WO2005053290A1 - Sicherheitsmodul zum verschlüsseln eines telefongesprächs - Google Patents
Sicherheitsmodul zum verschlüsseln eines telefongesprächs Download PDFInfo
- Publication number
- WO2005053290A1 WO2005053290A1 PCT/EP2004/052885 EP2004052885W WO2005053290A1 WO 2005053290 A1 WO2005053290 A1 WO 2005053290A1 EP 2004052885 W EP2004052885 W EP 2004052885W WO 2005053290 A1 WO2005053290 A1 WO 2005053290A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security module
- protocol
- network
- tdm
- telephone
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
- H04M7/0078—Security; Fraud detection; Fraud prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/12—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
- H04M7/1205—Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/253—Telephone sets using digital voice transmission
- H04M1/2535—Telephone sets using digital voice transmission adapted for voice communication over an Internet Protocol [IP] network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
Definitions
- Security module for encrypting a telephone call
- the invention relates to a security module for encrypting a telephone call between one or more first telecommunication terminals in a packet-oriented data network and one or more second telecommunication terminals in an analog and / or digital telephone network.
- Telephony in IP networks is known from the prior art.
- standards in which the signaling for telephony in IP networks is specified.
- VoIP Voice over IP
- LAN Local Area Network
- WLAN Wireless Local Area Network
- security aspects relating to the authenticity and integrity of control and signaling data have mainly been considered in VoIP telephony.
- the security of the transmitted voice data will also be taken into account.
- SRTP Secure Real Time Transport Protocol
- the object of the invention is therefore to provide a security module for encrypting a telephone call, which Encryption of the voice data in a heterogeneous network comprehensively enables a packet-oriented data network and a telephone network.
- the security module is used to encrypt a telephone call between one or more first telecommunication terminals in a packet-oriented data network and one or more second telecommunication terminals in an analog and / or digital telephone network, data packets being transported in the packet-oriented network using an encrypted transport protocol and the keys for the encrypted one Transport protocol can be exchanged using a key exchange protocol.
- PSTN Public Switched Telephone Network
- the packet-oriented network and the telephone network are connected to one another via an access computer and the security module can be interposed in a connecting line on a first or second telecommunications terminal during a telephone call.
- the term “connecting line” is to be understood generally here, it can be both a wired and a wireless connection on the corresponding telecommunication terminal.
- the security module comprises a protocol processing device which processes messages of the key exchange protocol as well as data packets transported by means of the encrypted transport protocol if the security module is interposed in a connection line on a first or second telecommunication terminal during a telephone call.
- Task of the protocol The processing device is to convert voice signals which are generated at the corresponding telecommunications terminal into data packets for transport via the encrypted transport protocol and to convert data packets arriving at the security module and which are transported via the encrypted transport protocol into voice signals.
- the security module also includes a modem connection unit, which is always used when the security module is interposed in a connection line on a second telecommunication terminal.
- the modem connection unit sets up a modem connection between the second telecommunication terminal and the access computer and / or a further second telecommunication terminal during a telephone call, data packets being transported via the modem connection using the encrypted transport protocol and messages from the key exchange protocol
- PPP Point to Point Protocol
- the modem connection unit in the security module thus implements a transfer of encryption technologies from packet-oriented networks to public telephone networks. This is possible because modem connections nowadays have sufficient bandwidth or transmission rates for the transmission of real-time media data packets.
- SRTP (see document [1]) is used as the encrypted transport protocol.
- SIP Session Initiation Protocol
- the telephone network in which the security module according to the invention is used is, for example, a digital ISDN network.
- the modem connection unit preferably establishes a modem connection via the B channel in the ISDN network.
- the packet-oriented network is preferably an IP-based data network, in particular a LAN network.
- the modem connection unit preferably establishes a modem connection according to the V90 and / or V92 standard, this standard providing sufficient bandwidths or transmission rates for the transmission of data packets from packet-oriented networks.
- the security module is used for telephones with a connecting cable between the telephone set and the telephone handset, the security module being designed in such a way that it is interposed in the connecting cable.
- FIG. 1 shows the schematic representation of a heterogeneous network in which the security module according to the invention is used to encrypt voice signals.
- the TDM network is a digital network, but a separate analog voice channel is used to transmit spoken voice.
- the LAN and the TDM network are connected to one another via a gateway G.
- the gateway is used to modify IP data packets transmitted in the LAN network for forwarding in the TDM network as well as data from the TDM network for forwarding in the LAN network.
- VoIP clients VoIP-C which enable calls to be made over packet-oriented networks.
- VoIP over IP the standards SIP or H.323, which are well known to the person skilled in the art, can be used for signaling voice messages.
- the lower VoIP client in Fig. 1 is a telephone with which the establishment of an encrypted telephone connection is intended. Therefore, between the handset of the telephone and the actual telephone connection in the corresponding ⁇ security module SM according to the invention line interposed.
- the security modules known from the prior art enable the telephone call to be encrypted only within the TDM network, with each telephone call subscriber generating a key to set up an encrypted telephone connection by pressing a button on his security module, which key is transmitted via a proprietary signaling Protocol is exchanged between the parties' telephones. Finally, combinations of numbers are shown on displays that are integrated in the security modules, which the callers announce to each other via the telephone connection. If the number combinations match, it can be assumed that the connection is not being tapped by a third party, so that the encrypted data transmission is finally carried out with the help of the exchanged keys, again using a proprietary protocol.
- the security module solves this problem in that it can process protocols known from the IP world for encrypting data in a normal public TDM network.
- the protocol processing device can process the key exchange protocol MIKEY.
- MIKEY key exchange protocol
- keys are generated and exchanged between the clients or telephones in the heterogeneous network of FIG. 1.
- the keys are used here by the transport protocol SRTP for the encrypted transmission of the data packets by means of SRTP.
- the protocol processing facility enables including encrypted telephony between VoIP clients in the LAN network. This is shown in FIG. 1 with the double arrows MIKEY-KM (KM stands for key management) and SRTP-MS (MS stands for media security).
- the security module SM has a modem connection unit. This modem connection unit provides one during a telephone call
- Participant in the TDM network with a participant in the LAN network establishes a modem connection to the gateway G via a voice channel in the TDM network.
- This is preferably a V92 modem connection with which data can be transmitted at 56 kbit / s downstream and 48 kbit / s upstream.
- the MIKEY messages are transported in the LAN network, for example using the SIP protocol.
- the contents of the MIKEY messages can then be cut out of the SIP message and inserted into the PPP tunnel.
- the gateway it would also be conceivable for the gateway to simply forward the SIP messages to the PPP tunnel without cutting out the MIKEY messages.
- the protocol processing device of the security module SM must be able to process the SIP protocol.
- the security module SM functions as a SIP end point.
- the gateway G le ⁇ takes diglich a forwarding function, and changes the data Not. This also applies to the actual key exchange data in the form of MIKEY messages. If required, however, the gateway can also be included in the connection as a trustworthy component, for example to enable "lawful interception".
- the mechanism according to the invention is illustrated again by the arrows in the lower region of FIG. 1.
- a modem connection is used between the gateway G and a TDM client TDM-C for encrypted data transport, via which the PPP protocol runs, which in turn is used to transport IP data packets.
- IP-PPP-TDM end-to-end encryption is implemented between a client in the LAN network and a client in the TDM network using the MIKEY key exchange protocol and the SRTP
- Transport protocol reached SRTP. This is emphasized by the double arrows labeled MIKEY-KM and SRTP-MS.
- the security module according to the invention thus enables the transmission of encryption protocols known from the IP world into a public telephone network in a simple manner. This is guaranteed by a modem connection, which, due to its possible bandwidths and transmission rates, enables the transport of real-time data packets and signaling messages from the IP world.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04819236A EP1687962A1 (de) | 2003-11-27 | 2004-11-09 | Sicherheitsmodul zum verschlüsseln eines telefongesprächs |
US10/580,954 US8195958B2 (en) | 2003-11-27 | 2004-11-09 | Security module for encrypting a telephone conversation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10355418A DE10355418B4 (de) | 2003-11-27 | 2003-11-27 | Sicherheitsmodul zum Verschlüsseln eines Telefongesprächs |
DE10355418.1 | 2003-11-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005053290A1 true WO2005053290A1 (de) | 2005-06-09 |
Family
ID=34625301
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2004/052885 WO2005053290A1 (de) | 2003-11-27 | 2004-11-09 | Sicherheitsmodul zum verschlüsseln eines telefongesprächs |
Country Status (5)
Country | Link |
---|---|
US (1) | US8195958B2 (de) |
EP (1) | EP1687962A1 (de) |
CN (1) | CN100459620C (de) |
DE (1) | DE10355418B4 (de) |
WO (1) | WO2005053290A1 (de) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005069940A2 (en) | 2004-01-22 | 2005-08-04 | Cisco Technology, Inc. | Method and apparatus for transporting encrypted media streams over a wide area network |
WO2007059944A1 (de) * | 2005-11-23 | 2007-05-31 | Giesecke & Devrient Gmbh | Sichere voice-over-ip-telefonie |
WO2009048259A2 (en) * | 2007-10-09 | 2009-04-16 | Samsung Electronics Co., Ltd. | Method for efficiently providing key in a portable broadcasting system and system using the same |
US8428559B2 (en) | 2009-09-29 | 2013-04-23 | Christopher Anthony Silva | Method for recording mobile phone calls |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006046017B4 (de) | 2006-09-28 | 2010-01-14 | Siemens Ag | Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls |
DE102006047650A1 (de) * | 2006-10-09 | 2008-04-10 | Giesecke & Devrient Gmbh | Kryptographische Berechnungen für VoIP-Verbindung |
DE102006047648A1 (de) * | 2006-10-09 | 2008-04-10 | Giesecke & Devrient Gmbh | Initialisierung einer VoIP-Verbindung |
US8464053B2 (en) * | 2007-09-05 | 2013-06-11 | Radvision Ltd | Systems, methods, and media for retransmitting data using the secure real-time transport protocol |
JP5496907B2 (ja) * | 2007-11-30 | 2014-05-21 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | セキュアな通信のための鍵管理 |
US20110054912A1 (en) * | 2009-09-01 | 2011-03-03 | Christopher Anthony Silva | System and method of storing telephone conversations |
US20110076990A1 (en) * | 2009-09-29 | 2011-03-31 | Christopher Anthony Silva | Method for recording mobile phone calls |
CN102510768A (zh) * | 2011-12-21 | 2012-06-20 | 华为技术有限公司 | 一种支持加密通信的方法和装置 |
JP5746774B2 (ja) * | 2014-01-06 | 2015-07-08 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | セキュアな通信のための鍵管理 |
CH709506A2 (it) * | 2014-04-14 | 2015-10-15 | Quantec Sa | Dispositivo portatile di ricetrasmissione di flussi audio crittografati e metodo associato. |
CN104065649B (zh) * | 2014-06-05 | 2017-09-19 | 天地融科技股份有限公司 | 一种语音通话的数据处理方法 |
US10194011B2 (en) | 2016-09-27 | 2019-01-29 | High Sec Labs Ltd. | Method and apparatus for securing voice over IP telephone device |
US11606460B2 (en) | 2021-04-07 | 2023-03-14 | High Sec Labs Ltd. | Mutual disabling unit for multiple phones |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778071A (en) * | 1994-07-12 | 1998-07-07 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US6356638B1 (en) * | 1998-07-30 | 2002-03-12 | General Dynamics Decision Systems, Inc. | Radio wireline interface and method for secure communication |
US6584562B1 (en) * | 1997-12-11 | 2003-06-24 | France Telecom | Device for securing a telephone link between two subscriber sets |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6151677A (en) * | 1998-10-06 | 2000-11-21 | L-3 Communications Corporation | Programmable telecommunications security module for key encryption adaptable for tokenless use |
US7035410B1 (en) * | 1999-03-01 | 2006-04-25 | At&T Corp. | Method and apparatus for enhanced security in a broadband telephony network |
MY123388A (en) * | 1999-03-15 | 2006-05-31 | Sony Corp | Processing method and apparatus for encrypted data transfer |
US6856687B2 (en) * | 1999-06-21 | 2005-02-15 | Copytele, Inc. | Portable telecommunication security device |
US6857072B1 (en) * | 1999-09-27 | 2005-02-15 | 3Com Corporation | System and method for enabling encryption/authentication of a telephony network |
DE19960733A1 (de) * | 1999-12-16 | 2001-09-27 | Deutsche Telekom Mobil | Verfahren und Anordnung zur verbesserten Ausnutzung von technischen Ressourcen zwischen Telekommunikations- und IP-Netzen |
US6889321B1 (en) * | 1999-12-30 | 2005-05-03 | At&T Corp. | Protected IP telephony calls using encryption |
ATE489813T1 (de) * | 2001-09-20 | 2010-12-15 | Nokia Siemens Networks Gmbh | Verteilte übermittlung von informationen in einem verbindungslosen, paketorientierten kommunikationsnetz |
US20030137959A1 (en) * | 2001-09-24 | 2003-07-24 | Nebiker Robert M. | Flexible-link multi-media communication |
CN100592731C (zh) * | 2001-12-07 | 2010-02-24 | 艾利森电话股份有限公司 | 端到端加密数据电信的合法侦听 |
US7213145B2 (en) * | 2002-01-10 | 2007-05-01 | Avaya Technology Corp. | Method and apparatus for secure internet protocol communication in a call processing system |
US6792534B2 (en) * | 2002-03-22 | 2004-09-14 | General Instrument Corporation | End-to end protection of media stream encryption keys for voice-over-IP systems |
US7366894B1 (en) * | 2002-06-25 | 2008-04-29 | Cisco Technology, Inc. | Method and apparatus for dynamically securing voice and other delay-sensitive network traffic |
DE50301796D1 (de) * | 2002-11-25 | 2006-01-05 | Siemens Ag | Verfahren und Anordnung zum verschlüsselten Übertragen von Kommunikationsdatenströmen über ein paketorientiertes Kommunikationsnetz |
US7426636B1 (en) * | 2003-06-02 | 2008-09-16 | Cisco Technology, Inc. | Compact secure data communication method |
US7707407B2 (en) * | 2003-09-15 | 2010-04-27 | Telecommunication Systems, Inc. | Encryption of voice and data in a single data stream in a deployable, secure communication system |
US7308101B2 (en) * | 2004-01-22 | 2007-12-11 | Cisco Technology, Inc. | Method and apparatus for transporting encrypted media streams over a wide area network |
US7451921B2 (en) * | 2004-09-01 | 2008-11-18 | Eric Morgan Dowling | Methods, smart cards, and systems for providing portable computer, VoIP, and application services |
US7933413B2 (en) * | 2007-02-02 | 2011-04-26 | Microsoft Corporation | Key exchange verification |
-
2003
- 2003-11-27 DE DE10355418A patent/DE10355418B4/de not_active Expired - Fee Related
-
2004
- 2004-11-09 EP EP04819236A patent/EP1687962A1/de not_active Withdrawn
- 2004-11-09 WO PCT/EP2004/052885 patent/WO2005053290A1/de not_active Application Discontinuation
- 2004-11-09 CN CNB2004800351074A patent/CN100459620C/zh not_active Expired - Fee Related
- 2004-11-09 US US10/580,954 patent/US8195958B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778071A (en) * | 1994-07-12 | 1998-07-07 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US6584562B1 (en) * | 1997-12-11 | 2003-06-24 | France Telecom | Device for securing a telephone link between two subscriber sets |
US6356638B1 (en) * | 1998-07-30 | 2002-03-12 | General Dynamics Decision Systems, Inc. | Radio wireline interface and method for secure communication |
Non-Patent Citations (5)
Title |
---|
DUTTA A ET AL: "Realizing mobile wireless Internet telephony and streaming multimedia testbed", COMPUTER COMMUNICATIONS, ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, NL, vol. 27, no. 8, May 2004 (2004-05-01), pages 725 - 738, XP004501203, ISSN: 0140-3664 * |
HYUN WOOK ET AL: "Study on robust billing mechanism for SIP-based internet telephony services", ADVANCED COMMUNICATION TECHNOLOGY, 2004. THE 6TH INTERNATIONAL CONFERENCE ON PHOENIX PARK, KOREA FEB. 9-11, 2004, PISCATAWAY, NJ, USA,IEEE, vol. 2, 9 February 2004 (2004-02-09), pages 756 - 759, XP010702560, ISBN: 89-5519-119-7 * |
LU W P ET AL: "SECURE COMMUNICATION IN INTERNET ENVIRONMENTS: A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION", IEEE TRANSACTIONS ON COMMUNICATIONS, IEEE INC. NEW YORK, US, vol. 37, no. 10, 1 October 1989 (1989-10-01), pages 1014 - 1023, XP000070200, ISSN: 0090-6778 * |
SCHNEIER B: "APPLIED CRYPTOGRAPHY, PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C", JOHN WILEY & SONS, 1996, NEW YORK, US, XP002322926, ISBN: 0-471-11709-9 * |
TANENBAUM A S: "COMPUTER NETWORKS, PASSAGE", COMPUTER NETWORKS, LONDON : PRENTICE-HALL INTERNATIONAL, GB, 1996, XP002322927, ISBN: 0-13-394248-1 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005069940A2 (en) | 2004-01-22 | 2005-08-04 | Cisco Technology, Inc. | Method and apparatus for transporting encrypted media streams over a wide area network |
EP1738508A2 (de) * | 2004-01-22 | 2007-01-03 | Cisco Technology, Inc. | Verfahren und vorrichtung zum transprotieren verschlüsselter mediaströme über ein grossflächiges netzwerk |
EP1738508A4 (de) * | 2004-01-22 | 2013-11-27 | Cisco Tech Inc | Verfahren und vorrichtung zum transprotieren verschlüsselter mediaströme über ein grossflächiges netzwerk |
WO2007059944A1 (de) * | 2005-11-23 | 2007-05-31 | Giesecke & Devrient Gmbh | Sichere voice-over-ip-telefonie |
WO2009048259A2 (en) * | 2007-10-09 | 2009-04-16 | Samsung Electronics Co., Ltd. | Method for efficiently providing key in a portable broadcasting system and system using the same |
WO2009048259A3 (en) * | 2007-10-09 | 2009-06-04 | Samsung Electronics Co Ltd | Method for efficiently providing key in a portable broadcasting system and system using the same |
US8428559B2 (en) | 2009-09-29 | 2013-04-23 | Christopher Anthony Silva | Method for recording mobile phone calls |
Also Published As
Publication number | Publication date |
---|---|
CN100459620C (zh) | 2009-02-04 |
US8195958B2 (en) | 2012-06-05 |
DE10355418B4 (de) | 2008-04-03 |
CN1886974A (zh) | 2006-12-27 |
US20070121582A1 (en) | 2007-05-31 |
DE10355418A1 (de) | 2005-07-07 |
EP1687962A1 (de) | 2006-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE10355418B4 (de) | Sicherheitsmodul zum Verschlüsseln eines Telefongesprächs | |
DE60118259T2 (de) | Erhaltung der Ende-zu-Ende-Synchronisation einer Fernmeldeverbindung | |
DE102006031080B4 (de) | Verfahren und Kommunikationsendgerät zum Bereitstellen von VoIP | |
EP2204039B1 (de) | Verfahren und kommunikations-endgerät zum austausch von daten während oder nach einer kommunikationsverbindung | |
EP1714473A1 (de) | Aufbau einer paketorientierten multimediaverbindung unter mitwirkung eines interactive voice responce systems | |
WO2013120501A1 (de) | Verfahren zum handhaben einer telekommunikationsverbindung, telekommunikationsanordnung, vermittlungseinrichtung und netzkopplungseinrichtung | |
EP1705889B1 (de) | Verfahren zum schnellen Aufbauen einer Nutzdatenverbindung zwischen Kommunikationsendeinrichtungen | |
DE60312332T2 (de) | Anrufsprungsystem, verfahren und vorrichtung | |
EP1847092A1 (de) | Verfahren zur aufschaltung auf verschlüsselte kommunikationsverbindungen in einem paketorientierten netzwerk | |
WO2005027487A1 (de) | Interworking von protokollen hybrider multimedianetze | |
EP1282280A1 (de) | Verfahren, Steuereinrichtung und Programmmodul zur Steuerung und Lenkung von Datenströmen einer Kommunikationsverbindung zwischen Teilnehmern eines Paketdatennetzes | |
EP1841161B1 (de) | Verfahren zur gesicherten Nutzdatenübertragung | |
EP1279272A2 (de) | Verfahren zum bereitstellen eines zusatz-dienstes für internet-benutzer | |
EP1867186B1 (de) | Poc-kommunikationssystem, verfahren zum übertragen einer poc-signalisierung und/oder von poc-daten sowie servervorrichtung dafür | |
EP2027670B1 (de) | Verfahren zum absichern von ip verbindungen für netzbetreiberzusammenschaltungen | |
DE102004002680A1 (de) | Adaptereinheit und Verfahren | |
EP1286508A1 (de) | Verfahren zur Übergabe eines Anrufs zwichen einem Telekommunikationsnetzwerk und einem Datennetzwerk | |
EP2016742B1 (de) | Verfahren und vorrichtung zum aufbau einer themenbezogenen kommunikationsverbindung | |
EP1152566B1 (de) | Verfahren zum Aufbau einer gesicherten Verbindung sowie Kommunikationsendgerät hierzu | |
DE102005056623A1 (de) | Mobile Vermittlungsvorrichtung und Verfahren zum Übertragen von Informationen zwischen wenigstens zwei Teilnehmern | |
EP2101468B1 (de) | Einbeziehung von Signalisierungsinformationen in ein Schlüsselmanagementprotokoll für den sicheren Medientransport | |
DE19914744A1 (de) | Verfahren zum Vermitteln von Sprach-Verkehrsbeziehungen zwischen einem Telefon-Kommunikationsnetz und einem Internet | |
DE102004029568A1 (de) | Vorrichtung zum Herstellen einer Kommunikationsverbindung wechselweise über ein Telefon- oder über ein Datennetz | |
Roedig et al. | 2GMD IPSI | |
EP1377004A1 (de) | Verfahren zum Aufbau einer Konferenzschaltung zwischen mehreren Teilnehmerendgeräten eines Kommunikationsnetzwerkes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480035107.4 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004819236 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007121582 Country of ref document: US Ref document number: 10580954 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004819236 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10580954 Country of ref document: US |