|
|
|
|
||
Re: Reality check on the '687 hearing// iDonI thru together a little illustrative that shows Beser. Also posting here the primary claims being challenged...keeping in mind Beser has to overcome ALL of these, not just one. I hope this comforts some people. 1. A method of connecting a first network device and a second network device, the method comprising: • intercepting, from the first network device, a request to look up an internet protocol (IP) address of the second network device based on a domain name associated with the second network device; • determining, in response to the request, whether the second network device is available for a secure communications service; and • initiating a secure communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service; • wherein the secure communications service uses the secure communication link to communicate at least one of video data and audio data between the first network device and the second network device This is Beser and how it works: |
return to message board, top of board |