×

Methods and systems for communication-session arrangement on behalf of cryptographic endpoints

  • US 10,356,059 B2
  • Filed: 06/04/2015
  • Issued: 07/16/2019
  • Est. Priority Date: 06/04/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a communication device from an accessory, a request to establish an audio-based encrypted media session between the accessory and a remote device wherein,(i) the accessory to the communication device is a first cryptographic endpoint of the requested audio-based encrypted media session, and(ii) the remote device is a second cryptographic endpoint of the requested audio-based encrypted media session,wherein the communication device is communicatively connected to a remote device as a second cryptographic endpoint of the requested audio-based encrypted audio-based media session, wherein the communication device is communicatively connected to,(i) the accessory via a Personal Area Network (PAN) communication link, and(ii) the remote device via a communication link separate from the PAN communication link;

    in response to receiving the request, the communication device exchanging control data with the remote device on behalf of the accessory to establish the requested encrypted media session between the accessory and the remote device;

    during the established encrypted audio based media session, the communication device relaying,(i) inbound encrypted-media-session payload data from the remote device to the accessory, the inbound encrypted-media-session payload data being encrypted such that decryption of the inbound encrypted-media-session payload data requires a first payload-data cryptographic key that is accessible to the accessory and that is not accessible to the communication device, and(ii) outbound encrypted-media-session payload data from the accessory to the remote device, the outbound encrypted-media-session payload data being encrypted such that decryption of the outbound encrypted-media-session payload data requires a second payload-data cryptographic key that is accessible to the remote device and that is not accessible to the communication device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×