Secure telecommunications
First Claim
Patent Images
1. A method comprising:
- receiving a request to initialize a secure telecommunication via a control channel, wherein the request includes a first meeting identifier, an encrypted first meeting key, and a first ephemeral public component;
obtaining encrypted communication data, via a communication channel, using the first meeting identifier;
deriving a key-encrypting key using the first ephemeral component received in the request and a second ephemeral private component;
decrypting the encrypted first meeting key using the key-encrypting key;
decrypting the encrypted communication data using the decrypted first meeting key; and
providing the decrypted communication data to a user.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.
94 Citations
13 Claims
-
1. A method comprising:
-
receiving a request to initialize a secure telecommunication via a control channel, wherein the request includes a first meeting identifier, an encrypted first meeting key, and a first ephemeral public component; obtaining encrypted communication data, via a communication channel, using the first meeting identifier; deriving a key-encrypting key using the first ephemeral component received in the request and a second ephemeral private component; decrypting the encrypted first meeting key using the key-encrypting key; decrypting the encrypted communication data using the decrypted first meeting key; and providing the decrypted communication data to a user. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
a first server configured to provide a control channel between a first client device and a second client device; a second server configured to provide a communication channel between the first client device and the second client device; the first client device configured to; transmit a request to initialize a secure telecommunication via the control channel, wherein the request includes a first meeting identifier, an encrypted first meeting key, and a first ephemeral public component; and transmit, via the communication channel, encrypted communication data; and the second client device is configured to; receive, via the control channel, the request to initialize the secure telecommunication; obtain encrypted communication data, via the communication channel, using the first meeting identifier; derive a key-encrypting key using the first ephemeral component received in the request and a second ephemeral private component; decrypt the encrypted first meeting key using the key-encrypting key; decrypt the encrypted communication data using the decrypted first meeting key; and provide the decrypted communication data to a user. - View Dependent Claims (5, 6)
-
-
7. The system of 4, wherein the first client device includes a first secure collaboration application.
-
8. The system of 7, wherein the second client device includes a second secure collaboration application.
-
9. The system of 8, wherein the first client device and the second client device exchange encrypted communications using the first secure collaboration application and the second secure collaboration application.
-
10. The system of 8, wherein the first client device and the second client device exchange encrypted telecommunications using the first secure collaboration application and the second secure collaboration application.
-
11. A non-transitory computer-readable medium comprising instructions that when, executed by at least one processor, perform the steps of:
-
receiving a request to initialize a secure telecommunication via a control channel, wherein the request includes a first meeting identifier, an encrypted first meeting key, and a first ephemeral public component; obtaining encrypted communication data, via a communication channel, using the first meeting identifier; deriving a key-encrypting key using the first ephemeral public component received in the request and a second ephemeral private component; decrypting the encrypted first meeting key using the key-encrypting key; decrypting the encrypted communication data using the decrypted first meeting key; and providing the decrypted communication data to a user. - View Dependent Claims (12, 13)
-
Specification