Identify a secure end-to-end voice call
First Claim
1. A method, comprising:
- transmitting, from a source endpoint, a request message addressed to a destination endpoint participating in an active call, wherein the request message is transmitted over a path that extends through at least one intermediary node;
wherein the transmitted request message includes a setting configured to cause each intermediary node on the path to set a secure media flag in the request message according to whether such intermediary node operates in a secure mode;
receiving back a response message at the source endpoint identifying the secure media flag settings performed by the at least one intermediary node; and
indicating an end-to-end secure call between the source and destination endpoints of the active call according to the response message.
1 Assignment
0 Petitions
Accused Products
Abstract
We describe a system embodiment comprising generating a Secure Real-Time Transport Protocol (SRTP) encapsulated packet and including a secure media indicator into the SRTP encapsulated packet. The method further comprises inserting the SRTP encapsulated packet into an SRTP voice stream associated with an active call between a source and a destination endpoint and indicating an end-to-end secure call between the source and destination endpoints responsive to the secure media indicator.
And we describe a method embodiment comprising transmitting a request message from a source endpoint to a destination endpoint participating in an active call and setting a secure media flag in the request message at each node in a signaling path associated with the active call. The method further comprises returning a response message from the destination endpoint to the source endpoint responsive to the request and indicating an end-to-end secure call between the two endpoints.
-
Citations
9 Claims
-
1. A method, comprising:
-
transmitting, from a source endpoint, a request message addressed to a destination endpoint participating in an active call, wherein the request message is transmitted over a path that extends through at least one intermediary node; wherein the transmitted request message includes a setting configured to cause each intermediary node on the path to set a secure media flag in the request message according to whether such intermediary node operates in a secure mode; receiving back a response message at the source endpoint identifying the secure media flag settings performed by the at least one intermediary node; and indicating an end-to-end secure call between the source and destination endpoints of the active call according to the response message. - View Dependent Claims (2, 3, 4)
-
-
5. Software encoded on one or more non-transitory computer-readable media and when executed operable to:
-
transmit, from a source endpoint, a request message addressed to a destination endpoint participating in an active call, wherein the request message is transmitted over a path that extends through at least one intermediary node; wherein the transmitted request message includes a setting configured to cause each intermediary node on the path to set a secure media flag in the request message according to whether such intermediary node operates in a secure mode; receive back a response message at the source endpoint identifying the secure media flag settings performed by the at least one intermediary node; and indicate an end-to-end secure call between the source and destination endpoints of the active call according to the response message. - View Dependent Claims (6, 7, 8, 9)
-
Specification