System and method for communicating confidential messages
First Claim
1. A method of recording messages comprising:
- recording, with a processor, audio data associated with a call in a first file structured in accordance with a file format that defines a first portion and a second portion, wherein the audio data is recorded in the first portion of the first file;
receiving one or more recipient identifiers from a caller associated with the call, the recipient identifiers identifying one or more recipients of the audio data;
identifying, based on the one or more recipient identifiers received from the caller, one or more public keys associated with the one or more recipients of the audio data;
encrypting, with the processor, the audio data stored in the first portion of the first file based on the identified one or more public keys; and
generating, with the processor, a second file structured according to the file format that includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file, wherein the decoy audio data indicates a confidential status of the second file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of recording messages includes recording audio data in a first file structured in accordance with a file format that defines a first portion and a second portion. The audio data is recorded in the first portion of the first file. The method also includes encrypting the audio data stored in the first portion of the first file and generating a second file structured according to the file format. The second file includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file. The decoy audio data indicates a confidential status of the second file or serves as a red herring to distract from the encrypted audio data in the second portion of the second file.
34 Citations
35 Claims
-
1. A method of recording messages comprising:
-
recording, with a processor, audio data associated with a call in a first file structured in accordance with a file format that defines a first portion and a second portion, wherein the audio data is recorded in the first portion of the first file; receiving one or more recipient identifiers from a caller associated with the call, the recipient identifiers identifying one or more recipients of the audio data; identifying, based on the one or more recipient identifiers received from the caller, one or more public keys associated with the one or more recipients of the audio data; encrypting, with the processor, the audio data stored in the first portion of the first file based on the identified one or more public keys; and generating, with the processor, a second file structured according to the file format that includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file, wherein the decoy audio data indicates a confidential status of the second file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 34, 35)
-
-
10. A method of recording messages comprising:
-
accessing, with a processor, encrypted audio data associated with a call and stored in a first file structured in accordance with a file format that defines a first portion and a second portion, the encrypted audio data encrypted with one or more public keys identified based on one or more recipient identifiers, the recipient identifiers received from a caller associated with the audio data and identifying one or more recipients of the call, wherein decoy audio data is stored in the first portion of the first file and the encrypted audio data is stored in the second portion of the first file, the decoy audio data indicating a confidential status of the second file; decrypting, with the processor, the encrypted audio data; and generating, with the processor, a second file that includes the decrypted audio data, wherein the second file is structured according to the file format, and wherein the decrypted audio data is stored in the first portion of the second file. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A device for recording messages comprising:
-
a memory operable to store processor instructions; and a processor operable to; record audio data associated with a call in a first file structured in accordance with a file format that defines a first portion and a second portion, wherein the audio data is recorded in the first portion of the first file; receive one or more recipient identifiers from a caller associated with the call, the recipient identifiers identifying one or more recipients of the audio data; identify, based on the one or more recipient identifiers received from the caller, one or more public keys associated with the one or more recipients of the audio data; encrypt the audio data stored in the first portion of the first file based on the identified one or more public keys; and generate a second file structured according to the file format that includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file, the decoy audio data indicating a confidential status of the second file. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A device for recording messages comprising:
-
a memory operable to store processor instructions; and a processor operable to; access encrypted audio data associated with a call and stored in a first file structured in accordance with a file format that defines a first portion and a second portion, the encrypted audio data encrypted with one or more public keys identified based on one or more recipient identifiers, the recipient identifiers received from a caller associated with the audio data and identifying one or more recipients of the call, wherein decoy audio data is stored in the first portion of the first file and the encrypted audio data is stored in the second portion of the first file, and wherein the decoy audio data indicates a confidential status of the first file; decrypt the encrypted audio data; and generate a second file that includes the decrypted audio data, wherein the second file is structured according to the file format, and wherein the decrypted audio data is stored in the first portion of the second file. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A system for recording messages comprising:
-
means for recording audio data associated with a call in a first file structured in accordance with a file format that defines a first portion and a second portion, wherein the audio data is recorded in the first portion of the first file; means for receiving one or more recipient identifiers from a caller associated with the call, the recipient identifiers identifying one or more recipients of the audio data; means for identifying, based on the one or more recipient identifiers received from the caller, one or more public keys associated with the one or more recipients of the audio data; means for encrypting the audio data stored in the first portion of the first file based on the identified one or more public keys; and means for generating a second file structured according to the file format that includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file, the decoy audio data indicating a confidential status of the second file.
-
-
33. A system for recording messages comprising:
-
means for accessing encrypted audio data associated with a call and stored in a first file structured in accordance with a file format that defines a first portion and a second portion, wherein decoy audio data is stored in the first portion of the first file and the encrypted audio data is stored in the second portion of the first file, the encrypted audio data encrypted with one or more public keys identified based on one or more recipient identifiers, the recipient identifiers received from a caller associated with the audio data and identifying one or more recipients of the call, the decoy audio data indicating a confidential status of the first file; means for decrypting the encrypted audio data; and means for generating a second file that includes the decrypted audio data, wherein the second file is structured according to the file format, and wherein the decrypted audio data is stored in the first portion of the second file.
-
Specification