Secure telecommunications
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive a request to initialize a secure telecommunication via a control channel, wherein the request includes at least one of an encrypted first encryption key, an encrypted meeting identifier, and an encrypted first meeting key;
decrypt the encrypted first encryption key included in the request to initialize the secure telecommunication, wherein the first encryption key was previously generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device;
decrypt the encrypted meeting identifier and the encrypted first meeting key using the first encryption key;
obtain encrypted communication data, via a communication channel, using the decrypted meeting identifier;
decrypt the encrypted communication data using the decrypted first meeting key; and
provide the decrypted communication data to a user; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.
-
Citations
21 Claims
-
1. A system, comprising:
-
a processor configured to; receive a request to initialize a secure telecommunication via a control channel, wherein the request includes at least one of an encrypted first encryption key, an encrypted meeting identifier, and an encrypted first meeting key; decrypt the encrypted first encryption key included in the request to initialize the secure telecommunication, wherein the first encryption key was previously generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; decrypt the encrypted meeting identifier and the encrypted first meeting key using the first encryption key; obtain encrypted communication data, via a communication channel, using the decrypted meeting identifier; decrypt the encrypted communication data using the decrypted first meeting key; and provide the decrypted communication data to a user; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a request to initialize a secure telecommunication via a control channel, wherein the request includes at least one of an encrypted first encryption key, an encrypted meeting identifier, and an encrypted first meeting key; decrypting the encrypted first encryption key included in the request to initialize the secure telecommunication, wherein the first encryption key was previously generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; decrypting the encrypted meeting identifier and the encrypted first meeting key using the first encryption key; obtaining encrypted communication data, via a communication channel, using the decrypted meeting identifier; decrypting the encrypted communication data using the decrypted first meeting key; and providing the decrypted communication data to a user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising instructions that, when executed by at least one processor, perform the steps of:
-
receiving a request to initialize a secure telecommunication via a control channel, wherein the request includes at least one of an encrypted first encryption key, an encrypted meeting identifier, and an encrypted first meeting key; decrypting the encrypted first encryption key included in the request to initialize the secure telecommunication, wherein the first encryption key was previously generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; decrypting the encrypted meeting identifier and the encrypted first meeting key using the first encryption key; obtaining encrypted communication data, via a communication channel, using the decrypted meeting identifier; decrypting the encrypted communication data using the decrypted first meeting key; and providing the decrypted communication data to a user. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification