The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 19, 2013

Filed:

Oct. 30, 2010
Applicants:

Dipen T. Patel, Chandler, AZ (US);

John Curtis, Gilbert, AZ (US);

James C. Jones, Tempe, AZ (US);

Darren Cummings, Chandler, AZ (US);

Inventors:

Dipen T. Patel, Chandler, AZ (US);

John Curtis, Gilbert, AZ (US);

James C. Jones, Tempe, AZ (US);

Darren Cummings, Chandler, AZ (US);

Assignee:

SAIFE Technologies Incorporated, Chandler, AZ (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04M 1/66 (2006.01); H04L 29/06 (2006.01); G06F 9/00 (2006.01);
U.S. Cl.
CPC ...
Abstract

A method for establishing communication via a VoIP network bypasses the IP PBX component conventionally used to obtain address information. Instead of obtaining the IP address from a location register of the IP PBX, the method involves use of a server configured to assign and provide to the caller's communication device a unique address (IP address/port) of a proxy. The caller then sends a Short Message Service (SMS) text message to the callee with the assigned address of the proxy. Thereafter, the caller and the callee connect at the assigned address of the proxy, thereby forming a communication path. Preferably, the devices operated by the parties are conventional smart phones. According to the preferred embodiment of the present invention, the method further comprises the steps of: determining whether to encrypt the communication; and encrypting the communication, if it is determined that the communication is to be encrypted. Preferably, the Station-to-Station (STS) protocol is used to encrypt the data packets.


Find Patent Forward Citations

Loading…