COMMUNICATIONS SOFTWARE USED ESTABLISH

Brand Owner (click to sort) Address Description
PATHSCAPE Infospeed Communications, Inc. 104 Wilmot Rd., Suite 150 Deerfield IL 60015 COMMUNICATIONS SOFTWARE USED TO ESTABLISH AND FACILITATE CONNECTIONS BETWEEN WIRELESS, WEB-ENABLED DEVICES, NAMELY CELLULAR TELEPHONES AND HANDHELD COMPUTERS AND THE INTERNET;PATH SCAPE;
SEND2 GO2 SYSTEMS, INC. 18400 Von Karman Ave. Suite 900 Irvine CA 92612 COMMUNICATIONS SOFTWARE USED TO ESTABLISH AND MANAGE CONNECTIONS BETWEEN A COMPUTER OR WIRELESS DEVICE AND A GLOBAL COMPUTER NETWORK, AND USED TO ACCESS, VIEW AND TRANSMIT INFORMATION, MESSAGES AND DATA VIA A GLOBAL COMPUTER NETWORK OR A WIRELESS TELECOMMUNICATIONS DEVICE; AND COMMUNICATIONS SOFTWARE USED TO ENCODE AND DECODE MESSAGES AND DATA TO PROVIDE SECURE COMMUNICATIONS OVER A GLOBAL COMPUTER NETWORK AND WIRELESS TELECOMMUNICATIONS DEVICE;DATA AND VOICE TELECOMMUNICATION SERVICES, NAMELY, PROVIDING PERSONAL COMMUNICATION SERVICES AND ELECTRONIC TRANSMISSION OF DATA AND DOCUMENTS VIA A GLOBAL COMPUTER NETWORK AND WIRELESS COMMUNICATIONS DEVICES; SECURE TRANSMISSION OF MESSAGES AND DATA VIA A GLOBAL NETWORK AND WIRELESS COMMUNICATIONS DEVICES;SEND 2;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed are methods that enable communications to be established regardless of the presence of communications blockers, e.g., firewalls and NATs, in the path between two computing devices. Two devices each establish communications with a rendezvous service. Through the service, the devices signal each other to set up direct, peer-to-peer communications between themselves. If the devices fail to establish direct communications, then they invoke a relay service that provides the illusion of direct communications. In another aspect, an originating device attempts to establish communications with a recipient, using an address and port number associated with the recipient. If that attempts fails, possibly because a firewall is blocking communications, then the originating device retries using a port normally held open by firewalls. If this attempt also fails, then the originating device invokes the services of a proxy to negotiate a port acceptable for use by the recipient and by any intervening firewalls.