Secure telecommunications
First Claim
1. A method of establishing a secure communication path through a network, the path for use in coupling premise equipment of a calling party with premise equipment of a called party with use of a network node, the premise equipment of the calling party and the network node having a cryptographic system, the method comprising the steps of:
- the calling party'"'"'s premise equipment transmitting first signals to the network node, the first signals for use in establishing in the network a clear communication path between the calling party'"'"'s premise equipment and the network node;
the calling party'"'"'s premise equipment transmitting second signals to the network node, the second signals for use in converting the clear communication path between the network node and the calling party'"'"'s premise equipment to a secure communication path;
the calling party'"'"'s premise equipment transmitting third signals to the network node via the secure communication path, the third signals comprising a telephone number associated with the called party for use in establishing a communications path between the network node and the premise equipment of the called party.
4 Assignments
0 Petitions
Accused Products
Abstract
A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.
65 Citations
11 Claims
-
1. A method of establishing a secure communication path through a network, the path for use in coupling premise equipment of a calling party with premise equipment of a called party with use of a network node, the premise equipment of the calling party and the network node having a cryptographic system, the method comprising the steps of:
-
the calling party'"'"'s premise equipment transmitting first signals to the network node, the first signals for use in establishing in the network a clear communication path between the calling party'"'"'s premise equipment and the network node; the calling party'"'"'s premise equipment transmitting second signals to the network node, the second signals for use in converting the clear communication path between the network node and the calling party'"'"'s premise equipment to a secure communication path; the calling party'"'"'s premise equipment transmitting third signals to the network node via the secure communication path, the third signals comprising a telephone number associated with the called party for use in establishing a communications path between the network node and the premise equipment of the called party. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of establishing a secure communication path through a network, the path for use in coupling premise equipment of a calling party with premise equipment of a called party with use of a network node, the premise equipment of the calling party and the network node having a cryptographic system premise equipment of the calling party coupled to the node by a clear communication path, the method comprising the steps of:
-
receiving at the network node first signals from the premise equipment of the calling party, the first signals for use in converting the clear communication path to a secure communication path; receiving at the network node via the secure communication path second signals from tho calling party'"'"'s premise equipment, the second signals comprising a telephone number associated with the called party; and establishing a communications path between the network node and the premise equipment of the called party based on the second signals. - View Dependent Claims (8, 9, 10, 11)
-
Specification