SYSTEM AND METHOD FOR LAWFUL INTERCEPTION USING TRUSTED THIRD PARTIES IN SECURE VoIP COMMUNICATIONS
First Claim
1. A system for lawful interception using a trusted third party in secure VoIP communication between a VoIP transmit terminal and a VoIP receive terminal, the system comprising:
- a trusted third party that receives a master key request from the VoIP transmit terminal to generate a master key and transmits the generated master key to the VoIP transmit terminal and a key recovering system;
a key recovering system that receives a lawful interception request from a lawful interception requester to instruct a collection device on lawful interception, receives a secure packet from the collection device, receives the master key from the trusted third party, decrypts the secure packet with the master key and provides the decrypted packet to the lawful interception requester or provides the master key and the secure packet to the lawful interception requester; and
a collection device that collects the secure packet transmitted/received between the VoIP transmit terminal and the VoIP receive terminal in accordance with the lawful interception instruction received from the key recovering system and transmits the collected secure packet to the key recovering system.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system for lawful interception using a trusted third party in secure VoIP communication. A VoIP transmit terminal generates a secure packet using a master key received from a trusted third party and then communicates with a VoIP receive terminal. A collection device having received a lawful interception instruction from a key recovering system collects and transmits the secure packet to the key recovering system. The key recovering system decrypts the secure packet using the master key received from the trusted third party and provides the decrypted secure packet to a lawful interception requester or provides the master key received from the trusted third party and the secure packet to the lawful interception requester. It is possible to provide the perfect lawful interception in the secure VoIP communication environment, and to guarantee a perfect forward secrecy since the master key is changed for each call.
28 Citations
13 Claims
-
1. A system for lawful interception using a trusted third party in secure VoIP communication between a VoIP transmit terminal and a VoIP receive terminal, the system comprising:
-
a trusted third party that receives a master key request from the VoIP transmit terminal to generate a master key and transmits the generated master key to the VoIP transmit terminal and a key recovering system; a key recovering system that receives a lawful interception request from a lawful interception requester to instruct a collection device on lawful interception, receives a secure packet from the collection device, receives the master key from the trusted third party, decrypts the secure packet with the master key and provides the decrypted packet to the lawful interception requester or provides the master key and the secure packet to the lawful interception requester; and a collection device that collects the secure packet transmitted/received between the VoIP transmit terminal and the VoIP receive terminal in accordance with the lawful interception instruction received from the key recovering system and transmits the collected secure packet to the key recovering system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for lawful interception using a trusted third party in secure VoIP communication between a VoIP transmit terminal and a VoIP receive terminal, the method comprising the steps of:
-
(a) instructing, at a key recovering system, a collection device on lawful interception in accordance with a lawful interception request from a lawful interception requester; (b) at the trusted third party, receiving a master key request from the VoIP transmit terminal to generate a master key and transmitting the generated master key to the VoIP transmit terminal and a key recovering system; (c) exchanging the master key and performing secure communication between the VoIP transmit terminal and the VoIP receive terminal; (d) at the collection device, collecting a secure packet transmitted/received between the VoIP transmit terminal and the VoIP receive terminal and transmitting the secure packet to the key recovering system; and (e) at the key recovering system, receiving the master key from the trusted third party, decrypting the secure packet with the received master key and providing the decrypted packet to the lawful interception requester. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification