摘要 |
<p>#CMT# #/CMT# The method involves detecting the number of primary ports (PP1, PP2) utilized for establishing a primary bridge (PP12) between primary public addresses of two computer systems (1, 2). A number of secondary ports (PS1, PS2) to be opened for each computer system is calculated from the primary ports. The secondary ports are opened, and secondary public addresses are created. A secondary bridge (PS12) is established for providing a peer to peer communication parallel to a peer to peer communication established earlier between the computer systems. #CMT# : #/CMT# An independent claim is also included for a system for providing peer to peer communication between computer systems parallel to peer to peer communication previously established between computer systems #CMT#USE : #/CMT# Used for providing a peer to peer communication, between two computer systems e.g. personal computer or personal digital assistant (PDA), parallel to a peer to peer communication previously established the systems using standard protocols e.g. transmission control protocol (TCP), hypertext transfer protocol (http), hypertext transfer protocol secured (https), file transfer protocol (FTP), TELNET protocol, user datagram protocol (UDP) (claimed), where the communication permits sharing of data and applications between users of an authentication server via a communication network e.g. Internet. #CMT#ADVANTAGE : #/CMT# The secondary bridge is established for providing the peer to peer communication parallel to the peer to peer communication established earlier between the computer systems, thus permitting sharing of data between the users via independent applications of the peer to peer communication, and ensuring the exchange of data without any limitation. #CMT#DESCRIPTION OF DRAWINGS : #/CMT# The drawing shows a peer to peer communication providing system. PP1, PP2 : Primary ports PP12 : Primary bridge PS1, PS2 : Secondary ports PS12 : Secondary bridge 1,2 : Computer systems.</p> |