Standard telephone equipment (STE) based deployable secure communication system
First Claim
Patent Images
1. A method of cloaking communications, comprising:
- formulating, via an encryption device, a single digitally encrypted secure serial data stream from a non-encrypted data signal;
establishing a first data tunnel for passing encapsulated IP packets of said single digitally encrypted secure serial data stream into encapsulated IP packets addressed to a distant end IP address;
establishing a second data tunnel between a local black side router in a communications module together with said encryption device, and a remote controlled device; and
transmitting said encapsulated IP packets over a public non-secure Internet Protocol (IP) network over said first data tunnel and said second data tunnel;
wherein said first data tunnel masks a unique signature of said encryption device.
2 Assignments
0 Petitions
Accused Products
Abstract
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar STE device over an ISDN link for decryption. The present invention is embodied in a system that provides secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.
-
Citations
14 Claims
-
1. A method of cloaking communications, comprising:
-
formulating, via an encryption device, a single digitally encrypted secure serial data stream from a non-encrypted data signal; establishing a first data tunnel for passing encapsulated IP packets of said single digitally encrypted secure serial data stream into encapsulated IP packets addressed to a distant end IP address; establishing a second data tunnel between a local black side router in a communications module together with said encryption device, and a remote controlled device; and transmitting said encapsulated IP packets over a public non-secure Internet Protocol (IP) network over said first data tunnel and said second data tunnel; wherein said first data tunnel masks a unique signature of said encryption device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for cloaking encrypted data communications, comprising:
-
an encryption device to formulate a single digitally encrypted secure serial data stream from a non-encrypted data signal; an encapsulator to establish a first data tunnel for passing encapsulated IP packets of said single digitally encrypted secure serial data stream into encapsulated IP packets addressed to a distant end IP address; a local black side router, in a communications module together with said encryption device, to establish a second data tunnel between said local black side router and a remote controlled device; and a transmitter to transmit said encapsulated IP packets over a public non-secure data network over said first data tunnel and said second data tunnel; wherein said first data tunnel masks a unique signature of said encryption device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification