×

Method for payload encryption of digital voice or data communications

  • US 9,674,163 B1
  • Filed: 08/30/2013
  • Issued: 06/06/2017
  • Est. Priority Date: 03/18/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for transmitting real-time end-to-end encrypted software based voice communications, between at least a first digital or computing device with software program installed and a second digital or computer device which also has software installed, interfacing with a portal, or gateway or proxy or server, or other types of digital or computing device designed to process requests and deliver voice using different types of communications medium or protocol, comprising of:

  • receiving at the portal a request from the first digital or computing device to communicate with the second digital or computing device;

    registering and/or authenticating at least the first digital or computing device and the second digital or computing device at a portal;

    receiving authorization from the second digital or computing device to set up a secure session with the first digital or computing device;

    providing the first digital or computing device and the second digital or computing device with at least first and/or second encryption keys, with one or more of the following functionality;

    receiving real-time software based voice messages which have been encrypted from the first digital or computing device and the second digital or computing device;

    real-time decrypting at the portal, the encrypted voice messages with the keys provided to the first digital or computing device and the second digital or computing device;

    re-encrypting at the portal, the received messages which were decrypted real-time from the first digital or computing device and the second digital or computing device with the provided encryption keys;

    sending the re-encrypted messages in real-time to the first digital or computing device and the second digital or computing device;

    wherein the first digital device and the second device securely communicate in real-time with each other by encrypting and decrypting the messages sent to and received from the portal;

    wherein AES (Advanced Encryption Standard) or other type of encryption algorithm, applying either hashing, symmetric or asymmetric methods, is utilized to encrypt the payload (data packets) in transit between the first digital or computing device and the second digital or computing device;

    the portal re-encrypts encrypted messages which were decrypted by the portal;

    the portal assigns separate keys to each end point—

    for use of different types of encryption, one of which is symmetric, between the end point and portal;

    The portal re-encrypts and routes to a destination with destination'"'"'s keys whereas the received message is decrypted using source'"'"'s key;

    there are five functions to the portal of which one or more applies;

    the portal;

    a. registers devices and/or users based on credentialsb. authenticates devices and/or users based on credentialsc. authorizes devices and/or users based on credentialsd. exchanges encryption keys with client 2 once devices and/or users are authorized and authenticated using different types of encryption, Handles call setup and call handoffe. ensures that users have the correct encryption keys in order to operate a voice encrypted session;

    wherein the overall method comprises;

    1. a portal accepts incoming registration or authentication requests or call request for client software programs or devices;

    2. a client registers;

    a. when the client registers Secure Socket Layer (SSL), Transport Layer Security (TLS) or other standard security technology is used, for establishing an encrypted link or secure channel that is opened using both a client side and portal side certificate so that the client authenticates with the portal and the portal authenticates the client which is based on using different types of encryption methods, of which standard PKI (Public Key Infrastructure) practices is one such method;

    b. once the secure channel is established, the client registers his/her ‘

    phone number’ and

    /or internet protocol address with the portal and the portal gives the client a generated key through the secure channel to be used in the voice encryption or let the client devices coordinate keys through using different types of encryption methods;

    3. other clients register;

    a. client 1 wishes to talk to client 2;

    client 1 requests the portal to setup a call with client 2;

    b. the portal searches for client 2 and notifies client 2 of a call;

    If client 2 accepts, the portal notifies both clients to start flowing voice or data traffic through the portal;

    4. clients use Voice over IP (VoIP) or other similar technologies to communicate end-to-end.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×