Class / Patent application number | Description | Number of patent applications / Date published |
380257000 | Circuit switched network (e.g., wired telephone) | 19 |
20090060186 | Method and Apparatus for Providing Secured Communication Connections Using a Secured Communication Connection Object - An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection. | 03-05-2009 |
20090147956 | Sharing a Secret Element - A secret element is shared with a cryptographic module. The secret element can be obtained from at least first and second partial secret information items. A first transmission transmits the first partial secret information item to the cryptographic module but not the first partial information item, this second transmission being separate from the first transmission. The secret element can then be obtained in the cryptographic module from the first and second partial secret information items transmitted. | 06-11-2009 |
20100067696 | Standard telephone equipment (STE) based deployable secure communication system - Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar STE device over an ISDN link for decryption. The present invention is embodied in a system that provides secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet. | 03-18-2010 |
20100124330 | Secure transmission over satellite phone network - A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information, and converts both into an ASCII string for presentation to a data port of a satellite phone, allowing out-of-band control of a non-secure satellite system (e.g., AT command control of a data port) by a user on a secure side of an encryption device, by including the ability to interpret control signals and control the satellite system appropriately. A false dial tone is presented to the encryption device, and the data stream coming from the encryption device is monitored for the presence of dual-tone, multi-frequency (DTMF) tones representing control signals, the DTMF tones are converted to ASCII characters, which are in turn received as control signals by the satellite phone, allowing control of the functions of the satellite system directly from the secure side of the encryption device. | 05-20-2010 |
20100128875 | SECURE VOICEMAIL SYSTEM AND METHOD - A system and method are disclosed in which a secure voicemail repository ( | 05-27-2010 |
20100166182 | METHOD AND SYSTEM FOR SECURING VOICE OVER INTERNET PROTOCOL TRANSMISSIONS - An approach is provided for providing secure packetized voice transmissions. A public key corresponding to a destination device is retrieved. An input signal is digitized for transmission over a packetized voice connection to the destination device. The digitized signal is encrypted using a public key of the destination device. This encrypted input signal when received at the destination device is decrypted using a secure private key at the destination device. | 07-01-2010 |
20100183151 | USING AUTHENTICATION TOKENS TO AUTHORIZE A FIREWALL TO OPEN A PINHOLE - Techniques are described for the use of a cryptographic token to authorize a firewall to open a pinhole which permits certain network traffic to traverse firewalls. An initiating endpoint requests a token from a call controller, which authorizes a pinhole though the firewall. In response, the call controller may generate a cryptographic authorization token (CAT) sent towards the destination endpoint. The call controller may generate the token based on an authorization ID associated with the call controller, a shared secret known to both the call controller and the firewall, and data specific to the media flow for which authorization is requested. | 07-22-2010 |
20100278341 | RADIO COMMUNICATION SYSTEM, RADIO COMMUNICATION APPARATUS, AND CIPHERING METHOD - The radio communication system of the present invention includes a radio access network ( | 11-04-2010 |
20110135093 | Secure telephone devices, systems and methods - Secure telephone devices, systems and methods are provided for carrying out secure communications utilizing a telephone device that includes cryptographic storage and processing components, the cryptographic processing components including intercepting and injecting capabilities for intercepting an incoming signal, cryptographically processing the signal and injecting the system for delivery to the output of the telephone device, wherein the system and method may utilize the telephone operating system, and wherein embodiments are provided where an exchange component regulates the cryptographic information so that users engaging in secure cryptographic communications do not need to provide encryption key information to each other. | 06-09-2011 |
20110194696 | SECURE PROTOCOL TERMINAL ADAPTER - A system and method for a terminal adapter including a telephony station interface, a data communications interface, and a processing unit. The processing unit is configured to establish a first connection over the data communications interface and a second connection over the telephony station interface. The processing unit is configured to communicate secure information between the first connection and the second connection. The processing unit includes a V.150 internetworking function, an Assured Services Session Initiation Protocol (AS-SIP) stack and/or a Datagram Transport Layer Security (DTLS)/Secure Real-time Transport Protocol (SRTP) stack. | 08-11-2011 |
20130028418 | Standard Telephone Equipment (STE) Based Deployable Secure Communication System - Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar STE device over an ISDN link for decryption. The present invention is embodied in a system that provides secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet. | 01-31-2013 |
20130108044 | Multi-Platform Communication System Providing Real-Time Point to Point Encrypted Communication | 05-02-2013 |
20130142334 | Method and System for Pre-Accessing Conference Telephone and Network Side Device - A method for pre-accessing a conference telephone is disclosed in the present invention. The method includes that: a network side detects a received call whose target is a main control party after the main control party initiates an encryption conference telephone; the call is not accessed if the call is a non-encryption conversation; the call is allowed to be accessed if the call is an encryption conversation. A system for pre-accessing a conference telephone is also disclosed in the present invention, wherein, the system includes a pre-accessing processing unit and a call type detection unit of the network side. A network side device is also disclosed in the present invention. The present invention realizes the pre-accessing of the encryption conference telephone, thereby improving security of the encryption conversation as well as avoiding the problem that a user is frequently affected when performing the encryption conference telephone. | 06-06-2013 |
20140016780 | Method and device for secure phone banking - A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device. | 01-16-2014 |
20140177838 | Method and Apparatus for the Secure Storage of Audio Signals - In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a central server that is accessed via one or more lines for audio communication, or as a stand-alone unit. The system operates by encrypting communicated data (e.g., audio signals), storing the encrypted information, and providing at least one user with a key that can be used to decrypt the stored information. | 06-26-2014 |
20140286489 | WIRED COMMUNICATIONS SYSTEMS WITH IMPROVED CAPACITY AND SECURITY - Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication network may enable data to be transmitted and received over a coaxial cable without using division duplexing techniques. For example, the cable communication network may include DFD enabled network nodes and each subscriber to the cable network may be equipped with a DFD system configured to operate in a DFD mode. In some embodiments, oppositely propagating signals may be transmitted over one frequency channel, and DFD techniques may be used to recover originally transmitted signals. Further, in some embodiments, DFD techniques may be used with encryption methods to increase the security of data transmitted in the cable communication network. | 09-25-2014 |
20160014096 | CALLER-IDENTITY BASED SECURITY | 01-14-2016 |
20160191254 | AUTHENTICATION INFRASTRUCTURE FOR IP PHONES OF A PROPRIETARY TOIP SYSTEM BY AN OPEN EAP-TLS SYSTEM - The infrastructure according to the invention includes: a proprietary TOIP system including a call server connected to the network, integrating a certification module able to certify an IP telephone; an external certification architecture able to certify the certification module of the call server; an EAP-TLS authentication system including a RADIUS server and a directory server, the RADIUS server including a rule for verifying certificates consisting of verifying the entire certification chain formed by the certification of the IP telephone by the certification module of the call server and the certification of the certification module of the call server by the external certification architecture, the directory server including a user account for each IP telephone authorized to access the network and a match table associating a signature of the certificate of the corresponding IP telephone with each username of a user account. | 06-30-2016 |
380041000 | Having quantizing and subsequent normalizing of signal (e.g., reentry telephone circuitry) | 1 |
20090268901 | CONTINUOUS VARIABLE QUANTUM ENCRYPTION KEY DISTRIBUTION SYSTEM - A continuous variable quantum encryption key distribution system comprises a sender (Alice) able to randomly choose the phase and the amplitude of each coherent light pulse of a signal, to provide a coherent state defined by a first quadrature and a second quadrature that are random, and to transmit to a receiver (Bob) the signal pulses (S) and a local oscillator (LO), the receiver comprising a homodyne detector ( | 10-29-2009 |