Secure telecommunications
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive, at a first device via a control channel, a secure telecommunication request from a second device, wherein the secure telecommunication request includes at least one of a first meeting identifier and a first meeting key;
transmit, from the first device, the meeting identifier to a communication server, via a communication channel that is separate from the control channel, to obtain encrypted communication data;
receive, at the first device, encrypted communication data from the communication server;
decrypt, by the first device, the encrypted communication data using the first meeting key;
provide the decrypted communication data to a user of the first device; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.
-
Citations
18 Claims
-
1. A system, comprising:
-
a processor configured to; receive, at a first device via a control channel, a secure telecommunication request from a second device, wherein the secure telecommunication request includes at least one of a first meeting identifier and a first meeting key; transmit, from the first device, the meeting identifier to a communication server, via a communication channel that is separate from the control channel, to obtain encrypted communication data; receive, at the first device, encrypted communication data from the communication server; decrypt, by the first device, the encrypted communication data using the first meeting key; provide the decrypted communication data to a user of the first device; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a first device via a control channel, a secure telecommunication request from a second device, wherein the secure telecommunication request includes at least one of a first meeting identifier and a first meeting key; transmitting, from the first device, the meeting identifier to a communication server, via a communication channel that is separate from the control channel, to obtain encrypted communication data; receiving, at the first device, encrypted communication data from the communication server; decrypting, by the first device, the encrypted communication data using the first meeting key; providing the decrypted communication data to a user of the first device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions that, when executed by at least one processor, perform the steps of:
-
receiving, via a control channel, a secure telecommunication request, wherein the secure telecommunication request includes at least one of a first meeting identifier and a first meeting key; transmitting the meeting identifier to a communication server, via a communication-channel that is separate from the control channel, to obtain encrypted communication data; receiving encrypted communication data from the communication server; decrypting the encrypted communication data using the first meeting key; providing the decrypted communication data to a user. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification