Methods and systems for enabling legal-intercept mode for a targeted secure element

    公开(公告)号:US10237305B2

    公开(公告)日:2019-03-19

    申请号:US15182461

    申请日:2016-06-14

    Abstract: Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first key-negotiation parameter associated with a target client device into an intercept secure encryption element; configuring an encryption-management device to receive the intercept secure encryption element and to receive a second key-negotiation parameter associated with the target client device and obtained from a service-provider system, the encryption-management device configured to embed the second key-negotiation parameter into the intercept secure encryption element; and providing the intercept secure encryption element to a communications-intercept system configured to obtain intercepted messages associated with the target client device, the intercepted messages comprising session-key-negotiation messages and associated data messages encrypted with a corresponding negotiated session key, wherein the intercept secure encryption element is configured to (i) identify the negotiated session key based on the session-key-negotiation messages and the first and second key-negotiation parameters and (ii) decrypt the data messages with the negotiated session key.

    Systems and methods for conducting secure VOIP multi-party calls

    公开(公告)号:US10122767B2

    公开(公告)日:2018-11-06

    申请号:US14726108

    申请日:2015-05-29

    Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.

    SYSTEMS AND METHODS FOR CONDUCTING SECURE VOIP MULTI-PARTY CALLS

    公开(公告)号:US20190028518A1

    公开(公告)日:2019-01-24

    申请号:US16130828

    申请日:2018-09-13

    Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.

    SYSTEMS AND METHODS FOR CONDUCTING SECURE VOIP MULTI-PARTY CALLS
    4.
    发明申请
    SYSTEMS AND METHODS FOR CONDUCTING SECURE VOIP MULTI-PARTY CALLS 审中-公开
    用于执行安全电话多方呼叫的系统和方法

    公开(公告)号:US20160352708A1

    公开(公告)日:2016-12-01

    申请号:US14726108

    申请日:2015-05-29

    Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.

    Abstract translation: 建立安全电话会议的系统和方法。 在一个示例系统中,中央电话会议服务器与包括安全元件的附件设备建立点对点连接并连接到相应的参与者设备。 会议呼叫服务器包括与多个安全元件的接口,该多个安全元件被配置为对与辅助设备通信的媒体信号执行加扰和解扰频。 在另一示例中,参与者设备之一作为中央电话会议服务器。 在其他示例中,参与者设备通过连接到参与者设备的所有附件设备之间的点到点连接在电话会议上进行通信。 附件设备包括用于解密和加密在附件设备之间传送的媒体信号的安全元件。

    Systems and methods for conducting secure VOIP multi-party calls

    公开(公告)号:US11606398B2

    公开(公告)日:2023-03-14

    申请号:US16892886

    申请日:2020-06-04

    Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.

    Systems and methods for conducting secure VOIP multi-party calls

    公开(公告)号:US10715557B2

    公开(公告)日:2020-07-14

    申请号:US16130828

    申请日:2018-09-13

    Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.

    METHODS AND SYSTEMS FOR ENABLING LEGAL-INTERCEPT MODE FOR A TARGETED SECURE ELEMENT

    公开(公告)号:US20170237780A1

    公开(公告)日:2017-08-17

    申请号:US15182461

    申请日:2016-06-14

    Abstract: Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first key-negotiation parameter associated with a target client device into an intercept secure encryption element; configuring an encryption-management device to receive the intercept secure encryption element and to receive a second key-negotiation parameter associated with the target client device and obtained from a service-provider system, the encryption-management device configured to embed the second key-negotiation parameter into the intercept secure encryption element; and providing the intercept secure encryption element to a communications-intercept system configured to obtain intercepted messages associated with the target client device, the intercepted messages comprising session-key-negotiation messages and associated data messages encrypted with a corresponding negotiated session key, wherein the intercept secure encryption element is configured to (i) identify the negotiated session key based on the session-key-negotiation messages and the first and second key-negotiation parameters and (ii) decrypt the data messages with the negotiated session key.

Patent Agency Ranking