Secure Communication Systems, Methods, and Devices
First Claim
Patent Images
1. A secure communication system, the system comprising:
- a memory device; and
a processor in communication with the memory device, wherein the memory device comprises instructions that when executed by the processor cause the processor to;
validate a first mobile device;
transmit a second key to the first mobile device; and
initiate a secure internet-based voice call between the first mobile device and a second previously validated mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
In par, the invention relates to a secure communication system. The system includes a voice call processing server; a user database in communication with the server; and a security gateway in communication with the server and the database, wherein the gateway transmits an encrypted signaling key and at least one encrypted media key in response to validating a mobile device using configuration data stored in the database, wherein the server tracks call traffic encrypted using the at least one media key, the call traffic routed using the Internet.
109 Citations
20 Claims
-
1. A secure communication system, the system comprising:
-
a memory device; and a processor in communication with the memory device, wherein the memory device comprises instructions that when executed by the processor cause the processor to; validate a first mobile device; transmit a second key to the first mobile device; and initiate a secure internet-based voice call between the first mobile device and a second previously validated mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure communication system, the system comprising:
-
a voice call processing server; a user database in communication with the server; and a security gateway in communication with the server and the database, wherein the gateway transmits an encrypted signaling key and at least one encrypted media key in response to validating a mobile device using configuration data stored in the database, wherein the server tracks call traffic encrypted using the at least one media key, the call traffic routed using the Internet. - View Dependent Claims (12, 13)
-
-
14. A method of conducting a secure communication between a first mobile device and a second mobile device, the method comprising the steps of:
-
transmitting a first request for a first secure communication from a first mobile device to a secure VoIP gateway; transmitting a first key from the first mobile device to the secure VoIP gateway; receiving, by the first mobile device, a second key from the secure VoIP gateway; and encrypting a first communication using the second key to obtain a first encrypted communication. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification