Verifying cryptographic identity during media session initialization
First Claim
1. A method comprising:
- receiving, by a device associated with a first network, a media initialization message requesting a media session for the exchange of real-time media with a remote endpoint associated with a second network, the media initialization message asserting an identity and comprising a plurality of fields and a signature, the signature formed by encrypting a portion of the fields with a private key associated with a trusted source other than the remote endpoint, the plurality of fields including at least one unsigned field not in the portion of the fields;
verifying, by the device associated with the first network, the signature using a public key corresponding to the private key, the public key associated with the trusted source, the verification of the signature confirming that the identity was authenticated by the trusted source;
sending an encryption request to the remote endpoint, the encryption request specifying data and requesting that the remote endpoint encrypt the data with the private key;
receiving a response from the remote endpoint;
decrypting the response with the public key;
confirming that the decrypted response is equivalent to the data specified by the encryption request; and
in response to confirming the identity, exchanging the real-time media with the remote endpoint.
0 Assignments
0 Petitions
Accused Products
Abstract
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint'"'"'s agent may create the signature over some fields of the message using an enterprise network'"'"'s private key. The agent may insert the signature into the message and send the message to a recipient endpoint'"'"'s authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media.
53 Citations
21 Claims
-
1. A method comprising:
-
receiving, by a device associated with a first network, a media initialization message requesting a media session for the exchange of real-time media with a remote endpoint associated with a second network, the media initialization message asserting an identity and comprising a plurality of fields and a signature, the signature formed by encrypting a portion of the fields with a private key associated with a trusted source other than the remote endpoint, the plurality of fields including at least one unsigned field not in the portion of the fields; verifying, by the device associated with the first network, the signature using a public key corresponding to the private key, the public key associated with the trusted source, the verification of the signature confirming that the identity was authenticated by the trusted source; sending an encryption request to the remote endpoint, the encryption request specifying data and requesting that the remote endpoint encrypt the data with the private key; receiving a response from the remote endpoint; decrypting the response with the public key; confirming that the decrypted response is equivalent to the data specified by the encryption request; and in response to confirming the identity, exchanging the real-time media with the remote endpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
an authentication agent operable to; receive a media initialization message requesting a media session for the exchange of real-time media with a remote endpoint, the media initialization message asserting an identity and comprising a plurality of fields and a signature, the signature formed by encrypting a portion of the fields with a private key associated with a trusted source other than the endpoint, the plurality of fields including at least one unsigned field not in the portion of the fields; and verify the signature using a public key corresponding to the private key, the public key associated with the trusted source, the verification of the signature confirming that the identity was authenticated by the trusted source; and a recipient endpoint operable to; sending an encryption request to the remote endpoint, the encryption request specifying data and requesting that the remote endpoint encrypt the data with the private key; receiving a response from the remote endpoint; decrypting the response with the public key; confirming that the decrypted response is equivalent to the data specified by the encryption request; and in response to confirming the identity, exchanging the real-time media with the remote endpoint. - View Dependent Claims (11, 12, 13, 14)
-
-
15. Logic encoded in one or more non-transitory tangible media for execution and when executed operable to:
-
receive a media initialization message requesting a media session for the exchange of real-time media with a remote endpoint, the media initialization message asserting an identity and comprising a plurality of fields and a signature, the signature formed by encrypting a portion of the fields with a private key associated with a trusted source other than the endpoint, the plurality of fields including at least one unsigned field not in the portion of the signed fields; verify the signature using a public key corresponding to the private key, the public key associated with the trusted source, the verification of the signature confirming that the identity was authenticated by the trusted source; send an encryption request to the remote endpoint, the encryption request specifying data and requesting that the remote endpoint encrypt the data with the private key; receive a response from the remote endpoint; decrypt the response with the public key; confirm that the decrypted response is equivalent to the data specified by the encryption request; and in response to confirming the identity, exchange the real-time media with the remote endpoint. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
means for receiving a media initialization message requesting a media session for the exchange of real-time media with a remote endpoint, the media initialization message asserting an identity and comprising a plurality of fields and a signature, the signature, formed by encrypting a portion of the fields with a private key associated with a trusted source other than the endpoint, the plurality of fields including at least one unsigned field not in the portion of the fields; means for verifying the signature using a public key corresponding to the private key, the public key associated with the trusted source, the verification of the signature confirming that the identity was authenticated by the trusted source; means for sending an encryption request to the remote endpoint, the encryption request specifying data and requesting that the remote endpoint encrypt the data with the private key; means for receiving a response from the remote endpoint; means for decrypting the response with the public key; and means for confirming that the decrypted response is equivalent to the data specified by the encryption request; and means for exchanging the real-time media with the remote endpoint in response to confirming the identity.
-
Specification