Secure mobile telephony
First Claim
Patent Images
1. A system for end to end encrypted mobile telephony, the system comprising:
- a tamper resistant and tamper evident integrated circuit adapted to be coupled to a commodity mobile phone, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory, at least a portion of which is at least partially protected by the first cryptographic key; and
software associated with the integrated circuit configured to be installed in the commodity mobile phone, the software, when installed in the commodity mobile phone, configured to operate in conjunction with the integrated circuit to, when the commodity mobile phone connects to a destination phone using a connection technique of the commodity mobile phone;
receive a signal from the destination phone indicating that the destination phone is capable of cooperating to provide an encrypted connection;
authenticate the destination phone; and
establish an encrypted connection with the destination phone, whereby voice communications between the commodity mobile phone and the destination phone are encrypted end to end.
2 Assignments
0 Petitions
Accused Products
Abstract
An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.
-
Citations
90 Claims
-
1. A system for end to end encrypted mobile telephony, the system comprising:
-
a tamper resistant and tamper evident integrated circuit adapted to be coupled to a commodity mobile phone, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory, at least a portion of which is at least partially protected by the first cryptographic key; and software associated with the integrated circuit configured to be installed in the commodity mobile phone, the software, when installed in the commodity mobile phone, configured to operate in conjunction with the integrated circuit to, when the commodity mobile phone connects to a destination phone using a connection technique of the commodity mobile phone; receive a signal from the destination phone indicating that the destination phone is capable of cooperating to provide an encrypted connection; authenticate the destination phone; and establish an encrypted connection with the destination phone, whereby voice communications between the commodity mobile phone and the destination phone are encrypted end to end. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for end to end encrypted mobile telephony, the system comprising:
-
a tamper resistant and tamper evident integrated circuit adapted to be coupled to a commodity mobile phone, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory protected by the first cryptographic key; and software associated with the integrated circuit configured to be installed in the commodity mobile phone, the software, when installed in the commodity mobile phone, configured to operate in conjunction with the integrated circuit to, when the commodity mobile phone receives a call from a calling phone; send a signal to the calling phone indicating that the commodity mobile phone is capable of cooperating to provide an encrypted connection; authenticate itself to the calling phone; and establish an encrypted connection with the calling phone, whereby voice communications between the commodity mobile phone and the calling phone are encrypted end to end. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of establishing an encrypted end to end phone call from a commodity mobile phone provisioned with software and a detachable tamper resistant and tamper evident integrated circuit, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory protected by the first cryptographic key, the method comprising:
-
receiving, in response to a connection placed from the commodity mobile phone to a destination phone, a signal from the destination phone, the signal indicating that the destination phone is capable of cooperating to provide an encrypted connection; authenticating, using the software and the integrated circuit, the destination phone; and establishing an encrypted connection with the destination phone, whereby voice communications between the commodity mobile phone and the destination phone are encrypted end to end. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method of establishing an encrypted end to end phone call placed from a calling phone to a commodity mobile phone provisioned with software and a detachable tamper resistant and tamper evident integrated circuit, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory protected by the first cryptographic key, the method comprising:
-
sending, by the commodity mobile phone and in response to a connection placed to the commodity mobile phone from the calling phone, a signal indicating that the commodity mobile phone is capable of cooperating to provide an encrypted connection; authenticating, using the software and the integrated circuit, the commodity mobile phone to the calling phone; and establishing an encrypted connection with the commodity mobile phone, whereby voice communications between the commodity mobile phone and the calling phone are encrypted end to end. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A system for end to end encrypted mobile telephony, the system comprising:
-
a tamper resistant and tamper evident integrated circuit adapted to be coupled to a commodity mobile phone, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory, at least a portion of which is at least partially protected by the first cryptographic key; and software associated with the integrated circuit configured to be installed in the commodity mobile phone, the software, when installed in the commodity mobile phone, configured to operate in conjunction with the integrated circuit to, when a user of the commodity mobile phone initiates a connection to a destination phone using a connection technique of the commodity mobile phone; retrieve a record associated with the destination phone, the record reflecting that an encrypted connection may be established, the record being previously stored as a result of a prior connection between the commodity mobile phone and the destination phone; establish a connection to the destination phone; authenticate the destination phone; and provide end to end encrypted voice communications between the commodity mobile phone and the destination phone. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
68. A method of establishing an encrypted end to end phone call from a commodity mobile phone provisioned with software and a detachable tamper resistant and tamper evident integrated circuit, the integrated circuit comprising a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory protected by the first cryptographic key, the method comprising:
-
retrieving, in response to a user of the commodity mobile phone initiating a connection to a destination phone using a connection technique of the commodity mobile phone, a record associated with the destination phone, the record reflecting that an encrypted connection may be established, the record being previously stored as a result of a prior connection between the commodity mobile phone and the destination phone; establishing a connection to the destination phone; authenticating the destination phone; and providing end to end encrypted voice communications between the commodity mobile phone and the destination phone. - View Dependent Claims (69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
-
-
80. A non-transitory computer readable medium containing instructions adapted to be installed in a commodity mobile phone provisioned with a detachable tamper resistant and tamper evident integrated circuit, wherein the integrated circuit comprises a cryptographic engine, a programmable processor, a first cryptographic key and a nonvolatile memory protected by the first cryptographic key, the instructions adapted to cause the commodity mobile phone to:
-
retrieve, in response to a user of the commodity mobile phone initiating a connection to a destination phone using a connection technique of the commodity mobile phone, a record associated with the destination phone, the record reflecting that an encrypted connection may be established, the record being previously stored as a result of a prior connection between the commodity mobile phone and the destination phone; establish a connection to the destination phone; authenticate the destination phone; and provide end to end encrypted voice communications between the commodity mobile phone and the destination phone. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89, 90)
-
Specification