×

Providing encrypted real time data transmissions on a network

  • US 20040158704A1
  • Filed: 02/12/2003
  • Published: 08/12/2004
  • Est. Priority Date: 02/12/2003
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for providing secure communications on a network having unsecure communications thereon, comprising:

  • generating a first message, at a first network endpoint, according to a predetermined control protocol for controlling real time or nearly so communications on the network, wherein said first message includes a request for encrypted real time or nearly so communications in a predetermined real time protocol for real time or nearly so communications between the first network endpoint and a second network endpoint;

    sending said first message to the second network endpoint, via the network, in the control protocol;

    at the second network endpoint, parsing said first message according to said control protocol;

    determining whether said request for encrypted real time or nearly so communications between said first and second network endpoints can be satisfied at the second network endpoint;

    when said request can be satisfied at the second network endpoint, the following steps (a)-(c) are performed;

    (a) receiving, at the first network endpoint from the second network endpoint, a second message in said control protocol;

    wherein said second message provides encryption related data for operatively configuring a first cypher accessed by the first network endpoint for encrypting data input to the first network endpoint, and wherein there is a second cypher at the second network endpoint operatively configured to decrypt encrypted information communicated on the network in the real time protocol from the first cypher, wherein the encrypted information corresponds in content to the data input to the first cypher, and wherein said second cypher is operatively configured using encryption related data received from the first network endpoint;

    (b) until a predetermined condition occurs, performing the following steps (b 1) and (b2);

    (b1) encrypting with said first cypher, information that is input to the first network endpoint;

    (b2) transmitting on the network, from the first network endpoint, an encrypted version, of said information, output by said first cypher, wherein said encrypted version is transmitted in the real time protocol, wherein said encrypted version is decrypted by said second cypher when said encrypted version is received by said second endpoint;

    (c) upon said predetermined condition occurring, generating a third message, at one of the first and second network endpoints, according to the control protocol, wherein said third message includes encryption related data for reconfiguring at least one of said first and second ciphers for decrypting the real time data provided by the first network endpoint differently.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×