Secure telecommunications
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
initialize a secure telecommunication by generating a meeting identifier and a first meeting key;
generate a first encryption key;
encrypt the meeting identifier and the first meeting key using the first encryption key;
transmit a secure telecommunication request to one or more receivers via a control channel, wherein the secure telecommunication request includes at least one of the encrypted meeting identifier and the encrypted first meeting key, and wherein at least one of the first meeting key and the first encryption key is generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device;
encrypt communication data using the first meeting key; and
transmit the encrypted communication data to the one or more receivers via a communication channel; and
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.
396 Citations
30 Claims
-
1. A system, comprising:
-
a processor configured to; initialize a secure telecommunication by generating a meeting identifier and a first meeting key; generate a first encryption key; encrypt the meeting identifier and the first meeting key using the first encryption key; transmit a secure telecommunication request to one or more receivers via a control channel, wherein the secure telecommunication request includes at least one of the encrypted meeting identifier and the encrypted first meeting key, and wherein at least one of the first meeting key and the first encryption key is generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; encrypt communication data using the first meeting key; and transmit the encrypted communication data to the one or more receivers via a communication channel; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
initializing a secure telecommunication by generating a meeting identifier and a first meeting key; generating a first encryption key; encrypting the meeting identifier and the first meeting key using the first encryption key; transmitting a secure telecommunication request to one or more receivers via a control channel, wherein the secure telecommunication request includes at least one of the encrypted meeting identifier and the encrypted first meeting key, and wherein at least one of the first meeting key and the first encryption key is generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; encrypting communication data using the first meeting key; and transmitting the encrypted communication data to one or more receivers via a communication channel. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium comprising instructions that, when executed by at least one processor, perform the steps of:
-
initializing a secure telecommunication by generating a meeting identifier and a first meeting key; generating a first encryption key; encrypting the meeting identifier and the first meeting key using the first encryption key; transmitting a secure telecommunication request to one or more receivers via a control channel, wherein the secure telecommunication request includes at least one of the encrypted meeting identifier and the encrypted first meeting key, and wherein at least one of the first meeting key and the first encryption key is generated by obtaining ephemeral environmental noise from a kernel operation executing on an initiating client'"'"'s device; encrypting communication data using the first meeting key; and transmitting the encrypted communication data to one or more receivers via a communication channel. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification