End-to-end encryption during a secure communication session
First Claim
1. A method for end-to-end encryption during a secure communication session, the method comprising:
- receiving, at a first device, an invitation to a secure communication session;
performing, by the first device, a three-way handshake with at least one second device to establish a first encryption key and a second encryption key for the secure communication session, wherein the first encryption key is configured to encrypt communication data transmitted by the first device and the second encryption key is configured to decrypt communication data received from the at least one second device; and
encrypting, by the first device, first communication data using the first encryption key; and
transmitting, from the first device, the encrypted first communication data to the at least one second device.
2 Assignments
0 Petitions
Accused Products
Abstract
The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device receives an invitation to a secure communication session. The invitation includes a token, which the first device transmits to the call initiating device. Next, the first device performs a three-way handshake with the call initiating device to negotiate a first encryption key and a second encryption key for the secure communication session. The first device encrypts first communication data using the first encryption key and transmits the encrypted first communication data to the call initiating device.
-
Citations
19 Claims
-
1. A method for end-to-end encryption during a secure communication session, the method comprising:
-
receiving, at a first device, an invitation to a secure communication session; performing, by the first device, a three-way handshake with at least one second device to establish a first encryption key and a second encryption key for the secure communication session, wherein the first encryption key is configured to encrypt communication data transmitted by the first device and the second encryption key is configured to decrypt communication data received from the at least one second device; and encrypting, by the first device, first communication data using the first encryption key; and transmitting, from the first device, the encrypted first communication data to the at least one second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for end-to-end encryption during a secure communication session, the system comprising:
-
an interface configured to receive an invitation to a secure communication session and transmit encrypted first communication data to at least one second device; a processor configured to perform a three-way handshake with the at least one second device to establish a first encryption key and a second encryption key for the secure communication session and encrypt first communication data using the first encryption key; and a memory configured to store the first encryption key and the second encryption key. - View Dependent Claims (10, 11)
-
-
12. A non-transitory computer-readable medium comprising instructions that when, executed by at least one processor, perform the steps of:
-
receiving an invitation to a secure communication session; performing a three-way handshake with the at least one second device to establish a first encryption key and a second encryption key for the secure communication session, wherein the first encryption key is configured to encrypt communication data transmitted by the first device and the second encryption key is configured to decrypt communication data received from the at least one second device; and encrypting first communication data using the first encryption key; and transmitting the encrypted first communication data to the at least one second device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification