US20060221174A1 - Method of videophone data transmission - Google Patents

Method of videophone data transmission Download PDF

Info

Publication number
US20060221174A1
US20060221174A1 US10/907,498 US90749805A US2006221174A1 US 20060221174 A1 US20060221174 A1 US 20060221174A1 US 90749805 A US90749805 A US 90749805A US 2006221174 A1 US2006221174 A1 US 2006221174A1
Authority
US
United States
Prior art keywords
videophone
user
data transmission
data
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/907,498
Other versions
US7116349B1 (en
Inventor
Chin-Tien Yang
Chung-Hsi Chia
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leadtek Research Inc
Original Assignee
Leadtek Research Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadtek Research Inc filed Critical Leadtek Research Inc
Priority to US10/907,498 priority Critical patent/US7116349B1/en
Assigned to LEADTEK RESEARCH INC. reassignment LEADTEK RESEARCH INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHIA, CHUNG-HSI, YANG, CHIN-TIEN
Application granted granted Critical
Publication of US7116349B1 publication Critical patent/US7116349B1/en
Publication of US20060221174A1 publication Critical patent/US20060221174A1/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals

Definitions

  • the present invention relates to a method of data transmission, and more particularly to a method of data transmission with a videophone as a terminal and operated with a smart key, which is suitable for transmission with confidential and/or value-added data.
  • a videophone uses H.322, SIP or other common communication protocols to provide a high quality audio-video (AV) data transmission and is currently a developed product.
  • a user with Ethernet and an IP address can utilize the videophone to communicate with another videophone user worldwide, face-to-face.
  • the videophone can be applied to all IP network structures including xDSL (x Digital Subscriber Lin), cable, LAN (Local Area Network) and VPN (Virtual Private Network).
  • xDSL x Digital Subscriber Lin
  • cable LAN (Local Area Network)
  • VPN Virtual Private Network
  • the primary objective of the present invention is to provide a method of data transmission, and particularly a method of videophone data transmission, which is based on the PKI (Public Key Infrastructure) and utilizes the identification codes in the smart key combined with the videophone(s) to perform the transmission of confidential and/or value-added data.
  • PKI Public Key Infrastructure
  • the smart key which employs the PKI, contains an ID code, a password and a private key.
  • the smart key passes the information (ID code, password and private key) to the videophone to login to obtain the related authorities of services and the user data like a phone book.
  • ID code ID code
  • password private key
  • two users have their own videophone, they can transmit data with encryption.
  • a sender can encrypt the AV data with a public key, and a receiver can decrypt the AV data with a private key. Also, user's personal data can be transmitted in this way without risk.
  • connection techniques Two types of connection techniques are used in the connection between a videophone and a smart key. They are wired and wireless.
  • a smart key can store a user-interface containing the phone book, the standby screen, the status icon and the ringing melody.
  • the smart key can store preloaded application programs to enjoy customized functions.
  • a wired-type smart key may be equipped with larger memory, and it is particularly suitable for storage of mass data mentioned above.
  • the present invention discloses a method of videophone data transmission, which is executed via a videophone and a user.
  • the method includes the steps of performing a connection procedure, performing a data download procedure and performing a disconnection procedure.
  • a smart key is used containing at least one type of user identification data (of the smart key holder), which is a user ID code, a password or at least one private key.
  • the step of performing the data download procedure includes further encrypting the user identification data, transmitting the user identification data to a service server, verifying the user, encrypting the service provided by the service server, downloading the service to the videophone, decrypting the service and executing the service in the videophone.
  • the first user sends a request to the second user. If the second user accepts the request, the first user encrypts a first AV data and sends the first encrypted AV data to the second videophone of the second user. Secondly, the second user decrypts the encrypted AV data with a private key stored in the second smart key. In the meantime, the second user can encrypt a second AV data and then send the second encrypted AV data to the first videophone of the first user. After receiving the second encrypted AV data, the first user can decrypt the second encrypted AV data.
  • FIG. 1 is a system diagram of performing the method of videophone data transmission of the present invention
  • FIG. 2 is a flowchart of the method of videophone data transmission of the present invention
  • FIG. 3 and 4 show the flowcharts of performing a connection procedure
  • FIG. 5 shows a flowchart of performing a data download procedure
  • FIG. 6 shows a flowchart of performing a local service procedure
  • FIGS. 7 and 8 show the flowcharts of performing a disconnection procedure
  • FIG. 9 shows the flowchart of encrypted communication of the present invention.
  • FIG. 1 is a system diagram of performing the method of videophone data transmission of the present invention.
  • the system includes a service server 31 , a key server 32 , a communication network 33 , a videophone 34 , another videophone 35 , a first smart key 36 and a second smart key 37 .
  • the service server 31 provides some services like movie-on-demand, conference service, IP phone, Quality of Service etc., to the users of videophones 34 , 35 .
  • the key server 32 provides public keys to the users on the network.
  • the communication network 33 may be any one of the IP network structures including xDSL (x Digital Subscriber Lin), cable, LAN (Local Area Network), VPN (Virtual Private Network), Internet, ISDN (Integrated Services Digital Network) and the general telephone line.
  • the first smart key 36 held by a first user is a memory device, which stores at least one piece of user identification data, which is an ID code, a password or a first private key of the first user.
  • the first smart key 36 also stores a plurality of application programs, a plurality of icons and a plurality of digital photos. After the first smart key 36 is connected to the videophone 34 , the application programs may be executed in the videophone 34 and the digital photos may be chosen as welcome screens.
  • Two types of connection techniques are used in the connection between a videophone and a smart key. They are wired and wireless.
  • the wired connection techniques include USB (Universal Serial Bus), FireWire (or IEEE 1394 interface), SD (Secure Digital) or CF (Compact Flash).
  • the wireless connection techniques include Wi-Fi (Wireless Fidelity), Bluetooth or IR (Infra-Red).
  • FIG. 1 the embodiment of the present invention, shows a wireless connection between the first smart key 36 and the videophone 34 , and a wired connection between the second smart key 37 and the videophone 35 .
  • FIG. 2 is a flowchart of the method of videophone data transmission of the present invention.
  • the first smart key 36 is connected to the videophone 34 to establish the connection.
  • a data download procedure is performed (S 20 ) to download at least one service provided by the service server 31 to the videophone 34 .
  • a disconnection procedure is performed (S 30 ) to disconnect the first smart key 36 from the videophone 34 .
  • FIG. 3 shows the detailed flowchart of performing the connection procedure (S 10 ) under cool plug and warm plug conditions.
  • the videophone 34 will determine connection types and connection conditions (S 101 ). There are three connection conditions, cool plug, warm plug and hot plug, which are explained hereinafter. If the videophone 34 is off, the first smart key 36 is connected to the videophone 34 only by wired connection (i.e., cool plug). After connection, the first user turns on the videophone 34 (S 102 ) to perform the system initialization (S 105 ) to reset the parameters of the videophone 34 .
  • the videophone 34 will be restarted (S 103 ) and then perform the system initialization (S 105 ) to reset the parameters of the videophone 34 .
  • detection of the first smart key (S 104 ) is performed to confirm a proper connection is established.
  • FIG. 4 shows the flowchart of performing the connection procedure (S 10 ) in the hot plug condition.
  • the videophone 34 is already on and in standby mode.
  • First determine if the videophone 34 is occupied by a smart key (S 106 ). If the videophone 34 is occupied, the videophone 34 will stay in standby mode. If the videophone 34 is not occupied, after the first smart key 36 is connected to the videophone 34 by either wired or wireless connection, detection of the smart key (S 104 ) is immediately performed to confirm a proper connection is established.
  • FIG. 5 shows the detailed flowchart of performing a data download procedure (S 20 ).
  • the user identification data in the first smart key 36 is encrypted with a public key of the service server 31 and the encrypted user identification data is transmitted to the service server 31 (S 201 ).
  • the public key of the service server 31 is retrieved from the key server 32 .
  • the service server 31 uses its own private key to verify the encrypted user identification data to confirm the first user (S 202 ).
  • the service server 31 retrieves a public key of the first user from the key server 32 to encrypt the at least one service provided by the service server 31 and then downloads the encrypted at least one service to the videophone 34 (S 203 ).
  • the videophone 34 uses the first user's private key to decrypt the at least one service.
  • the at least one service includes at least one UI (user-interface) of the first user, at least one piece of user's personal data of the first user and at least one application program of the first user.
  • the UI contains standby screens, icons and ringing melodies, etc.
  • the user's personal data includes a phone book, a call log and phone settings, etc.
  • the application programs include patches, AV codec and customer-made programs, etc.
  • the local service procedure is executed (S 205 ), which means the at least one service or at least one preloaded application program is executed in the videophone 34 .
  • the preloaded application programs are stored beforehand in the smart key 36 , but not provided by the service server 31 .
  • the at least one service may include on-line services like movie-on-demand, conference service, IP phone, Quality of Service, etc., or off-line services downloaded completely to and executed in the videophone 34 .
  • FIG. 6 shows the flowchart of executing a local service (S 205 ).
  • the videophone 34 will check if the at least one service contains the personal UI (S 205 a ). If the personal UI is contained, then the personal UI is loaded into the videophone 34 and updates a previous user's UI (S 205 b ). After that, the videophone 34 checks if the at least one service contains the user's personal data (S 205 c ). If the user's personal data is contained, the user's personal data is loaded into the videophone 34 and updates a previous user's personal data (S 205 d ). Then, the videophone 34 checks if the at least one service contains at least one application program (S 205 e ). If the application program is contained, then the application program is loaded and executed (S 205 f ).
  • FIG. 7 shows the flowchart of the disconnection procedure.
  • the procedure is described as follows. The first user is prompted to save the user's personal data (S 301 ). If the user's personal data is modified and changed, then the user's personal data is saved (S 302 ). After the data saving and before the smart key removing, a check of the connection type is performed (S 303 ). If the wireless connection is used, the videophone 34 turns to its regular operation state. If the wired connection is used, the videophone 34 indicates to remove the first smart key 36 (S 304 ). After that, the videophone 34 checks if the first smart key 36 is removed (S 305 ). If the first smart key 36 is removed, then the videophone 34 turns to its regular operation state.
  • FIG. 8 shows the flowchart of abnormal disconnection.
  • the videophone 34 prompts an alert (S 311 ) to inform the first user of possible data loss. Then the videophone 34 checks if the first smart key 36 is reconnected within a certain time (S 312 ). If the first smart key 36 is reconnected within a certain time, the videophone 34 turns to its regular operation state, or discards all changes (S 313 ) and turns to its regular operation state.
  • first user and a second user When a first user and a second user hold a first smart key 36 and a second smart key 37 respectively, they both can communicate AV data with encryption to each other by using public keys, and decrypt AV data with private keys.
  • the following describes the flowchart of encrypted communication by two users with individual smart keys and videophones.
  • the first user sends a request to the second user, and waits for the second user's reply (S 41 ). Then, the videophone 34 checks if the reply is accepted or rejected (S 42 ). If the reply is “accepted”, the first user encrypts a first AV data with the second user's public key, which is retrieved from a key server 32 and transmits the encrypted first AV data to the second user (S 43 ). After that, the second user decrypts the encrypted first AV data with the second user's private key, which is stored in the second smart key 37 (S 44 ).
  • the second user may encrypt a second AV data with the first user's public key, which is retrieved from a key server 32 and transmits the encrypted second AV data to the first user (S 45 ). Then, the first user decrypts the encrypted second AV data with the first user's private key, which is stored in the first smart key 36 (S 46 ), and after the communication is finished, both videophones 36 , 37 turn to their regular operation state. If the reply is “rejected”, a message of rejection is shown and the communication stays in a non-encrypted state, and after the communication is finished, both videophones 36 , 37 turns to their regular operation state.

Abstract

A method of videophone data transmission based on the PKI (Public Key Infrastructure) is executed with a videophone and a user. The method includes the steps of performing a connection procedure, performing a data download procedure and performing a disconnection procedure. While performing the connection procedure, a smart key, which stores at least one piece of user identification data, is connected to a videophone. The user identification data contains an ID code, a password and a private key of the user. While performing the data download procedure, the user identification data is encrypted and transmitted to a service server for verifying the user. Then, at least one service provided by the service server is encrypted and downloaded to the videophone. After decryption, the at least one service can be executed in the videophone. While performing a disconnection procedure, the smart key is disconnected from the videophone.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a method of data transmission, and more particularly to a method of data transmission with a videophone as a terminal and operated with a smart key, which is suitable for transmission with confidential and/or value-added data.
  • 2. Description of the Related Art
  • A videophone uses H.322, SIP or other common communication protocols to provide a high quality audio-video (AV) data transmission and is currently a developed product. A user with Ethernet and an IP address can utilize the videophone to communicate with another videophone user worldwide, face-to-face. The videophone can be applied to all IP network structures including xDSL (x Digital Subscriber Lin), cable, LAN (Local Area Network) and VPN (Virtual Private Network). Thirty real-time image frames per second can be communicated through the videophones connected to a wideband network, and therefore the applications of remote AV transmission like distance education, remote monitoring and videoconferences can be achieved by videophones. But if the verification of a user, the communication of confidential data or purchase of AV service is required, it is difficult for traditional videophones to meet these requirements.
  • SUMMARY OF THE INVENTION
  • The primary objective of the present invention is to provide a method of data transmission, and particularly a method of videophone data transmission, which is based on the PKI (Public Key Infrastructure) and utilizes the identification codes in the smart key combined with the videophone(s) to perform the transmission of confidential and/or value-added data.
  • The smart key, which employs the PKI, contains an ID code, a password and a private key. When connected to the videophone, the smart key passes the information (ID code, password and private key) to the videophone to login to obtain the related authorities of services and the user data like a phone book. When two users have their own videophone, they can transmit data with encryption. A sender can encrypt the AV data with a public key, and a receiver can decrypt the AV data with a private key. Also, user's personal data can be transmitted in this way without risk.
  • Two types of connection techniques are used in the connection between a videophone and a smart key. They are wired and wireless. A smart key can store a user-interface containing the phone book, the standby screen, the status icon and the ringing melody. In addition, the smart key can store preloaded application programs to enjoy customized functions. In general, a wired-type smart key may be equipped with larger memory, and it is particularly suitable for storage of mass data mentioned above.
  • In order to achieve its objective, the present invention discloses a method of videophone data transmission, which is executed via a videophone and a user. The method includes the steps of performing a connection procedure, performing a data download procedure and performing a disconnection procedure. At the step of performing the connection procedure, a smart key is used containing at least one type of user identification data (of the smart key holder), which is a user ID code, a password or at least one private key. The step of performing the data download procedure includes further encrypting the user identification data, transmitting the user identification data to a service server, verifying the user, encrypting the service provided by the service server, downloading the service to the videophone, decrypting the service and executing the service in the videophone.
  • In addition to accessing the service directly from the service server mentioned above, if two users have their own videophone and smart key (for example, a first user with a first smart key and a first videophone, and a second user with a second smart key and a second videophone), they can transmit the AV data with encryption between them. To establish this kind of communication, a method of videophone data transmission is disclosed as follows.
  • First, the first user sends a request to the second user. If the second user accepts the request, the first user encrypts a first AV data and sends the first encrypted AV data to the second videophone of the second user. Secondly, the second user decrypts the encrypted AV data with a private key stored in the second smart key. In the meantime, the second user can encrypt a second AV data and then send the second encrypted AV data to the first videophone of the first user. After receiving the second encrypted AV data, the first user can decrypt the second encrypted AV data.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention will be described according to the appended drawings in which:
  • FIG. 1 is a system diagram of performing the method of videophone data transmission of the present invention;
  • FIG. 2 is a flowchart of the method of videophone data transmission of the present invention;
  • FIG. 3 and 4 show the flowcharts of performing a connection procedure;
  • FIG. 5 shows a flowchart of performing a data download procedure;
  • FIG. 6 shows a flowchart of performing a local service procedure;
  • FIGS. 7 and 8 show the flowcharts of performing a disconnection procedure; and
  • FIG. 9 shows the flowchart of encrypted communication of the present invention.
  • PREFERRED EMBODIMENT OF THE PRESENT INVENTION
  • FIG. 1 is a system diagram of performing the method of videophone data transmission of the present invention. The system includes a service server 31, a key server 32, a communication network 33, a videophone 34, another videophone 35, a first smart key 36 and a second smart key 37. The service server 31 provides some services like movie-on-demand, conference service, IP phone, Quality of Service etc., to the users of videophones 34, 35. The key server 32 provides public keys to the users on the network. The communication network 33 may be any one of the IP network structures including xDSL (x Digital Subscriber Lin), cable, LAN (Local Area Network), VPN (Virtual Private Network), Internet, ISDN (Integrated Services Digital Network) and the general telephone line. The first smart key 36 held by a first user is a memory device, which stores at least one piece of user identification data, which is an ID code, a password or a first private key of the first user. The first smart key 36 also stores a plurality of application programs, a plurality of icons and a plurality of digital photos. After the first smart key 36 is connected to the videophone 34, the application programs may be executed in the videophone 34 and the digital photos may be chosen as welcome screens. Two types of connection techniques are used in the connection between a videophone and a smart key. They are wired and wireless. The wired connection techniques include USB (Universal Serial Bus), FireWire (or IEEE 1394 interface), SD (Secure Digital) or CF (Compact Flash). The wireless connection techniques include Wi-Fi (Wireless Fidelity), Bluetooth or IR (Infra-Red). FIG. 1, the embodiment of the present invention, shows a wireless connection between the first smart key 36 and the videophone 34, and a wired connection between the second smart key 37 and the videophone 35.
  • FIG. 2 is a flowchart of the method of videophone data transmission of the present invention. First, the first smart key 36 is connected to the videophone 34 to establish the connection. Secondly, a data download procedure is performed (S20) to download at least one service provided by the service server 31 to the videophone 34. Finally, a disconnection procedure is performed (S30) to disconnect the first smart key 36 from the videophone 34.
  • FIG. 3 shows the detailed flowchart of performing the connection procedure (S10) under cool plug and warm plug conditions. When the first user holds the first smart key 36 to connect to the videophone 34, the videophone 34 will determine connection types and connection conditions (S101). There are three connection conditions, cool plug, warm plug and hot plug, which are explained hereinafter. If the videophone 34 is off, the first smart key 36 is connected to the videophone 34 only by wired connection (i.e., cool plug). After connection, the first user turns on the videophone 34 (S102) to perform the system initialization (S105) to reset the parameters of the videophone 34. If the videophone 34 is already on (i.e., regular operation state) and is required to restart (when the IP address changed, for example) and the first smart key 36 is already connected to the videophone 34 (i.e. warm plug), the videophone 34 will be restarted (S103) and then perform the system initialization (S105) to reset the parameters of the videophone 34. After system initialization, detection of the first smart key (S104) is performed to confirm a proper connection is established.
  • FIG. 4 shows the flowchart of performing the connection procedure (S10) in the hot plug condition. In this condition, the videophone 34 is already on and in standby mode. First, determine if the videophone 34 is occupied by a smart key (S106). If the videophone 34 is occupied, the videophone 34 will stay in standby mode. If the videophone 34 is not occupied, after the first smart key 36 is connected to the videophone 34 by either wired or wireless connection, detection of the smart key (S104) is immediately performed to confirm a proper connection is established.
  • FIG. 5 shows the detailed flowchart of performing a data download procedure (S20). After the connection between the first smart key 36 and the videophone 34, the user identification data in the first smart key 36 is encrypted with a public key of the service server 31 and the encrypted user identification data is transmitted to the service server 31 (S201). The public key of the service server 31 is retrieved from the key server 32. Then, the service server 31 uses its own private key to verify the encrypted user identification data to confirm the first user (S202). After that, the service server 31 retrieves a public key of the first user from the key server 32 to encrypt the at least one service provided by the service server 31 and then downloads the encrypted at least one service to the videophone 34 (S203). Then, the videophone 34 uses the first user's private key to decrypt the at least one service. The at least one service includes at least one UI (user-interface) of the first user, at least one piece of user's personal data of the first user and at least one application program of the first user. The UI contains standby screens, icons and ringing melodies, etc. The user's personal data includes a phone book, a call log and phone settings, etc. The application programs include patches, AV codec and customer-made programs, etc. Finally, the local service procedure is executed (S205), which means the at least one service or at least one preloaded application program is executed in the videophone 34. The preloaded application programs are stored beforehand in the smart key 36, but not provided by the service server 31. Additionally, the at least one service may include on-line services like movie-on-demand, conference service, IP phone, Quality of Service, etc., or off-line services downloaded completely to and executed in the videophone 34.
  • FIG. 6 shows the flowchart of executing a local service (S205). After the at least one service is downloaded to the videophone 34, the videophone 34 will check if the at least one service contains the personal UI (S205 a). If the personal UI is contained, then the personal UI is loaded into the videophone 34 and updates a previous user's UI (S205 b). After that, the videophone 34 checks if the at least one service contains the user's personal data (S205 c). If the user's personal data is contained, the user's personal data is loaded into the videophone 34 and updates a previous user's personal data (S205 d). Then, the videophone 34 checks if the at least one service contains at least one application program (S205 e). If the application program is contained, then the application program is loaded and executed (S205 f).
  • When the first user wants to disconnect the first smart key 36 from the videophone 34, a disconnection procedure is performed (S30). FIG. 7 shows the flowchart of the disconnection procedure. The procedure is described as follows. The first user is prompted to save the user's personal data (S301). If the user's personal data is modified and changed, then the user's personal data is saved (S302). After the data saving and before the smart key removing, a check of the connection type is performed (S303). If the wireless connection is used, the videophone 34 turns to its regular operation state. If the wired connection is used, the videophone 34 indicates to remove the first smart key 36 (S304). After that, the videophone 34 checks if the first smart key 36 is removed (S305). If the first smart key 36 is removed, then the videophone 34 turns to its regular operation state.
  • FIG. 8 shows the flowchart of abnormal disconnection. When the first smart key, which is wired type, is removed without following the flowchart in FIG. 7, the videophone 34 prompts an alert (S311) to inform the first user of possible data loss. Then the videophone 34 checks if the first smart key 36 is reconnected within a certain time (S312). If the first smart key 36 is reconnected within a certain time, the videophone 34 turns to its regular operation state, or discards all changes (S313) and turns to its regular operation state.
  • When a first user and a second user hold a first smart key 36 and a second smart key 37 respectively, they both can communicate AV data with encryption to each other by using public keys, and decrypt AV data with private keys. The following describes the flowchart of encrypted communication by two users with individual smart keys and videophones.
  • Referring to FIG. 9, when the connections of smart keys and videophones are established, the first user sends a request to the second user, and waits for the second user's reply (S41). Then, the videophone 34 checks if the reply is accepted or rejected (S42). If the reply is “accepted”, the first user encrypts a first AV data with the second user's public key, which is retrieved from a key server 32 and transmits the encrypted first AV data to the second user (S43). After that, the second user decrypts the encrypted first AV data with the second user's private key, which is stored in the second smart key 37 (S44). In the meantime, the second user may encrypt a second AV data with the first user's public key, which is retrieved from a key server 32 and transmits the encrypted second AV data to the first user (S45). Then, the first user decrypts the encrypted second AV data with the first user's private key, which is stored in the first smart key 36 (S46), and after the communication is finished, both videophones 36, 37 turn to their regular operation state. If the reply is “rejected”, a message of rejection is shown and the communication stays in a non-encrypted state, and after the communication is finished, both videophones 36, 37 turns to their regular operation state.
  • The above-described embodiments of the present invention are intended to be illustrative only. Numerous alternative embodiments may be devised by persons skilled in the art without departing from the scope of the following claims.

Claims (20)

1. A method of videophone data transmission, which is executed with a videophone and by a user, the method comprising:
performing a connection procedure in that a smart key storing at least one user identification data of the user is connected to the videophone, wherein the user identification data at least includes one private key;
performing a data download procedure, comprising:
encrypting the at least one user identification data with a public key relevant to a service server in a key server;
transmitting the at least one user identification data to the service server;
verifying the user;
encrypting at least one service provided by the service server;
downloading the at least one service to the videophone;
decrypting the at least one service;
executing the at least one service in the videophone; and
performing a disconnection procedure in that the smart key is disconnected from the videophone.
2. The method of videophone data transmission of claim 1, which is performed on the Public Key Infrastructure.
3. The method of videophone data transmission of claim 1, wherein the user identification data further includes an identification (ID) code or a password.
4. The method of videophone data transmission of claim 1, wherein the smart key is connected to the videophone through a wired connection, and the wired connection is selected from one of USB, FireWire, Secure Digital or Compact Flash.
5. The method of videophone data transmission of claim 1, wherein the smart key is connected to the videophone through a wireless connection, and the wireless connection is selected from one of Wi-Fi, Bluetooth or Infrared.
6. The method of videophone data transmission of claim 1, wherein when the videophone is off, the connection procedure includes the steps of:
connecting the smart key to the videophone through a wired connection;
turning on the videophone; and
performing a system initialization to reset the parameters of the videophone.
7. The method of videophone data transmission of claim 1, wherein when the videophone is on, the connection procedure includes the steps of:
connecting the smart key to the videophone;
restarting the videophone; and
performing a system initialization to reset the parameters of the videophone.
8. The method of videophone data transmission of claim 1, wherein the connection procedure includes the step of determining whether the smart key is connected to the videophone through wired or wireless connection.
9-10. (canceled)
11. The method of videophone data transmission of claim 1, wherein the user is verified by which the service server verifies the at least one user identification data with a private key of the service server.
12. The method of videophone data transmission of claim 1, wherein the at least one service is encrypted with a public key of the user, and the public key is stored in the key server.
13. The method of videophone data transmission of claim 1, wherein the at least one service is encrypted with the private key.
14. The method of videophone data transmission of claim 1, wherein the data download procedure further includes the step of executing at least one preloaded application program in the videophone, and the at least one preloaded application program is stored in the smart key.
15. The method of videophone data transmission of claim 1, wherein the at least one service includes at least one user-interface (UI) of the user, at least one personal data of the user or at least one application program of the user.
16. The method of videophone data transmission of claim 15, wherein the user-interface and the personal data are refreshed.
17. The method of videophone data transmission of claim 15, wherein the use-interface is a standby screen, an icon or a ring melody.
18. The method of videophone data transmission of claim 15, wherein the personal data is a phone book, a call log or a phone setting.
19. The method of videophone data transmission of claim 15, wherein the application program is a patch, an audio-video (AV) codec or customer-made programs.
20. The method of videophone data transission of claim 15, further including the step of determining if the user logouts normally before performing the disconnection procedure.
21-24. (canceled)
US10/907,498 2005-04-04 2005-04-04 Method of videophone data transmission Expired - Fee Related US7116349B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/907,498 US7116349B1 (en) 2005-04-04 2005-04-04 Method of videophone data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/907,498 US7116349B1 (en) 2005-04-04 2005-04-04 Method of videophone data transmission

Publications (2)

Publication Number Publication Date
US7116349B1 US7116349B1 (en) 2006-10-03
US20060221174A1 true US20060221174A1 (en) 2006-10-05

Family

ID=37037305

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/907,498 Expired - Fee Related US7116349B1 (en) 2005-04-04 2005-04-04 Method of videophone data transmission

Country Status (1)

Country Link
US (1) US7116349B1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090136016A1 (en) * 2007-11-08 2009-05-28 Meelik Gornoi Transferring a communication event
US20130169736A1 (en) * 2011-12-30 2013-07-04 Microsoft Corporation Making Calls Using an Additional Terminal
US8885601B2 (en) 2010-03-31 2014-11-11 Skype Switching user devices in a packet-based network
US8963982B2 (en) 2010-12-31 2015-02-24 Skype Communication system and method
US9258511B2 (en) 2010-03-31 2016-02-09 Skype Indicia of contact viewing activity
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
US9717090B2 (en) 2010-12-31 2017-07-25 Microsoft Technology Licensing, Llc Providing notifications of call-related services
CN107360181A (en) * 2017-08-02 2017-11-17 成都蓝码科技发展有限公司 A kind of data encryption system and method based on id password
US10129191B2 (en) 2007-06-28 2018-11-13 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10291660B2 (en) 2010-12-31 2019-05-14 Skype Communication system and method
US10326721B2 (en) 2007-06-28 2019-06-18 Voxer Ip Llc Real-time messaging method and apparatus
US10375139B2 (en) * 2007-06-28 2019-08-06 Voxer Ip Llc Method for downloading and using a communication application through a web browser
US10404762B2 (en) 2010-12-31 2019-09-03 Skype Communication system and method
US11095583B2 (en) 2007-06-28 2021-08-17 Voxer Ip Llc Real-time messaging method and apparatus

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006089160A2 (en) * 2005-02-16 2006-08-24 Videonline, Inc. Videonline security network architecture and methods therefor
US7701930B2 (en) * 2005-10-25 2010-04-20 Ittiam Systems (P) Ltd. Technique for providing virtual N-way video conferencing to IP videophones
TW200840293A (en) * 2007-03-30 2008-10-01 Ipevo Corp Method of transmitting an immage
CN108199844B (en) * 2018-04-09 2022-05-13 北京无字天书科技有限公司 Method for supporting off-line SM9 algorithm key first application downloading

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6230269B1 (en) * 1998-03-04 2001-05-08 Microsoft Corporation Distributed authentication system and method
US6549229B1 (en) * 1999-07-26 2003-04-15 C-Cubed Corporation Small, portable, self-contained, video teleconferencing system
US20030161473A1 (en) * 2000-06-16 2003-08-28 Fransdonk Robert W. Method and system to securely distribute content via a network
US6625734B1 (en) * 1999-04-26 2003-09-23 Disappearing, Inc. Controlling and tracking access to disseminated information
US20040088560A1 (en) * 2000-04-20 2004-05-06 Danks David Hilton Secure system access
US20040114747A1 (en) * 2002-12-12 2004-06-17 Trandal David S. Systems and methods for call processing
US20040170259A1 (en) * 2003-02-28 2004-09-02 Park Jae Hun Internet video phone
US20040179684A1 (en) * 2003-03-14 2004-09-16 Identicrypt, Inc. Identity-based-encryption messaging system
US20040204028A1 (en) * 2002-12-30 2004-10-14 Michael Kotzin Wireless radio architectures and methods therefor
US20050113137A1 (en) * 2003-11-20 2005-05-26 International Business Machines Corporation Wireless rechargeable money card

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001245426A1 (en) 2000-03-03 2001-09-17 Lawrence R. Jones Picture communications system and associated network services
AU2001270959A1 (en) 2000-07-06 2002-01-21 Verifox Technologies Ltd. Automatic authentication system that cross-verifies digital identities
GB2374497B (en) 2001-04-03 2003-03-12 Ericsson Telefon Ab L M Facilitating legal interception of IP connections
JP2004080296A (en) 2002-08-15 2004-03-11 Sony Corp Information processing apparatus and method, information processing system, recording medium, as well as program

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6230269B1 (en) * 1998-03-04 2001-05-08 Microsoft Corporation Distributed authentication system and method
US6625734B1 (en) * 1999-04-26 2003-09-23 Disappearing, Inc. Controlling and tracking access to disseminated information
US6549229B1 (en) * 1999-07-26 2003-04-15 C-Cubed Corporation Small, portable, self-contained, video teleconferencing system
US20040088560A1 (en) * 2000-04-20 2004-05-06 Danks David Hilton Secure system access
US20030161473A1 (en) * 2000-06-16 2003-08-28 Fransdonk Robert W. Method and system to securely distribute content via a network
US20040114747A1 (en) * 2002-12-12 2004-06-17 Trandal David S. Systems and methods for call processing
US20040204028A1 (en) * 2002-12-30 2004-10-14 Michael Kotzin Wireless radio architectures and methods therefor
US20040170259A1 (en) * 2003-02-28 2004-09-02 Park Jae Hun Internet video phone
US20040179684A1 (en) * 2003-03-14 2004-09-16 Identicrypt, Inc. Identity-based-encryption messaging system
US20050113137A1 (en) * 2003-11-20 2005-05-26 International Business Machines Corporation Wireless rechargeable money card

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11146516B2 (en) 2007-06-28 2021-10-12 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10841261B2 (en) 2007-06-28 2020-11-17 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10158591B2 (en) * 2007-06-28 2018-12-18 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US11777883B2 (en) 2007-06-28 2023-10-03 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US11658927B2 (en) 2007-06-28 2023-05-23 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US11658929B2 (en) 2007-06-28 2023-05-23 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US20230051915A1 (en) 2007-06-28 2023-02-16 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US11095583B2 (en) 2007-06-28 2021-08-17 Voxer Ip Llc Real-time messaging method and apparatus
US10326721B2 (en) 2007-06-28 2019-06-18 Voxer Ip Llc Real-time messaging method and apparatus
US10375139B2 (en) * 2007-06-28 2019-08-06 Voxer Ip Llc Method for downloading and using a communication application through a web browser
US10129191B2 (en) 2007-06-28 2018-11-13 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10142270B2 (en) 2007-06-28 2018-11-27 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US11943186B2 (en) 2007-06-28 2024-03-26 Voxer Ip Llc Real-time messaging method and apparatus
US11700219B2 (en) 2007-06-28 2023-07-11 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10511557B2 (en) 2007-06-28 2019-12-17 Voxer Ip Llc Telecommunication and multimedia management method and apparatus
US10356023B2 (en) 2007-06-28 2019-07-16 Voxer Ip Llc Real-time messaging method and apparatus
US20090136016A1 (en) * 2007-11-08 2009-05-28 Meelik Gornoi Transferring a communication event
US9258511B2 (en) 2010-03-31 2016-02-09 Skype Indicia of contact viewing activity
US8885601B2 (en) 2010-03-31 2014-11-11 Skype Switching user devices in a packet-based network
US10404762B2 (en) 2010-12-31 2019-09-03 Skype Communication system and method
US9717090B2 (en) 2010-12-31 2017-07-25 Microsoft Technology Licensing, Llc Providing notifications of call-related services
US9521360B2 (en) 2010-12-31 2016-12-13 Skype Communication system and method
US10291660B2 (en) 2010-12-31 2019-05-14 Skype Communication system and method
US8963982B2 (en) 2010-12-31 2015-02-24 Skype Communication system and method
US20130169736A1 (en) * 2011-12-30 2013-07-04 Microsoft Corporation Making Calls Using an Additional Terminal
US9019336B2 (en) * 2011-12-30 2015-04-28 Skype Making calls using an additional terminal
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN107360181A (en) * 2017-08-02 2017-11-17 成都蓝码科技发展有限公司 A kind of data encryption system and method based on id password

Also Published As

Publication number Publication date
US7116349B1 (en) 2006-10-03

Similar Documents

Publication Publication Date Title
US7116349B1 (en) Method of videophone data transmission
US7729331B2 (en) Home terminal apparatus and communication system
US8214649B2 (en) System and method for secure communications between at least one user device and a network entity
KR101160603B1 (en) Device and process for wireless local area network association, modem and computer readable recording medium
EP2405622B1 (en) Device communication
US20040168081A1 (en) Apparatus and method simplifying an encrypted network
CN102014122B (en) IP Camera service system of point-to-point protocol based on two-way safety authentication
US20160191969A1 (en) System and method for delegated authentication and authorization
US20060155984A1 (en) Apparatus, method and computer software products for controlling a home terminal
JP2006025420A (en) Device, process, and corresponding product for association of wireless local area network
US20060126846A1 (en) Device authentication system
JPH08340331A (en) Method and apparatus for certificating access of user terminal to network
CN102739643A (en) Permitting access to a network
CN102739642A (en) Permitting access to a network
TWI499257B (en) A method of establishing a cryptographic key, a network head end and a receiver for use in that method, and a method of transmitting signals
JP2007503637A (en) Method, system, authentication server, and gateway for providing credentials
EP2822285B1 (en) Pairing devices through distinct networks
JPWO2011111842A1 (en) Secret communication method using VPN, system thereof, program thereof, and recording medium of program
US20080137553A1 (en) Method of automatic certification and secure configuration of a wlan system and transmission device thereof
CN105471896A (en) Agent method, device and system based on SSL (Secure Sockets Layer)
EP1715690A1 (en) Method of videophone data transmission
JP3412477B2 (en) Server and recording medium recording the program
CN114221822B (en) Distribution network method, gateway device and computer readable storage medium
EP1400090B1 (en) Method and device for securing communications in a computer network
JP2008227626A (en) Communication system and communication method of network camera

Legal Events

Date Code Title Description
AS Assignment

Owner name: LEADTEK RESEARCH INC., TAIWAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YANG, CHIN-TIEN;CHIA, CHUNG-HSI;REEL/FRAME:015854/0790

Effective date: 20050310

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20141003