Method and apparatus for the secure storage of audio signals
First Claim
Patent Images
1. A method comprising:
- establishing communication between at least two parties;
determining data communicated between the at least two parties;
encoding, by a cryptographic processor, the communicated data;
storing the encoded communicated data;
generating, by the cryptographic processor, a key for decoding the encoded communicated data;
transmitting the key to each of the at least two parties;
generating, by the cryptographic processor, a first access code that can be used to obtain access to the stored encoded communicated data; and
transmitting the first access code to a first party of the at least two parties.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for recording audio so that the recording can be authenticated as to both content and time of recording is provided. The system may be implemented as a central server that is accessed via one or more telephone lines, or as a stand-alone unit. The system operates by encrypting audio information, storing the encrypted information, and providing users with a cryptographic key that can be used to decrypt the stored information. Preferably, time stamps are embedded in the stored information. Digital signatures may be used to provide additional security.
-
Citations
25 Claims
-
1. A method comprising:
-
establishing communication between at least two parties; determining data communicated between the at least two parties; encoding, by a cryptographic processor, the communicated data; storing the encoded communicated data; generating, by the cryptographic processor, a key for decoding the encoded communicated data; transmitting the key to each of the at least two parties; generating, by the cryptographic processor, a first access code that can be used to obtain access to the stored encoded communicated data; and transmitting the first access code to a first party of the at least two parties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
establishing communication between at least two parties; storing data communicated between the at least two parties; encoding, by a cryptographic processor, the stored communicated data; generating, by the cryptographic processor, a first key for decoding the stored encoded communicated data; generating, by the cryptographic processor, a second key for decoding the stored encoded communicated data, the second key being different from the first key; transmitting the first key to a first party of the at least two parties; transmitting the second key to a second party of the at least two parties; generating, by the cryptographic processor, an access code that can be used to obtain access to the stored encoded communicated data; transmitting the access code to each of the at least two parties; receiving the access code and the first key from the first party; decoding, by the cryptographic processor, the stored encoded communicated data using the received first key; and outputting the decoded communicated data. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
receiving communication data; encrypting, by a cryptographic processor, the communication data; storing the encrypted communication data; retrieving a key for decrypting the encrypted communication data; transmitting the key to a first party; generating a message identifier; transmitting the message identifier to each of the first party and a second party; receiving the message identifier and the key from the first party; decrypting, by the cryptographic processor, the stored encrypted communication data based on the received key; and providing the decrypted communication data to the first party. - View Dependent Claims (24, 25)
-
Specification