Secure telecommunications
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
detect, on a first device, a re-keying event during a secure telecommunication;
in response to detecting the re-keying event, generate, by the first device, a second meeting key from ephemeral environmental noise from a kernel operation executing on the first device;
generate, by the first device, a second encryption key;
encrypt, by the first device, the second meeting key with the second encryption key; and
transmit, from the first device, the encrypted second meeting key to a subset of a plurality of participants of the secure telecommunication; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.
100 Citations
15 Claims
-
1. A system, comprising:
-
a processor configured to; detect, on a first device, a re-keying event during a secure telecommunication; in response to detecting the re-keying event, generate, by the first device, a second meeting key from ephemeral environmental noise from a kernel operation executing on the first device; generate, by the first device, a second encryption key; encrypt, by the first device, the second meeting key with the second encryption key; and transmit, from the first device, the encrypted second meeting key to a subset of a plurality of participants of the secure telecommunication; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
detecting, on a first device, a re-keying event during a secure telecommunication; in response to detecting the re-keying event, generating, by the first device, a second meeting key from ephemeral environmental noise from a kernel operation executing on the first device; generating, by the first device, a second encryption key; encrypting, by the first device, the second meeting key with the second encryption key; and transmitting, from the first device, the encrypted second meeting key to a subset of a plurality of participants of the secure telecommunication. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising instructions that, when executed by at least one processor, perform the steps of:
-
detecting a re-keying event during a secure telecommunication; in response to detecting the re-keying event, generating a second meeting key from ephemeral environmental noise from a kernel operation executing on a first device; generating a second encryption key; encrypting the second meeting key with the second encryption key; and transmitting the encrypted second meeting key to a subset of a plurality of participants of the secure telecommunication. - View Dependent Claims (12, 13, 14, 15)
-
Specification