Secure communication method
First Claim
1. A computer program product for providing secure communication, the computer program product comprising:
- one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising;
program instructions for execution on a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network, wherein the verification message is encrypted by the second computing device using a first cryptographic key;
program instructions for execution on the first computing device to transmit, to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device;
program instructions for execution on the first computing device to receive, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and
program instructions for execution on the first computing device to transmit, over the network to the second computing device, the decrypted verification message, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed, andwherein the wireless device is a wireless router, the wireless channel between the first computing device and the wireless router is established as part of a wireless local area network (WLAN) created by the wireless router, andwherein the program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN further comprise program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN in accordance with the User Datagram Protocol (UDP) over—
and a specified port.
5 Assignments
0 Petitions
Accused Products
Abstract
A first computing device receives over a telecommunications network from a second computing device a verification message encrypted using a public key. The verification message is generated by the second computing device when initiating a call to the first computing device. The first computing device transmits to a wireless router via a wireless local area network (WLAN) created by the wireless router, the encrypted verification message. The first computing device receives from the wireless router over the WLAN, a decrypted verification message decrypted from the encrypted message by the wireless device using a private key associated with the public key. The first computing device transmits over the telecommunications network to the second computing device, the decrypted verification message. If the second computing device determines that the decrypted verification message corresponds to the encrypted verification message, the second computing device allows the call to the first computing device to proceed.
38 Citations
20 Claims
-
1. A computer program product for providing secure communication, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising; program instructions for execution on a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network, wherein the verification message is encrypted by the second computing device using a first cryptographic key; program instructions for execution on the first computing device to transmit, to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device; program instructions for execution on the first computing device to receive, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and program instructions for execution on the first computing device to transmit, over the network to the second computing device, the decrypted verification message, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed, and wherein the wireless device is a wireless router, the wireless channel between the first computing device and the wireless router is established as part of a wireless local area network (WLAN) created by the wireless router, and wherein the program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN further comprise program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN in accordance with the User Datagram Protocol (UDP) over—
and a specified port. - View Dependent Claims (2, 3, 7, 9, 11, 13, 19)
-
-
4. A computer system for providing secure communication, the computer system comprising:
-
one or more computer processors; one or more computer-readable storage devices; program instructions stored on the one or more computer-readable storage devices for execution by at least one of the one or more processors, the program instructions comprising; program instructions for execution on a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network; program instructions for execution on the first computing device to transmit, to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device; program instructions for execution on the first computing device to receive, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and program instructions for execution on the first computing device to transmit, over the network to the second computing device, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed, wherein the wireless device is a wireless router, the wireless channel between the first computing device and the wireless router is established as part of a wireless local area network (WLAN) created by the wireless router, and wherein the program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN further comprise program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN in accordance with the User Datagram Protocol (UDP) and a specified port. - View Dependent Claims (5, 6, 8, 10, 12, 14, 20)
-
-
15. A computer program product for providing secure communication, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising; program instructions for execution on a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network, wherein the verification message is encrypted by the second computing device using a first cryptographic key; program instructions for execution on the first computing device to transmit to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the wireless device is a wireless router, the wireless channel between the first computing device and the wireless router is established as part of a wireless local area network (WLAN) created by the wireless router, and wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device; program instructions for execution on the first computing device to receive, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and program instructions for execution on the first computing device to transmit, over the network to the second computing device, the decrypted verification message, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed, and wherein the program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN further comprise program instructions for execution on the first computing device to receive the decrypted verification message over the WLAN in accordance with the User Datagram Protocol (UDP) and a specified port. - View Dependent Claims (16, 17, 18)
-
Specification