Secure Communication Systems, Methods, and Devices
First Claim
Patent Images
1. A secure communication system, the system comprising:
- a memory device; and
a processor in communication with the memory device, wherein the memory device comprises instructions that when executed by the processor cause the processor to;
validate a first mobile device;
transmit a second key to the first mobile device; and
initiate a secure internet-based voice call between the first mobile device and a second previously validated mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
In par, the invention relates to a secure communication system. The system includes a voice call processing server; a user database in communication with the server; and a security gateway in communication with the server and the database, wherein the gateway transmits an encrypted signaling key and at least one encrypted media key in response to validating a mobile device using configuration data stored in the database, wherein the server tracks call traffic encrypted using the at least one media key, the call traffic routed using the Internet.
-
Citations
20 Claims
-
1. A secure communication system, the system comprising:
-
a memory device; and a processor in communication with the memory device, wherein the memory device comprises instructions that when executed by the processor cause the processor to; validate a first mobile device; transmit a second key to the first mobile device; and initiate a secure internet-based voice call between the first mobile device and a second previously validated mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure communication system, the system comprising:
-
a voice call processing server; a user database in communication with the server; and a security gateway in communication with the server and the database, wherein the gateway transmits an encrypted signaling key and at least one encrypted media key in response to validating a mobile device using configuration data stored in the database, wherein the server tracks call traffic encrypted using the at least one media key, the call traffic routed using the Internet. - View Dependent Claims (12, 13)
-
-
14. A method of conducting a secure communication between a first mobile device and a second mobile device, the method comprising the steps of:
-
transmitting a first request for a first secure communication from a first mobile device to a secure VoIP gateway; transmitting a first key from the first mobile device to the secure VoIP gateway; receiving, by the first mobile device, a second key from the secure VoIP gateway; and encrypting a first communication using the second key to obtain a first encrypted communication. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification