IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0658873
(2000-09-08)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
7 인용 특허 :
13 |
초록
▼
The present invention is directed towards a method, device, and network for providing secure communication environments. In one form, a communication network operable to provide a secure communication environment is disclosed. The communication network includes a communication device operable to req
The present invention is directed towards a method, device, and network for providing secure communication environments. In one form, a communication network operable to provide a secure communication environment is disclosed. The communication network includes a communication device operable to request the secure communication environment. The communication network further includes a communication server operable to be coupled to the communication device to enable the secure communication environment.
대표청구항
▼
1. A system for securing communications comprising:an initiating device operable to transmit to a communication server a first request for security of first communications with a first destination device, the initiating device further operable to transmit to the communication server a second request
1. A system for securing communications comprising:an initiating device operable to transmit to a communication server a first request for security of first communications with a first destination device, the initiating device further operable to transmit to the communication server a second request for security of second communications with a second destination device; the communication server operable to couple to the initiating device and the first destination device, to receive the first request, to select a first algorithm for securing the first communications, to transmit to the initiating device first information identifying the first algorithm, to determine that the first destination device supports encryption of the first communications, and to transmit to the first destination device the first information in response to determining that the first destination device supports encryption of the first communications, the communication server further operable to couple to the second destination device, to receive the second request, to select a second algorithm for securing the second communications, to transmit to the initiating device information identifying the second algorithm, to determine that the second destination device does not support encryption of the second communications, to establish an encrypted link with the initiating device in response to determining that the second destination device does not support encryption of the second communications, and to establish an unencrypted link with the second destination device in response to determining that the second destination device does not support encryption of the second communications; the first destination device operable to receive the first information, to encrypt a first message for communication to the initiating device using the first algorithm, and to decrypt a second message received by the first destination device using the first algorithm; and the second destination device operable to transmit a third message to the initiating device through the communication server and to receive a forth message from the initiating device through the communication server. 2. A system for securing communications comprising:an initiating device operable to transmit to a communication server a request for security of communications with a destination device; the communication server operable to couple to the initiating device and the destination device, to receive the request, to select an algorithm for securing the communications, to transmit to the initiating device information identifying the selected algorithm, to determine that the destination device supports encryption of the communications, and to transmit to the destination device the information in response to determining that the destination device supports encryption of the comnmunications; and the destination device operable to receive the information, to encrypt a first message for communication to the initiating device using the identified algorithm, and to decrypt a second message received by the destination device using the identified algorithm. 3. The system of claim 2, wherein:the initiating device is further operable to decrypt the first message using the identified algorithm and to encrypt the second message using the identified algorithm; and the initiating device and the destination device are further operable to establish an encrypted communication link for communicating the first message and the second message. 4. The system of claim 2, wherein:the information includes the selected algorithm; the initiating device is further operable to store the selected algorithm; and the destination device is further operable to store the selected algorithm. 5. The system of claim 2, wherein the request comprises a selection by a user of the initiating device to secure a particular communication session.6. The system of claim 2, wherein the communication server includes a database operable to store a plurality of potential algorithms for use in encrypting the communications.7. The system of claim 2, wherein the initiating device includes:a user interface operable to receive voice data; a storage medium operable to store the identified algorithm; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using the identified algorithm for communication to the destination device. 8. The system of claim 2, wherein the destination device includes:a user interface operable to receive voice data; a storage medium operable to store the identified algorithm; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using the identified algorithm for communication to the initiating device. 9. A system for securing communications comprising:an initiating device operable to transmit to a communication server a request for security of communications with a destination device; the communication server operable to couple to the initiating device and the destination device, to receive the request, to select an algorithm for securing the communications, to transmit to the initiating device information identifying the selected algorithm, to determine that the destination device does not support encryption of the communications, to establish an encrypted link with the initiating device in response to determining that the destination device does not support encryption of the communications, and to establish an unencrypted link with the destination device in response to determining that the destination device does not support encryption of the communications; and the destination device operable to transmit unencrypted messages to the communication server using the unencrypted link and to receive unencrypted messages from the communication server using the unencrypted link. 10. The system of claim 9, wherein:the initiating device is further operable to receive the information, to encrypt a first message for communication to the destination device through the communication server using the identified algorithm, and to decrypt a second message received from the communication server using the identified algorithm; and the communication server is further operable to decrypt the first message using the identified algorithm, to transmit the unencrypted first message to the destination device using the unencrypted link, to receive the second message from the destination device, to encrypt the second message using the identified algorithm, and to transmit the encrypted second message to the initiating device using the encrypted link. 11. The system of claim 9, wherein:the information includes the selected algorithm; and the initiating device is further operable to store the selected algorithm. 12. The system of claim 9, wherein the request comprises a selection by a user of the initiating device to secure a particular communication session.13. The system of claim 9, wherein the communication server includes a database operable to store a plurality of potential algorithms for use in encrypting the communications.14. The system of claim 9, wherein the initiating device includes:a user interface operable to receive voice data; a storage medium operable to store the identified algorithm; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using the identified algorithm for communication to the communication server. 15. The system of claim 9, wherein the destination device includes:a user interface operable to receive voice data; and a communication module operable to couple to the user interface and to transmit the voice data to the communication server. 16. A system for securing communications comprising:an initiating device operable to transmit a request for encryption of communications with a destination device; and a communication server operable to receive the request from the initiating device and to determine if the destination device supports encryption of the communications; wherein, in response to determining that the destination device supports encryption of the communications, the communication server is further operable to facilitate establishment of an encrypted link between the initiating device and the destination device; and wherein, in response to determining that the destination device does not support encryption of the communications, the communication server is further operable to establish an encrypted link between the initiating device and the communication server and to establish an unencrypted link between the communication server and the destination device. 17. The system of claim 16, wherein facilitating establishment of the encrypted link between the initiating device and the destination device includes selecting an algorithm for encrypting the communications and transmitting to the initiating device and the destination device information identifying the selected algorithm.18. The system of claim 17, wherein:the information includes the selected algorithm; and the initiating device is further operable to store the selected algorithm. 19. The system of claim 16, wherein:establishing the encrypted link between the initiating device and the communication server includes selecting an algorithm for encrypting the communications and transmitting to the initiating device information identifying the selected algorithm; and establishing the unencrypted link between the communication server and the destination device includes transmitting an unencrypted message from the communication server to the destination device. 20. The system of claim 19, wherein:the information includes the selected algorithm; and the initiating device is further operable to store the selected algorithm. 21. The system of claim 16, wherein the communication server includes a database operable to store a plurality of algorithms for use in encrypting the communications.22. The system of claim 16, wherein the initiating device includes:a user interface operable to receive voice data; a storage medium operable to store a plurality of algorithms for use in encrypting the communications; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using an identified algorithm for communication to the communication server. 23. The system of claim 22, wherein the request comprises a selection by a user of the initiating device to secure a particular communication session.24. A method for securing communications comprising:receiving from an initiating device a request for encryption of communications with a destination device; determining if the destination device supports encryption of the communications; in response to determining that the destination device supports encryption of the communications, facilitating establishment of an encrypted link between the initiating device and the destination device; in response to determining that the destination device does not support encryption of the communications: establishing an encrypted link between the initiating device and a communication server; and establishing an unencrypted link between the communication server and the destination device. 25. The method of claim 24, wherein facilitating establishment of the encrypted link between the initiating device and the destination device includes:selecting an algorithm for encrypting the communications; and transmitting to the initiating device and the destination device information identifying the selected algorithm. 26. The method of claim 25, wherein:the information includes the selected algorithm; and the initiating device is operable to store the selected algorithm. 27. The method of claim 24, wherein:establishing the encrypted link between the initiating device and the communication server includes: selecting an algorithm for encrypting the communications; and transmitting to the initiating device information identifying the selected algorithm; and establishing the unencrypted link between the communication server and the destination device includes: transmitting an unencrypted message from the communication server to the destination device. 28. The method of claim 27, wherein:the information includes the selected algorithm; and the initiating device is operable to store the selected algorithm. 29. The method of claim 24, wherein the communication server includes a database operable to store a plurality of algorithms for use in encrypting the communications.30. The method of claim 24, wherein the initiating device includes:a user interface operable to receive voice data; a storage medium operable to store a plurality of algorithms for use in encrypting the communications; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using an identified algorithm for communication to the communication server. 31. The method of claim 30, wherein the request comprises a selection by a user of the initiating device to secure a particular communication session.32. Logic for securing communications comprising, the logic encoded in media and operable when executed to:receive from an initiating device a request for encryption of communications with a destination device; determine if the destination device supports encryption of the communications; in response to determining that the destination device supports encryption of the communications, facilitate establishment of an encrypted link between the initiating device and the destination device; in response to determining that the destination device does not support encryption of the communications: establish an encrypted link between the initiating device and a communication server; and establish an unencrypted link between the communication server and the destination device. 33. The logic of claim 32, wherein facilitating establishment of the encrypted link between the initiating device and the destination device includes:selecting an algorithm for encrypting the communications; and transmitting to the initiating device and the destination device information identifying the selected algorithm. 34. The logic of claim 33, wherein:the information includes the selected algorithm; and the initiating device is operable to store the selected algorithm. 35. The logic of claim 32, wherein:establishing the encrypted link between the initiating device and the communication server includes: selecting an algorithm for encrypting the communications; and transmitting to the initiating device information identifying the selected algorithm; and establishing the unencrypted link between the communication server and the destination device includes: transmitting an unencrypted message from the communication server to the destination device. 36. The logic of claim 35, wherein:the information includes the selected algorithm; and the initiating device is operable to store the selected algorithm. 37. The logic of claim 32, wherein the communication server includes a database operable to store a plurality of algorithms for use in encrypting the communications.38. The logic of claim 32, wherein the initiating device includes:a user interface operable to receive voice data; a storage medium operable to store a plurality of algorithms for use in encrypting the communications; and a communication module operable to couple to the user interface, to couple to the storage medium, and to encrypt the voice data using an identified algorithm for communication to the communication server. 39. The logic of claim 38, wherein the request comprises a selection by a user of the initiating device to secure a particular communication session.40. A system for securing communications comprising:means for receiving from an initiating device a request for encryption of communications with a destination device; means for determining if the destination device supports encryption of the communications; in response to determining that the destination device supports encryption of the communications, means for facilitating establishment of an encrypted link between the initiating device and the destination device; in response to determining that the destination device does not support encryption of the communications: means for establishing an encrypted link between the initiating device and a communication server; and means for establishing an unencrypted link between the communication server and the destination device. 41. The system of claim 40, wherein the means for facilitating establishment of the encrypted link between the initiating device and the destination device includes:means for selecting an algorithm for encrypting the communications; and means for transmitting to the initiating device and the destination device information identifying the selected algorithm.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.