CALL ENCRYPTION SYSTEMS AND METHODS
First Claim
1. A method comprising:
- detecting, by an encryption relay device, a call associated with a user device, in communication with the encryption relay device;
inserting, by the encryption relay device, audio signals within the call, the audio signals encoding information, used to perform a key exchange with another encryption relay device, to exchange one or more encryption keys for the call, at least one encryption key, of the one or more encryption keys, being based on a dial code physically programmed by the user of the user device;
receiving, by the encryption relay device and from the user device, encrypted call information corresponding to the call;
decrypting, by the encryption relay device, the encrypted call information based on the one or more encryption keys, to obtain a decrypted version of the call;
receiving, by the encryption relay device, call information originating from the user of the user device;
encrypting, by the encryption relay device and based on the one or more encryption keys, the call information originating from the user; and
communicating, by the encryption relay device, the encrypted call information, originating from the user, to the user device to relay the encrypted call information, originating from the user, as part of the call.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between headsets worn by the user and the user devices. As information passes from the headset toward a corresponding user device, an encryption relay device may encrypt the information before the information reaches the user device so that the user device transmits encrypted call information to the other user participating in the call. When encrypted information is received, and travels from the user device to the headset, the encryption relay device may decrypt the information before it reaches the headset. Thus, the techniques described herein provide an end-to-end encryption solution to telephone calls.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting, by an encryption relay device, a call associated with a user device, in communication with the encryption relay device; inserting, by the encryption relay device, audio signals within the call, the audio signals encoding information, used to perform a key exchange with another encryption relay device, to exchange one or more encryption keys for the call, at least one encryption key, of the one or more encryption keys, being based on a dial code physically programmed by the user of the user device; receiving, by the encryption relay device and from the user device, encrypted call information corresponding to the call; decrypting, by the encryption relay device, the encrypted call information based on the one or more encryption keys, to obtain a decrypted version of the call; receiving, by the encryption relay device, call information originating from the user of the user device; encrypting, by the encryption relay device and based on the one or more encryption keys, the call information originating from the user; and communicating, by the encryption relay device, the encrypted call information, originating from the user, to the user device to relay the encrypted call information, originating from the user, as part of the call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable medium containing program instructions for causing one or more processors to:
-
detect a call associated with a user device, in communication with the encryption relay device; insert audio signals within the call, the audio signals encoding information, used to perform a key exchange with another encryption relay device, to exchange one or more encryption keys for the call, at least one encryption key, of the one or more encryption keys, being based on a dial code physically programmed by the user of the user device; receive, from the user device, encrypted call information corresponding to the call; decrypt the encrypted call information based on the one or more encryption keys, to obtain a decrypted version of call; receive call information originating from the user of the user device; encrypt, device and based on the one or more encryption keys, the call information originating from the user; and communicate, the encrypted call information, originating from the user, to the user device to relay the encrypted call information, originating from the user, as part of the call. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computing device comprising:
one or more processors to execute instructions to cause the one or more processors to; detect, via a first interface, a call involving a user device in communication with the computing device; insert, via the first interface, audio signals within the call, the audio signals encoding information used to perform a key exchange, to exchange one or more encryption keys for the call, at least one encryption key, of the one or more encryption keys, being based on a dial code physically programmed by the user of the user device; receive, via the first interface, encrypted call information corresponding to the call; decrypt, via an encryption module, the encrypted call information based on the one or more encryption keys, to obtain a decrypted version of call; receive, via a second interface, call information originating from the user of the user device; encrypt, via the encryption module, the call information originating from the user, based on the one or more encryption keys; and communicate, via the first interface, the encrypted call information, originating from the user, to the user device to relay the encrypted call information, originating from the user, as part of the call. - View Dependent Claims (19, 20)
Specification