Method and system for connecting communication devices...

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Session/connection parameter setting

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06317793

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Technical Field
The present invention relates to the creation of a connection, enabling communication across a communication network.
2. Description of the Related Art
With an Internet browser a user is able to access the Internet, one of the communication networks, while using a personal computer (PC) that incorporates a communication function, and can use the access that is afforded to search for information available from Internet servers. However, when the user desires to link up with another network, such as that which is represented by the public telephone system, based on information obtained by using an Internet browser, the user either must employ another communication device, or must record the relevant connection information and use communication software other than the Internet browser to link to the other network.
When, for example, a pager calling number is provided by a server that is connected to the Internet and a user desires to dial that number, the user either must use an ordinary telephone set to dial the recorded pager number displayed on the screen, or must temporarily terminate his or her use of the Internet browser that is being employed for the search process and dial the number using pager calling software, such as the Pocket-Bell Messenger that is available from J. C. N.land Co., Ltd. (“J. C. N.land” and “Pocket-Bell Messenger” are trademarks of J. C. N.land Co., Ltd.). If, while a user were employing the Internet browser, he or she could immediately dial a pager number extracted from information obtained using an Internet browser, a reduction would be possible in both the time required for the connection and in the amount of work required of the user.
The Internet links various types of networks, such as the Ethernet, the FDDI, X.25 packet switched networks, the ISDN and the private line, to form an interconnected grouping of networks. Hosts that are connected to different types of communication media can communicate with each other without having to take low level operating differences into consideration. A plurality of communication techniques are combined and united to provide the architecture for a wide ranging network system, one that can not be obtained using the facilities provided by isolated network architectures. Thus it is possible for a user to access information that is available worldwide. However, as the Internet is a worldwide network, and in accordance with its positive aspects does provide great advantages for users, on the network there is an increased risk that the security and secrecy of information will be compromised. That is, on a network, such as the Internet, that comprises a wide ranging, complicated grouping of interconnected networks, the environment in which the network devices and communication cables are located is not always secure, and data can be trapped by tapping an Ethernet LAN cable, or can be captured from an on-line terminal board.
On the Internet, in most cases information is exchanged across a plurality of networks. To insure there is adequate security during the exchange of secret information, data must be enciphered, and transmission routes must be selected along which highly secure locations are provided for such devices as gateways. A user, therefore, in addition to other expenses, must purchase enciphering software, and has the additional task of selecting a route along which adequate security is provided. Further, because of the restrictions that the United States has placed on the export of enciphering devices, the types of enciphering devices and the enciphering software that are available world-wide are limited. Although on-line trading, such as on-line shopping, is technically possible on the Internet, when the current Internet is used, the password and the credit card number of a user may be snared for subsequent illegal employment.
To resolve the shortcomings encountered with security, one technique that is employed involves the use of what is called a firewall. To protect an internal network (intranet) from unwanted intrusions, a host uses a firewall, which is positioned between the internal network and the Internet, to limit external data communication access. This technique, however, while it ensures that security will be maintained within an organization, does not provide any security for the exchange of information that occurs outside the firewall. For the transmission of highly secret data, the use of a network that provides greater security than the internet, such as a facsimile transmission system, is conventionally resorted to as the easiest method by which to provide the level of security that is required. In this case, while an Internet browser is being used, it is also for another network, such as the aforementioned facsimile transmission system, to be immediately employed based on information acquired by the Internet browser.
SUMMARY OF THE INVENTION
It is therefore one object of the present invention to provide a method based on connection information, which is obtained for a communication device from a server on a network, for an automatic connection to the communication device.
It is another object of the present invention to provide a method for converting, into information that is useable by a communication device, information obtained across a network from a server, and for transmitting the converted information to the communication device.
According to one aspect of the present invention, a method for transferring data from a first communication device to a second communication device comprises the steps of: accessing an Internet server whereat are stored a telephone number and transmission information for connecting the first communication device with the second communication device; transmitting, from the first communication device to the server, a command instructing the server to transmit to the first communication device data that include the telephone number and the transmission information; receiving, at the first communication device, from the server, the data that include the telephone number and the transmission information at the first communication device; storing the data that include the telephone number and the transmission information; disconnecting the first communication devices from the server; using the telephone number to connect the first communication device with the second communication device across a public telephone network; converting the transmission information into a form that is useable by a type of the second communication device; and transferring the resultant transmission information from the first communication device to the second communication device.
The “first communication device” may not only be an ordinary PC or a workstation, which incorporates an input device and a display device, but may also be a network controller or a game machine, which outputs an image signal to the receiver for a home TV set and does not incorporate a display device and from which an input device can be detached. The “second communication device” is a communication device that has a communication function, for example: a telephone set, a facsimile machine, a PC, a workstation, a portable telephone, a PHS, a pager, an electronic notebook, a notebook PC, or a palm-top PC. The “data that include a telephone number and transmission information” are data that include not only a telephone number and transmission information, but also text data that include a telephone number and transmission information. The “form that is useable by a type of the second communication device” is a form that is in accordance not only with a type of telephone set, facsimile machine, PC, workstation, portable telephone, PHS, pager, electronic notebook, notebook PC, or palm-top PC, but also with the types of encryption and coding that the second communication device employs, the types of compression, and the types of other protocols. The transmission information is data that include the contents of a message that is to be transferred to the second commu

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for connecting communication devices... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for connecting communication devices..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for connecting communication devices... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2596620

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.