Computer 105 encrypts the audio signal and returns the encrypted signal to crossbar switch 310 .
- Crossbar switch 310 sends the encrypted signal to telephone network 130 .
- the encrypted signal can be sent across computer network 125 . Encryption is also described below.
- crossbar switch 310 provides a transparent real-time shift from a telephone network connection to a computer network connection.
- a user at telephone 110 establishes a connection across telephone network 130 .
- Crossbar switch 310 routes audio signals from telephone 110 to telephone network 130 .
- the user also establishes a computer network connection, such as by the process described above for spontaneous IP connections.
- computer 105 causes crossbar switch 310 to route the audio signals from telephone 110 to computer 105 , without interrupting the telephone conversation. This operation can occur simultaneously with a switching of the voice stream on the other side of the network.
- FIG. 4 is a flowchart 400 showing the process of encrypting an audio signal sent over a telephone connection, such as the PSTN, using a computer network connection, such as an IP connection, to facilitate the secure exchange of keys.
- Users A and B have access to computers and telephones configured as shown in FIG. 1 .
- the computers include crossbar switches, as described above.
- Users A and B each establish active connections to the Internet, 405 .
- the computers for users A and B each receive an IP address.
- User A calls user B across the PSTN, establishing a telephone connection, 410 .
- Users A and B establish a peer to peer IP connection, 415 , such as by the process described above and shown in FIG. 2 .
- the secret key is a cryptographic key for encrypting and decrypting information, such as a key for use with the data encryption standard (“DES”) cryptography method.
- the secret key is generated by security hardware built into user A's computer.
- User A can send the secret key to user B using a digital envelope constructed with a public key cryptography method, such as the Rivest-Shamir-Adleman (“RSA”) method.
- RSA Rivest-Shamir-Adleman
- user A encrypts the secret key with user B's public key.
- User B decrypts the secret key using user B's private key.
- the cross bar switch is configured such that audio signals from the telephone is routed from the telephone to the computer.
- Computer A encrypts the audio signal to be sent to user B using the secret key, 425 .
- the encryption is transparent to user A.
- User A activates a security application program or agent and that agent encrypts audio signals received from user A's telephone.
- Computer A sends the encrypted signal to user B across the PSTN, 430 .
- Computer B decrypts the encrypted signal using the secret key, 435 . This decryption is also transparent to user B.
- User B activates a security application program or agent and that agent decrypts encrypted signals received at user B's telephone.
- An identical process can encrypt audio signals from User B to User A.
- FIG. 5 is a flowchart 500 showing authenticating a caller during a telephone connection across a telephone network, such as the PSTN, using a computer network connection, such as an IP connection.
- Users A and B have access to computers and telephones configured as shown in FIG. 1 .
- Users A and B each establish active connections to the Internet at 505 .
- the computers for users A and B each receive an IP address.
- User B calls user A across the PSTN, establishing a telephone connection, 510 .
- Users A and B establish an IP connection, 515 , such as by the process described above and shown in FIG. 2 .
- user A verifies that the telephone that user B is using at the remote end of the telephone connection is coupled to the computer at the remote end of the IP connection, 520 .
- User A verifies this telephone-computer connection by sending a secret key signal across the PSTN and receiving the same signal back from user B across the IP connection.
- One example of this verification is described below with respect to FIG. 6 .
- Once User A verifies that user B's computer is the computer that user B asserts, conventional digital certification across the IP connection can be deployed to verify the validity of user B's digital credentials, 525 . If a device such as a smart card reader or a biometric identification device such as a fingerprint reader or retina scanner is configured on computer B, these can also be used as part of the identification validation process.
- FIG. 6 is a flowchart 600 of verifying the telephone-computer connection between user B's telephone and computer.
- User A generates a secret key including a random number using user A's computer, 605 .
- the random number can be generated by hardware.
- User A sends the random number to user B across the PSTN, 610 , using a mechanism such as Hex encoding and DTMF signaling.
- User B returns the random number across the IP connection, 615 .
- User A compares the random number received over the Internet with the original random number sent over the PSTN, 620 . If the Internet random number matches the original random number sent to user B, user A has verified that the telephone and computer of user B are coupled. This verification provides an additional level of security in transactions occurring across the PSTN. User A can verify that the caller has access to user B's computer using conventional digital certification. Using the technique described above, user A can also verify that the caller is using the telephone coupled to user B's computer. Authentication techniques continue to advance in fields such as biometrics. The ability to authenticate using a telephone connection provides a corresponding improvement in security.
- the technique of the present disclosure may be implemented in hardware or software, or a combination of both. Portions of the technique can be implemented by means of a computer program executing on one or more programmable systems each comprising at least one processor, a data storage system (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Program code is applied to input data to perform the functions described herein and generate output information. The output information is applied to one or more output devices, in known fashion.
- the processor may comprise, for example, a general purpose processor or a digital signal processor (DSP).
- Each program can be implemented in a high level procedural or object oriented programming language to communicate with a computer system although the invention is not limited in this respect.
- the programs can be implemented in assembly or machine language, if desired.
- the language may be a compiled or interpreted language.
- Each such computer program can be stored on a storage media or device (e.g., ROM or magnetic diskette) readable by a general or special purpose programmable computer, for configuring and operating the computer when the storage media or device is read by the computer to perform the procedures described herein.
- a storage media or device e.g., ROM or magnetic diskette
- the inventive system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner to perform the functions described herein.
- Both computers need not be connected to the computer network when the telephone connection is initially established.
- the “user” on one side of the connection can be automated, such as when a user calls a computer-controlled interactive voice response system, allowing a user to enhance interaction with a remote computer with graphical content.
- the encoding of an IP address can be performed within the telephone. Numerous security, cryptography, and authentication techniques, implemented in hardware and software, are well known and can be used.
- the voice network can be any voice system, including cellular or the like. This technique also applies to protocols other than IP.
- Addresses transmitted may or may not include associated application identifiers such as ports.
- the addresses transmitted might not be for the computer engaged in the transaction, but for a proxy on the network associated with the computer.
- the random number used for verifying the connection between a computer and a telephone can be encrypted.
- the technique can be used to verify a connection between devices other than computers and telephones.
Abstract
Establishing a network connection. In one aspect, establishing a network connection includes: establishing a connection across a first communication network that carries audio signals; encoding a computer network address for a specified network different from the first network into an encoded network address and sending the encoded network address across the first network; and using said network address to establish a network connection on said second network. In one implementation, network connectivity functionality of a computer can be automatically accessed using telephone connectivity. Out-of-band signaling provides a spontaneous network collaboration capability by sending an Internet protocol (“IP”) address across a public switched telephone network (“PSTN”) connection.
Description
- The present disclosure relates to simultaneous use of two separate networks, and the leveraging of connectivity on one network to create a logical connection on the second network.
- An Internet protocol (“IP”) address is used alone, or in conjunction with software endpoints called ports, by applications and communication stacks to establish an Internet connection between two intelligent devices such as computers. The IP address for a computer can be static or assigned dynamically when the computer connects to an intranet or the Internet. A dynamic IP address can change each time the computer connects to an intranet or the Internet.
- An IP connection is established after one of the computers discovers the other computer's IP and port addresses before establishing the IP connection. A computer can publish its IP and port addresses in a known location with a known IP address so that another computer can access the first computer's IP and port addresses. These known locations are sometimes referred to as “buddy lists”. This method of establishing an IP connection employs a pre-arranged agreement to establish the connection.
- The present disclosure describes methods and apparatus for establishing a network connection. In one aspect, establishing a network connection includes: establishing a connection across a first communication network that carries audio signals; encoding a computer network address for a specified network different from the first network into an encoded network address and sending the encoded network address across the first network; and using said network address to establish a network connection on said second network. In one implementation, network connectivity functionality of a computer can be automatically accessed using telephone connectivity. Out-of-band signaling provides a spontaneous network collaboration capability by sending an Internet protocol (“IP”) address across a public switched telephone network (“PSTN”) connection.
- In another aspect, Internet connectivity provides privacy across a telephone network through encryption including: establishing a connection across a voice communication network between a first party and a second party; establishing a connection across a computer network between the first party and the second party; transmitting an encryption key across the computer network so that both said first and second parties have said encryption key; encrypting an audio signal using the encryption key; and transmitting the encrypted audio signal across the voice telephone network.
- In another aspect, Internet connectivity provides identity authentication of a party to a telephone connection including: establishing a connection across a voice communication network between a calling telephone and a receiving telephone; establishing a connection across a computer network between a calling computer and a receiving computer; and verifying that the calling computer is coupled to the calling telephone by sending a signal from the receiving telephone to the calling telephone across the voice communication network and sending the signal from the calling computer to the receiving computer across the computer network.
- In another aspect, a crossbar switch provides dynamic allocation of audio input signals and output signals in a computer system and across a network or networks. The crossbar switch includes: a plurality of input ports, where one input port is coupled to an audio source; a plurality of output ports, where one output port is coupled to a telephone network, and one output port is coupled to a computer network; and a control element which physically s connects at least one input port to at least one output port and can dynamically change which input port is coupled to which output port. The switch can be implemented in hardware or software, or a combination of both.
-
FIG. 1 shows a block diagram of two computers coupled to respective telephones and interconnected by a computer network and a telephone network. -
FIG. 2 is a flowchart of spontaneously establishing an IP connection between users using the PSTN and the configuration shown inFIG. 1 . -
FIG. 3A is a block diagram showing an audio crossbar switch. -
FIG. 3B is a block diagram showing a crossbar switch coupled to a computer. -
FIG. 4 is a flowchart of encrypting an audio signal sent over a telephone network, such as the PSTN, using a computer network connection, such as an IP connection. -
FIG. 5 is a flowchart of authenticating a caller during a telephone connection across a telephone network, such as the PSTN, using a computer network connection, such as an IP connection. -
FIG. 6 is a flowchart of verifying the telephone-computer connection between user B's telephone and computer. -
FIG. 1 shows a block diagram 100 of an out-of-band signaling system. Afirst computer 105 is coupled to afirst telephone 110 through a path 107 that allows audio signals and/or data to be exchanged betweencomputer 105 andtelephone 110. Asecond computer 115 is coupled to asecond telephone 120 through a path 117 that allows audio signals and data to be exchanged betweencomputer 115 andtelephone 120.Computers Telephones computers computers telephones -
Computers computer network 125.Computer network 125 can be an Internet protocol (“IP”) network, such as the global Internet or an intranet. In one implementation,computers -
Telephones communication network 130, e.g., a voice telephone network such as a public switched telephone network (“PSTN”, or plain old telephone service network, “POTS”) or a private branch exchange (“PBX”). The connections totelephone network 130 can be analog and/or digital, depending upon the nature oftelephones -
Computers computer network 125 andtelephone network 130. While users are talking acrosstelephone network 130 usingtelephones computers computer network 125. By accessing both the telephone connection and the computer network connection, the users can work together (e.g., collaborate) across both connections. - Users can access spontaneous network collaboration during a telephone connection by sending a computer network address across the
communication network 130 which is different than the computer network connection. This can be done, for example, by a touch tone Dual Tone Multi Frequency (DTMF) sequence, a modem sequence or by transmitting the data network address with the caller ID. The computer network address information is sent across a different network than the computer network and so is “out-of-band” relative to the computer network. In one implementation, the system used is automatic and done with reduced negotiation time faster than training sequences. - Training is an initial connection process a modem receiver uses to synchronize to a remote modem's transmit signal. Training may also occur during a connection usually to correct for extreme disruptions such as line outages or bursts of line noise. Training is actually the result of many interim tasks a modem performs to make a connection, such as automatic gain control adjustment, receiver timing acquisition, half-duplex equaliser convergence, echo cancellation convergence, full-duplex echo cancellation, equalizer convergence, and more. These tasks all occur during the initial handshake of the connection. During training, no data is transmitted, so from an application perspective it's lost time. A conventional fast train sequence can last about seven seconds.
- The recipient uses this computer network address to establish a substantially simultaneous and related connection across
computer network 125, e.g., via the Internet. This connection provides users with the ability to spontaneously access computer network connectivity and computer functionality, such as for a graphical link to access network collaboration software, simultaneously with a telephone connection. One example of collaboration software is a synchronized web browser, where one party's navigation of the web drives the navigation of the web of the other party. Another example is video conferencing, where the PSTN's ability to provide a high quality of service complements by video transmitted over the Internet. This technique provides benefits such as: lowered complexity of using a computer, software applications, and the Internet to enhance phone conversations through automatic connection, voice enabled computer collaboration without audio quality problems associated with Internet telephony, spontaneous connection without requiring a directory service to keep track of dynamic or unknown IP addresses. -
Computers - Users can enhance privacy of communications across a telephone connection by using the computer to encrypt audio signals (e.g., electrical signals representing audible sounds) before transmission. Users establish a telephone connection and a computer network connection. A user at
telephone 110 sends a secret key acrosscomputer network 125. The user then encrypts audiosignals using computers 105 and sends the encrypted signals acrosstelephone network 130. The recipient decrypts thesignal using computer 115. This encryption provides cost-effective crypto-phone capabilities and enhanced security by utilizing, for example, computer processing power, computer security features such as random number generators, private/public key pairs, and hidden execution capabilities. - Users can also enhance telephone communications by authenticating the identity of a caller using
computer network 125 andtelephone network 130, in applications such as commercial transactions. Users establish a telephone connection and a computer network connection. A user attelephone 110 sends a secret key generated by 105 acrosstelephone network 130 using a mechanism such as DTMF to a user attelephone 120. The user attelephone 120 returns the secret key acrosscomputer network 125. The computer attelephone 110 verifies that the received secret key is the same as the secret key originally sent. This verification confirms thattelephone 120 is coupled tocomputer 115. The users can then use conventional digital certification techniques to verify the identity ofcomputers telephone 120 andcomputer 115, the user attelephone 110 can attribute to the user attelephone 120 the level of trust provided by the identification credentials stored on, or transmitted viacomputer 115. Mechanisms to ascertain the validity of the credentials can proceed using the Internet, as if the transaction were initiated on the computer using the Internet. - The configuration shown in
FIG. 1 can also be implemented in various alternative ways.Computers telephone network 130 via a PBX, key system, or cellular network.Computers computer network 125, or collectively with other computers via a local or wide area network (“LAN” or “WAN”).Computers telephones computer network 125 andtelephone network 130 through digital subscriber line (“DSL” or “xDSL”) connections. An xDSL connection provides two logical signal paths across a signal physical line. Hence,computer 105 andtelephone 110 can share a single physical connection totelephone network 130.Computer 105 can accesscomputer network 125 through a PoP connection to the Internet. In addition, more than two computers and telephones can be connected, such as in a conference call. -
FIG. 2 is aflowchart 200 showing the operations of spontaneously, e.g., without previous arrangements, establishing an IP connection between computers of user A and user B using the public switched telephone network (“PSTN”) and the configuration shown inFIG. 1 . Users A and B each establish active connections to the Internet at 205. Upon establishing these connections, the computers for users A and B each receive an IP address if addresses are dynamically assigned. User A calls user B across the PSTN, establishing a telephone connection, 210. An application or agent oncomputer 105 causes the IP address for user A's computer to be encoded by either thecomputer 105 or the attachedphone 110 in a form that can be sent across the PSTN, 215. This encoding can be using a dual tone multi-frequency (“DTMF”) coding. Instead of an IP address, the application or agent can supply a reference to the IP address ofcomputer 105, such as an entry in a known directory. - User A sends the encoded IP address to user B's
computer 115 across thePSTN 130, through user B'sphone computer 105 through connection 107. The IP address can be provided in any format. The telephone then transmits the tones in a predetermined format such as hexadecimal encoding, using a mechanism such as DTMF encoding across the PSTN connection to user B's telephone. - An application program or agent executing on user B's computer detects the encoded IP address as the address. This is received at user B's telephone at 225. To facilitate this detection, the encoding can include a pre-defined flag to indicate an IP address. The agent decodes the IP address, 230. The agent establishes communications, such as by sending a network connection request, across the Internet using the decoded IP address for user A's computer to connect to user A's computer, 235.
- Once the IP connection has been established, users A and B can continue to converse across the PSTN connection as well as run applications which utilize network connections. Examples of such applications include collaboration software, joint web browsing software, video, and network games.
- Various alternative implementations are possible. For example, user A's telephone can send the encoded IP address for user A's computer as header information when the telephone connection is initially established, similar to information identifying user A's telephone (e.g., “caller ID”). When multiple users are connected across the PSTN, such as in a conference call, user A can cause the IP address for user A's computer to be sent to all or some of the users. These users can then select whether to establish an IP connection. User A can initiate the transmission of the IP address by executing an application which employs an IP connection, such as network collaboration software. Operations performed by the agent on user B's computer can alternatively be performed by an application program under the control of user B. Once the IP connection is established, the computers can open an Internet telephony connection and cause the PSTN connection to end.
-
FIG. 3A is a block diagram 300 of a second embodiment. Anaudio source 305 is coupled to anaudio crossbar switch 310.Audio source 305 supplies an audio signal tocrossbar switch 310.Audio source 305 can be a telephone or some other audio source, such as a microphone, computer sound system, or a connection to a network.Crossbar switch 310 has output ports respectively coupled to atelephone network 315, such as the PSTN, acomputer network 320, such as the Internet, and acomputer 325. Output ports ofcrossbar switch 310 can be coupled to other devices as well, such as audio speakers or recording equipment. Acontrol element 330 supplies control signals tocrossbar switch 310 to causecrossbar switch 310 to output the audio signal from one or more of the output ports ofcrossbar switch 310. - In
FIG. 3A ,crossbar switch 310 is shown with one input port and three output ports. However,crossbar switch 310 can have more or less input ports and output ports.Control element 330 can causecrossbar switch 310 to connect any combination of available input ports to any combination of available output ports. In addition, input ports and output ports can support two-way signaling, so that, for example,crossbar switch 310 can send signals to and receive signals fromcomputer 325. Alternatively, each input port or output port can provide a pair of couplings, one for input and one for output. -
FIG. 3B is a block diagram 350 showing acrossbar switch 310 coupled to a computer, such ascomputer 105 inFIG. 1 .Telephone 110 is coupled to an input port ofcrossbar switch 310.Computer 105, andtelephone network 130 are coupled to output ports ofcrossbar switch 310.Computer 105 is also coupled to controlelement 330.Crossbar switch 310 can be implemented as an internal component ofcomputer 105 ortelephone 110. - A user at
telephone 110 can route audio signals fromtelephone 110 throughcrossbar switch 310 to any one or more of its output ports:telephone network 130,computer 105, andcomputer network 125 throughcomputer 105. The user can commandcrossbar switch 310 to change the routing dynamically, without terminating a telephone connection.Crossbar switch 310 can preserve the telephone connection by establishing a second network connection before terminating the original network connection. For example, in one implementation, when the user has established a telephone connection acrosstelephone network 130 and commandscrossbar switch 310 to switch to a telephone connection acrosscomputer network 125, after the computer network connection has been established as described above,crossbar switch 310 connects the ports corresponding to telephone 110 andcomputer network 130 while maintaining the connection between the ports corresponding to telephone 110 andtelephone network 125. After connecting the ports fortelephone 110 andcomputer network 125,crossbar switch 310 ends the connection between the ports fortelephone 110 andtelephone network 130.Crossbar switch 310 can also route information fromcomputer 105 andtelephone network 130 totelephone 110, using the configurable two-way nature of the input ports and output ports. - In one example of operation,
crossbar switch 310 can be used to support encrypting a conversation being sent acrosstelephone network 130. A user speaks intotelephone 110 andcrossbar switch 310 sends the audio signal totelephone network 130. The user then activates encryption so thatcomputer 105 adjustscontrol element 330. When the user speaks,crossbar switch 310 routes the audio signal tocomputer 105.Computer 105 encrypts the audio signal and returns the encrypted signal tocrossbar switch 310.Crossbar switch 310 sends the encrypted signal totelephone network 130. Alternatively, the encrypted signal can be sent acrosscomputer network 125. Encryption is also described below. - In another example,
crossbar switch 310 provides a transparent real-time shift from a telephone network connection to a computer network connection. A user attelephone 110 establishes a connection acrosstelephone network 130.Crossbar switch 310 routes audio signals fromtelephone 110 totelephone network 130. The user also establishes a computer network connection, such as by the process described above for spontaneous IP connections. When the user activates an IP telephony application program oncomputer 105,computer 105 causescrossbar switch 310 to route the audio signals fromtelephone 110 tocomputer 105, without interrupting the telephone conversation. This operation can occur simultaneously with a switching of the voice stream on the other side of the network. -
FIG. 4 is aflowchart 400 showing the process of encrypting an audio signal sent over a telephone connection, such as the PSTN, using a computer network connection, such as an IP connection, to facilitate the secure exchange of keys. Users A and B have access to computers and telephones configured as shown inFIG. 1 . In one implementation, the computers include crossbar switches, as described above. Users A and B each establish active connections to the Internet, 405. As part of establishing these connections, the computers for users A and B each receive an IP address. User A calls user B across the PSTN, establishing a telephone connection, 410. Users A and B establish a peer to peer IP connection, 415, such as by the process described above and shown inFIG. 2 . - User A then sends a secret key to user B across the IP connection, 420. The secret key is a cryptographic key for encrypting and decrypting information, such as a key for use with the data encryption standard (“DES”) cryptography method. In one implementation, the secret key is generated by security hardware built into user A's computer. User A can send the secret key to user B using a digital envelope constructed with a public key cryptography method, such as the Rivest-Shamir-Adleman (“RSA”) method. Thus, user A encrypts the secret key with user B's public key. User B decrypts the secret key using user B's private key. The cross bar switch is configured such that audio signals from the telephone is routed from the telephone to the computer.
- Computer A encrypts the audio signal to be sent to user B using the secret key, 425. The encryption is transparent to user A. User A activates a security application program or agent and that agent encrypts audio signals received from user A's telephone. Computer A sends the encrypted signal to user B across the PSTN, 430. Computer B decrypts the encrypted signal using the secret key, 435. This decryption is also transparent to user B. User B activates a security application program or agent and that agent decrypts encrypted signals received at user B's telephone. An identical process can encrypt audio signals from User B to User A. Thus, once the secret key has been transferred across the IP connection, the users can converse across the PSTN connection while the computers encrypt and decrypt the users' audio signals.
-
FIG. 5 is aflowchart 500 showing authenticating a caller during a telephone connection across a telephone network, such as the PSTN, using a computer network connection, such as an IP connection. Users A and B have access to computers and telephones configured as shown inFIG. 1 . Users A and B each establish active connections to the Internet at 505. As part of establishing these connections, the computers for users A and B each receive an IP address. User B calls user A across the PSTN, establishing a telephone connection, 510. Users A and B establish an IP connection, 515, such as by the process described above and shown inFIG. 2 . - To authenticate user B, user A verifies that the telephone that user B is using at the remote end of the telephone connection is coupled to the computer at the remote end of the IP connection, 520. User A verifies this telephone-computer connection by sending a secret key signal across the PSTN and receiving the same signal back from user B across the IP connection. One example of this verification is described below with respect to
FIG. 6 . Once User A verifies that user B's computer is the computer that user B asserts, conventional digital certification across the IP connection can be deployed to verify the validity of user B's digital credentials, 525. If a device such as a smart card reader or a biometric identification device such as a fingerprint reader or retina scanner is configured on computer B, these can also be used as part of the identification validation process. -
FIG. 6 is aflowchart 600 of verifying the telephone-computer connection between user B's telephone and computer. User A generates a secret key including a random number using user A's computer, 605. The random number can be generated by hardware. User A sends the random number to user B across the PSTN, 610, using a mechanism such as Hex encoding and DTMF signaling. User B returns the random number across the IP connection, 615. - User A compares the random number received over the Internet with the original random number sent over the PSTN, 620. If the Internet random number matches the original random number sent to user B, user A has verified that the telephone and computer of user B are coupled. This verification provides an additional level of security in transactions occurring across the PSTN. User A can verify that the caller has access to user B's computer using conventional digital certification. Using the technique described above, user A can also verify that the caller is using the telephone coupled to user B's computer. Authentication techniques continue to advance in fields such as biometrics. The ability to authenticate using a telephone connection provides a corresponding improvement in security.
- The technique of the present disclosure may be implemented in hardware or software, or a combination of both. Portions of the technique can be implemented by means of a computer program executing on one or more programmable systems each comprising at least one processor, a data storage system (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Program code is applied to input data to perform the functions described herein and generate output information. The output information is applied to one or more output devices, in known fashion. The processor may comprise, for example, a general purpose processor or a digital signal processor (DSP).
- Each program can be implemented in a high level procedural or object oriented programming language to communicate with a computer system although the invention is not limited in this respect. However, the programs can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language.
- Each such computer program can be stored on a storage media or device (e.g., ROM or magnetic diskette) readable by a general or special purpose programmable computer, for configuring and operating the computer when the storage media or device is read by the computer to perform the procedures described herein. The inventive system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner to perform the functions described herein.
- Various implementations have been described. However, these implementations are examples and are not limiting. For example, the order of operations of the processes described is illustrative and alternative orders are possible. Both computers need not be connected to the computer network when the telephone connection is initially established. The “user” on one side of the connection can be automated, such as when a user calls a computer-controlled interactive voice response system, allowing a user to enhance interaction with a remote computer with graphical content. The encoding of an IP address can be performed within the telephone. Numerous security, cryptography, and authentication techniques, implemented in hardware and software, are well known and can be used. The voice network can be any voice system, including cellular or the like. This technique also applies to protocols other than IP. Addresses transmitted may or may not include associated application identifiers such as ports. The addresses transmitted might not be for the computer engaged in the transaction, but for a proxy on the network associated with the computer. The random number used for verifying the connection between a computer and a telephone can be encrypted. The technique can be used to verify a connection between devices other than computers and telephones.
Claims (7)
1-24. (canceled)
25. A crossbar switch, comprising:
a switch including at least one analog input port, at least one digital input port, at least one analog output port, at least one digital output port, and a processor which generates digital signals based upon analog signals received at said at least one analog input port;
at least one analog input channel which receives an audio signal, where each analog input channel is coupled to a corresponding analog input port of the switch;
at least one digital input channel, where each digital input channel is coupled to a corresponding digital input port of the switch;
at least one analog output channel, where each analog output channel is coupled to a corresponding analog output port of the switch;
at least one digital output channel, where each digital output channel is coupled to a corresponding digital output port of the switch; and
a control element coupled to the switch,
where the control element is adapted to control which of the analog input ports, digital input ports, analog output ports, and digital output ports are active,
where an active input port sends a signal received at the input port from a coupled channel into the switch, and an active output port sends a signal from within the switch to a coupled channel, allowing a signal received at any input port of the switch to be sent to one or more channels coupled to corresponding output ports of the switch.
26. An audio crossbar switch, comprising a plurality of input ports, where one input port is coupled to an audio source;
a plurality of output ports, where one output port is coupled to a telephone network, and one output port is coupled to a computer network; and
a control element which physically connects at least one input port to at least one output port and can dynamically change which input port is coupled to which output port.
27. The audio crossbar switch of claim 26 , where the audio source is a telephone.
28. The audio crossbar switch of claim 26 , where the control element can change a connection between the audio source and the telephone network to a connection between the audio source and the computer network without terminating a telephone conversation occurring through the connection between the audio source and the telephone network.
29. An audio crossbar switch, comprising:
an audio input port for receiving an audio signal;
a plurality of output ports, where one output port is coupled to a telephone network, one output port is coupled to a computer network, and one output port is coupled to a computer; and
a control element, where the control element is adapted to control and switch in real-time which one or more of the output ports the audio signal transmits the audio signal.
30-32. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/107,095 US20050185638A1 (en) | 1999-04-08 | 2005-04-15 | Out-of-band signaling for network based computer session synchronization with crossbars |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/289,305 US6907034B1 (en) | 1999-04-08 | 1999-04-08 | Out-of-band signaling for network based computer session synchronization |
US11/107,095 US20050185638A1 (en) | 1999-04-08 | 2005-04-15 | Out-of-band signaling for network based computer session synchronization with crossbars |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/289,305 Division US6907034B1 (en) | 1999-04-08 | 1999-04-08 | Out-of-band signaling for network based computer session synchronization |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050185638A1 true US20050185638A1 (en) | 2005-08-25 |
Family
ID=34632670
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/289,305 Expired - Fee Related US6907034B1 (en) | 1999-04-08 | 1999-04-08 | Out-of-band signaling for network based computer session synchronization |
US11/107,095 Abandoned US20050185638A1 (en) | 1999-04-08 | 2005-04-15 | Out-of-band signaling for network based computer session synchronization with crossbars |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/289,305 Expired - Fee Related US6907034B1 (en) | 1999-04-08 | 1999-04-08 | Out-of-band signaling for network based computer session synchronization |
Country Status (1)
Country | Link |
---|---|
US (2) | US6907034B1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070047693A1 (en) * | 2005-08-08 | 2007-03-01 | Jean Bouchard | Method, system and apparatus for controlling a voice recorder |
US20070047694A1 (en) * | 2005-08-08 | 2007-03-01 | Jean Bouchard | Method, system and apparatus for communicating data associated with a user of a voice communication device |
US20080250108A1 (en) * | 2007-04-09 | 2008-10-09 | Blogtv.Com Ltd. | Web and telephony interaction system and method |
US20090003323A1 (en) * | 2007-06-29 | 2009-01-01 | Masayuki Ishibashi | Ip telephone system and ip telephone terminal used therein |
US20110235631A1 (en) * | 2010-03-24 | 2011-09-29 | Avaya Inc. | Method and apparatus for automatic verification of telephone number mapping |
JP2014057184A (en) * | 2012-09-12 | 2014-03-27 | Nippon Telegraph & Telephone West Corp | Vpn communication system |
US8935523B1 (en) * | 2012-07-18 | 2015-01-13 | Dj Inventions, Llc | Cryptographic protected communication system with multiplexed cryptographic cryptopipe modules |
CN104811583A (en) * | 2015-05-06 | 2015-07-29 | 广州海格通信集团股份有限公司 | Video and audio synchronizing device and method |
DE102014005701A1 (en) * | 2014-04-17 | 2015-10-22 | HST High Soft Tech GmbH | Method for telephone authentication of users of private or public networks for data exchange |
US10346853B2 (en) | 2000-06-20 | 2019-07-09 | Gametek Llc | Computing environment transaction system to transact computing environment circumventions |
Families Citing this family (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7092380B1 (en) * | 1999-10-22 | 2006-08-15 | Cisco Technology, Inc. | Method and system for providing voice communication over data networks |
US7757272B1 (en) * | 2000-06-14 | 2010-07-13 | Verizon Corporate Services Group, Inc. | Method and apparatus for dynamic mapping |
US7870599B2 (en) * | 2000-09-05 | 2011-01-11 | Netlabs.Com, Inc. | Multichannel device utilizing a centralized out-of-band authentication system (COBAS) |
JP2002278903A (en) * | 2001-03-15 | 2002-09-27 | Sony Corp | Information processor, information processing method, recording medium and program |
US7254226B1 (en) | 2001-05-08 | 2007-08-07 | At&T Intellectual Property, Inc. | Call waiting priority alert |
US7085358B2 (en) | 2001-06-25 | 2006-08-01 | Bellsouth Intellectual Property Corporation | Visual caller identification |
US20030007609A1 (en) * | 2001-07-03 | 2003-01-09 | Yuen Michael S. | Method and apparatus for development, deployment, and maintenance of a voice software application for distribution to one or more consumers |
US7609829B2 (en) * | 2001-07-03 | 2009-10-27 | Apptera, Inc. | Multi-platform capable inference engine and universal grammar language adapter for intelligent voice application execution |
US7315614B2 (en) | 2001-08-14 | 2008-01-01 | At&T Delaware Intellectual Property, Inc. | Remote notification of communications |
US7269249B2 (en) | 2001-09-28 | 2007-09-11 | At&T Bls Intellectual Property, Inc. | Systems and methods for providing user profile information in conjunction with an enhanced caller information system |
US20030072298A1 (en) * | 2001-10-17 | 2003-04-17 | Infocus Corporation | Dataconferencing method |
US7237004B2 (en) * | 2001-10-17 | 2007-06-26 | Infocus Corporation | Dataconferencing appliance and system |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7681034B1 (en) * | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US7315618B1 (en) | 2001-12-27 | 2008-01-01 | At&T Bls Intellectual Property, Inc. | Voice caller ID |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US7748045B2 (en) | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US20050071657A1 (en) * | 2003-09-30 | 2005-03-31 | Pss Systems, Inc. | Method and system for securing digital assets using time-based security criteria |
US7586898B1 (en) * | 2002-05-13 | 2009-09-08 | At&T Intellectual Property, I, L.P. | Third party content for internet caller-ID messages |
US7623645B1 (en) | 2002-07-23 | 2009-11-24 | At&T Intellectual Property, I, L.P. | System and method for gathering information related to a geographical location of a caller in a public switched telephone network |
US7139374B1 (en) | 2002-07-23 | 2006-11-21 | Bellsouth Intellectual Property Corp. | System and method for gathering information related to a geographical location of a callee in a public switched telephone network |
US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
FR2845551B1 (en) * | 2002-10-04 | 2005-01-14 | Atlinks | TELEPHONE STATION, MULTIMEDIA TERMINAL AND SERVER |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US7443964B2 (en) * | 2003-04-18 | 2008-10-28 | At&T Intellectual Property, I,L.P. | Caller ID messaging |
US7978833B2 (en) | 2003-04-18 | 2011-07-12 | At&T Intellectual Property I, L.P. | Private caller ID messaging |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US7623849B2 (en) | 2003-11-13 | 2009-11-24 | At&T Intellectual Property, I, L.P. | Method, system, and storage medium for providing comprehensive originator identification services |
US7697673B2 (en) * | 2003-11-17 | 2010-04-13 | Apptera Inc. | System for advertisement selection, placement and delivery within a multiple-tenant voice interaction service system |
DE10354947A1 (en) * | 2003-11-25 | 2005-06-30 | Siemens Ag | Method for transmitting communication data in a communication system |
US7672444B2 (en) | 2003-12-24 | 2010-03-02 | At&T Intellectual Property, I, L.P. | Client survey systems and methods using caller identification information |
US8195136B2 (en) | 2004-07-15 | 2012-06-05 | At&T Intellectual Property I, L.P. | Methods of providing caller identification information and related registries and radiotelephone networks |
US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
MY145725A (en) * | 2004-07-30 | 2012-03-30 | Ericsson Telefon Ab L M | Method and system for retrieving network addresses in hybrid telecommunication networks |
EP1650969A1 (en) * | 2004-10-25 | 2006-04-26 | Alcatel | Method for establishing an IP video-conference using a telephone network for voice transmission |
KR100680730B1 (en) * | 2005-02-18 | 2007-02-09 | 한국정보통신대학교 산학협력단 | System and method for handoff between a different kind of device and SIP server and working method of SIP server using the same |
US8265069B2 (en) * | 2005-06-23 | 2012-09-11 | Nokia Corporation | System, terminal, method, and computer program product for establishing a transport-level connection with a server located behind a network address translator and/or firewall |
US8483100B2 (en) * | 2005-11-14 | 2013-07-09 | Broadcom Corporation | Communication device supporting both internet and public switched telephone network telephony |
US7778261B2 (en) * | 2005-11-15 | 2010-08-17 | ArcSoft (Shanghai) Technology | Using PSTN to communicate IP address for point-to-point text, voice, video, or data communication |
US7873743B2 (en) * | 2005-12-05 | 2011-01-18 | Sony Ericsson Mobile Communications Ab | Electronic apparatus with router device for managing connections |
KR100775349B1 (en) * | 2006-03-31 | 2007-11-12 | 엘지전자 주식회사 | Method and device for selecting service domain |
US20080109545A1 (en) * | 2006-11-02 | 2008-05-08 | Hemal Shah | Method and system for two-phase mechanism for discovering web services based management service |
US7933413B2 (en) * | 2007-02-02 | 2011-04-26 | Microsoft Corporation | Key exchange verification |
US8160226B2 (en) | 2007-08-22 | 2012-04-17 | At&T Intellectual Property I, L.P. | Key word programmable caller ID |
US8243909B2 (en) | 2007-08-22 | 2012-08-14 | At&T Intellectual Property I, L.P. | Programmable caller ID |
US9363228B2 (en) * | 2009-12-15 | 2016-06-07 | Qualcomm Innovation Center, Inc. | Apparatus and method of peer-to-peer communication |
US10474838B1 (en) * | 2018-11-20 | 2019-11-12 | Capital One Services, LLC. | Systems and methods for the secured entry and storage of sensitive data |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5222136A (en) * | 1992-07-23 | 1993-06-22 | Crest Industries, Inc. | Encrypted communication system |
US5608786A (en) * | 1994-12-23 | 1997-03-04 | Alphanet Telecom Inc. | Unified messaging system and method |
US5642397A (en) * | 1991-05-01 | 1997-06-24 | Alonzo Williams | Paging system which combines a paging signal with a standard broadcast baseband signal |
US5726984A (en) * | 1989-01-31 | 1998-03-10 | Norand Corporation | Hierarchical data collection network supporting packetized voice communications among wireless terminals and telephones |
US5815804A (en) * | 1997-04-17 | 1998-09-29 | Motorola | Dual-band filter network |
US5917817A (en) * | 1996-12-06 | 1999-06-29 | International Business Machines Corporation | User invocation of services in public switched telephone network via parallel data networks |
US5987129A (en) * | 1996-02-21 | 1999-11-16 | Card Call Service Co., Ltd. | Method of sharing cryptokey |
US6078579A (en) * | 1996-07-25 | 2000-06-20 | Wjw Technologies Inc. | Telephonic systems for communication over computer networks |
US6115460A (en) * | 1997-06-30 | 2000-09-05 | Lucent Technologies Inc. | Call redirection system |
US6122255A (en) * | 1996-04-18 | 2000-09-19 | Bell Atlantic Network Services, Inc. | Internet telephone service with mediation |
US6304659B1 (en) * | 1996-03-15 | 2001-10-16 | Tandberg Television Asa | Secure data broadcasting |
US6324280B2 (en) * | 1998-05-05 | 2001-11-27 | Lucent Technologies, Inc. | Optimum routing of calls over the public switched telephone network and the internet |
US6389005B1 (en) * | 1997-12-01 | 2002-05-14 | Nortel Networks Limited | Automatic backup trunking for voice over the internet |
US6393460B1 (en) * | 1998-08-28 | 2002-05-21 | International Business Machines Corporation | Method and system for informing users of subjects of discussion in on-line chats |
US6434378B1 (en) * | 1995-12-08 | 2002-08-13 | Cellexis International, Inc. | Pre-paid cellular telephone system |
US6584094B2 (en) * | 1996-09-12 | 2003-06-24 | Avaya Technology Corp. | Techniques for providing telephonic communications over the internet |
US6603857B1 (en) * | 1997-07-14 | 2003-08-05 | Entrust Technologies Limited | Method and apparatus for controlling release of time sensitive information |
-
1999
- 1999-04-08 US US09/289,305 patent/US6907034B1/en not_active Expired - Fee Related
-
2005
- 2005-04-15 US US11/107,095 patent/US20050185638A1/en not_active Abandoned
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5726984A (en) * | 1989-01-31 | 1998-03-10 | Norand Corporation | Hierarchical data collection network supporting packetized voice communications among wireless terminals and telephones |
US5642397A (en) * | 1991-05-01 | 1997-06-24 | Alonzo Williams | Paging system which combines a paging signal with a standard broadcast baseband signal |
US5222136A (en) * | 1992-07-23 | 1993-06-22 | Crest Industries, Inc. | Encrypted communication system |
US5608786A (en) * | 1994-12-23 | 1997-03-04 | Alphanet Telecom Inc. | Unified messaging system and method |
US6434378B1 (en) * | 1995-12-08 | 2002-08-13 | Cellexis International, Inc. | Pre-paid cellular telephone system |
US5987129A (en) * | 1996-02-21 | 1999-11-16 | Card Call Service Co., Ltd. | Method of sharing cryptokey |
US6304659B1 (en) * | 1996-03-15 | 2001-10-16 | Tandberg Television Asa | Secure data broadcasting |
US6122255A (en) * | 1996-04-18 | 2000-09-19 | Bell Atlantic Network Services, Inc. | Internet telephone service with mediation |
US6078579A (en) * | 1996-07-25 | 2000-06-20 | Wjw Technologies Inc. | Telephonic systems for communication over computer networks |
US6584094B2 (en) * | 1996-09-12 | 2003-06-24 | Avaya Technology Corp. | Techniques for providing telephonic communications over the internet |
US5917817A (en) * | 1996-12-06 | 1999-06-29 | International Business Machines Corporation | User invocation of services in public switched telephone network via parallel data networks |
US5815804A (en) * | 1997-04-17 | 1998-09-29 | Motorola | Dual-band filter network |
US6115460A (en) * | 1997-06-30 | 2000-09-05 | Lucent Technologies Inc. | Call redirection system |
US6603857B1 (en) * | 1997-07-14 | 2003-08-05 | Entrust Technologies Limited | Method and apparatus for controlling release of time sensitive information |
US6389005B1 (en) * | 1997-12-01 | 2002-05-14 | Nortel Networks Limited | Automatic backup trunking for voice over the internet |
US6324280B2 (en) * | 1998-05-05 | 2001-11-27 | Lucent Technologies, Inc. | Optimum routing of calls over the public switched telephone network and the internet |
US6393460B1 (en) * | 1998-08-28 | 2002-05-21 | International Business Machines Corporation | Method and system for informing users of subjects of discussion in on-line chats |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10607237B2 (en) | 2000-06-20 | 2020-03-31 | Gametek Llc | Computing environment transaction system to transact purchases of objects incorporated into games |
US10346853B2 (en) | 2000-06-20 | 2019-07-09 | Gametek Llc | Computing environment transaction system to transact computing environment circumventions |
US10116790B2 (en) * | 2005-08-08 | 2018-10-30 | Bce Inc. | Method, system and apparatus for communicating data associated with a user of a voice communication device |
US20070047694A1 (en) * | 2005-08-08 | 2007-03-01 | Jean Bouchard | Method, system and apparatus for communicating data associated with a user of a voice communication device |
US7965821B2 (en) | 2005-08-08 | 2011-06-21 | Bce Inc. | Method, system and apparatus for controlling a voice recorder |
US20070047693A1 (en) * | 2005-08-08 | 2007-03-01 | Jean Bouchard | Method, system and apparatus for controlling a voice recorder |
US20080250108A1 (en) * | 2007-04-09 | 2008-10-09 | Blogtv.Com Ltd. | Web and telephony interaction system and method |
US8675643B2 (en) * | 2007-06-29 | 2014-03-18 | Brother Kogyc Kabushiki Kaisha | IP telephone system and iP telephone terminal used therein |
US20090003323A1 (en) * | 2007-06-29 | 2009-01-01 | Masayuki Ishibashi | Ip telephone system and ip telephone terminal used therein |
US20110235631A1 (en) * | 2010-03-24 | 2011-09-29 | Avaya Inc. | Method and apparatus for automatic verification of telephone number mapping |
US8935523B1 (en) * | 2012-07-18 | 2015-01-13 | Dj Inventions, Llc | Cryptographic protected communication system with multiplexed cryptographic cryptopipe modules |
JP2014057184A (en) * | 2012-09-12 | 2014-03-27 | Nippon Telegraph & Telephone West Corp | Vpn communication system |
DE102014005701A1 (en) * | 2014-04-17 | 2015-10-22 | HST High Soft Tech GmbH | Method for telephone authentication of users of private or public networks for data exchange |
CN104811583A (en) * | 2015-05-06 | 2015-07-29 | 广州海格通信集团股份有限公司 | Video and audio synchronizing device and method |
Also Published As
Publication number | Publication date |
---|---|
US6907034B1 (en) | 2005-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6907034B1 (en) | Out-of-band signaling for network based computer session synchronization | |
JP4401849B2 (en) | System and method for establishing a secondary channel | |
US5615266A (en) | Secure communication setup method | |
CN106164922B (en) | Self-organizing one-time pairing of remote devices using online audio fingerprinting | |
US7464267B2 (en) | System and method for secure transmission of RTP packets | |
US7221663B2 (en) | Method and apparatus for wideband conferencing | |
KR0155164B1 (en) | Teleconferencing method for a secure key management system | |
US4920565A (en) | Method for connection of secure conference calls | |
KR19990082421A (en) | Voice internet transmission system | |
EP0671091A1 (en) | Method for key management of point-to-point communications | |
US5588062A (en) | Secure communication setup method | |
US5696880A (en) | Communication system user authentication method | |
US7986773B2 (en) | Interactive voice response system security | |
US20110135093A1 (en) | Secure telephone devices, systems and methods | |
US8693686B2 (en) | Secure telephone devices, systems and methods | |
EP1981239B1 (en) | Securing multimedia network communication | |
CN114553422A (en) | VoLTE voice encryption communication method, terminal and system | |
WO2022245591A1 (en) | Hiding private user data in public signature chains for user authentication in video conferences | |
US20070140456A1 (en) | Method and apparatus for wideband conferencing | |
AU772998B2 (en) | Internal line control system | |
CN114040385A (en) | VoLTE-based encrypted call system and method | |
US7187763B1 (en) | Secure method for conferencing through a remote PBX | |
WO2012106528A2 (en) | A method of providing lawful interception of data in a secure communication system | |
US20230299991A1 (en) | App pinning for video conferences | |
KR20040011695A (en) | Security handfree kit and security communication system and method using public key infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BEGIS, GLENN;REEL/FRAME:016688/0152 Effective date: 19990610 Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BEGIS, GLENN;REEL/FRAME:016326/0908 Effective date: 19990610 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |