Local security key generation
First Claim
1. A method comprising:
- obtaining, by a calling device, calling security parameters;
sending, by the calling device and to a called device, a first message that includes the calling security parameters, wherein the first message includes a session initiation protocol (SIP) message that has been modified using session description protocol (SDP) to include the calling security parameters;
receiving, at the calling device and from the called device, a second message that includes called security parameters, wherein the second message includes a SIP message that has been modified using SDP to include the called security parameters;
deriving, by the calling device, a security key using the calling security parameters and the called security parameters;
receiving, at the calling device and from the called device, an acknowledgement message in response to the first message; and
using, by the calling device, the derived security key to encrypt and decrypt communications between the calling device and the called device.
1 Assignment
0 Petitions
Accused Products
Abstract
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.
40 Citations
20 Claims
-
1. A method comprising:
-
obtaining, by a calling device, calling security parameters; sending, by the calling device and to a called device, a first message that includes the calling security parameters, wherein the first message includes a session initiation protocol (SIP) message that has been modified using session description protocol (SDP) to include the calling security parameters; receiving, at the calling device and from the called device, a second message that includes called security parameters, wherein the second message includes a SIP message that has been modified using SDP to include the called security parameters; deriving, by the calling device, a security key using the calling security parameters and the called security parameters; receiving, at the calling device and from the called device, an acknowledgement message in response to the first message; and using, by the calling device, the derived security key to encrypt and decrypt communications between the calling device and the called device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by a processor, cause the processor to; receive, from a calling device, a first message that includes calling security parameters, wherein the first message includes a session initiation protocol (SIP) message that has been modified using session description protocol (SDP) to include the calling security parameters; obtain called security parameters; send, to the calling device, a second message that includes the called security parameters, wherein the second message includes a SIP message that has been modified using SDP to include the called security parameters; derive a security key using the calling security parameters and the called security parameters; send, to the calling device, an acknowledgement message in response to the first message; and use the derived security key to encrypt and decrypt communications between the calling device and the called device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A device comprising:
one or more processors configured to; obtain calling security parameters; send, to a called device, a first message that includes the calling security parameters, wherein the first message includes a session initiation protocol (SIP) message that has been modified using session description protocol (SDP) to include the calling security parameters; receive, from the called device, a second message that includes called security parameters, wherein the second message includes a SIP message that has been modified using SDP to include the called security parameters; derive a security key using the calling security parameters and the called security parameters; receive, from the called device, an acknowledgement message in response to the first message; and use the derived security key to encrypt and decrypt communications between the calling device and the called device. - View Dependent Claims (16, 17, 18, 19, 20)
Specification