WO2005083972A1 - Set of equipment for secure direct information transfer over the internet - Google Patents
Set of equipment for secure direct information transfer over the internet Download PDFInfo
- Publication number
- WO2005083972A1 WO2005083972A1 PCT/HU2004/000101 HU2004000101W WO2005083972A1 WO 2005083972 A1 WO2005083972 A1 WO 2005083972A1 HU 2004000101 W HU2004000101 W HU 2004000101W WO 2005083972 A1 WO2005083972 A1 WO 2005083972A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transmitting terminal
- information transmitting
- unit
- register
- key
- Prior art date
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 7
- 238000004891 communication Methods 0.000 description 5
- 230000000977 initiatory effect Effects 0.000 description 5
- 238000010276 construction Methods 0.000 description 3
- 230000002349 favourable effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/253—Telephone sets using digital voice transmission
- H04M1/2535—Telephone sets using digital voice transmission adapted for voice communication over an Internet Protocol [IP] network
Definitions
- the subject of the invention is a set of equipment for secure direct information transfer over the Internet, which contains information transmitting terminal devices suitable for collaborating with an information forwarding network, taking part in the information traffic, the individual information transmitting terminal devices are equipped with a sender partial unit, a receiver partial unit and a storage partial unit comprising an ID-register containing a device identification signal, a C-register suitable for storing a coding key and a D-register suitable for storing a decoding key, where the C-register containing the coding key is in connection with the sender partial unit, and a coding key and a collaborating decoding key are allocated to the individual information transmitting terminal devices.
- a further disadvantage is that for a cost friendly solution, beside the Internet accessibility of the calling and the called party, traditional telephone connection is also needed, and even individual special private branch exchanges need to be established, which results in a significant increase of the investment costs and also requires further operation and maintenance expenses.
- Another significant disadvantage of the solution is that the encryption of the data traffic connection is not solved, and so the traffic can be tapped, it is easily accessible for unauthorised third parties, and by this the established signal forwarding line cannot be used for transmitting optional data.
- a further disadvantage is that in this case the users must log in the system themselves, and then they must send the central unit a password, which was given to them, so other parties may also know it, and because of the possibility of using a password accessible to other parties confidential data traffic becomes uncertain, and it becomes questionable whether this channel can be used exclusively by a given device or user.
- the idea behind the invention is based on the recognition that if a suitably constructed central computer unit and terminal devices suitable for establishing Internet-based connection are provided with coding and decoding keys in a way different from the known solutions, then a situation can be achieved where Internet-based communication can be realised in the course of which the sound, still picture, moving picture, signal or other data traffic between the calling party and the called party in connection with each other takes place in an encrypted way impossible to disassemble from the time when the connection is established until it is ended, so that the users of the system do not have any encryption keys or passwords that could be appropriated and by this could endanger the integrity of the network, furthermore the central computer unit in itself is suitable for controlling and managing communication between the terminal devices, and so the task can be solved.
- the set of equipment according to the invention for secure direct information transfer over the Internet, - which contains information transmitting terminal devices suitable for collaborating with an information forwarding network, taking part in the information traffic, the individual information transmitting terminal devices are equipped with a sender partial unit, a receiver partial unit and a storage partial unit comprising an ID-register containing a device identification signal, a C-register suitable for storing a coding key and a D-register suitable for storing a decoding key, where the C- register containing the coding key is in connection with the sender partial unit, and a coding key and a collaborating decoding key are allocated to the individual information transmitting terminal devices, - is constructed in a way that the storage partial unit of each information transmitting terminal device is completed with one or more temporary storage registers for the temporary storage of the coding keys of other information transmitting terminal devices, while the information forwarding network is completed with at least one central traffic coordinating unit, the central traffic co-ordinating unit has an MD-register storing a master decoding
- a further criterion of the set of equipment according to the invention may be that the temporary storage registers of the information transmitting terminal devices are connected to the sender partial unit.
- the central traffic coordinating unit is provided with an MC-register storing a master coding key.
- the greatest advantage of the set of equipment according to the invention is that with its use connection between the calling party and the called party can be established with simple means, as in the case of ordinary telephone use, but the costs of information flow are significantly lower, while it is guaranteed that the flow of data remains encrypted during the complete period of the connection.
- a further favourable characteristic of the invention is that the data traffic between the two end points does not take place through a central exchange, which accelerates the flow of information and improves the security of the system, makes the data impossible to disassemble and makes the system impossible to tap.
- a further advantage is that the set of equipment can be installed independently from the manufacturer so that the terminal devices and the central computer unit is uploaded with key pairs by a given operator, and so a closed network can be created, which makes communication possible only for a certain group of users.
- Figure 1 shows a schematic picture of the arrangement of the set of equipment according to the invention.
- Figure 1 shows a version of the set of equipment according to the invention, in the case of which - for the sake of simplicity - only one call initiating information transmitting terminal device 10 and one call receiving information transmitting terminal device 20 is detailed.
- the set of equipment can contain an optional number of information transmitting terminal devices 10. The number of information transmitting terminal devices is only restricted by the capacity of the central traffic co-ordinating unit 40.
- the information forwarding network 30 can be an optional communication network, which in this case can mean a wired or wireless, private or public network.
- the only requirement with respect to the information forwarding network 30 is that it should be suitable for transmitting the signals to be forwarded at a high data rate used in telecommunication, possibly free from distortion.
- the central traffic co-ordinating unit 40 is a high-capacity computer device, which has an MC-register 41 and an MD-register 42 on the one part and contains a memory unit 43 on the other part.
- the MC-register 41 there is a master coding key 41a
- the MD-register 42 there is a master decoding key 42a.
- This unique key- pair enables the information transmitting terminal device 10 and the information transmitting terminal device 20 to realise encrypted data traffic with the central traffic co-ordinating unit 40.
- the memory unit 43 of the central traffic co-ordinating unit 40 there is a base cell 43a and another base cell 43b, in which the coding key 16 of the information transmitting terminal device 10 and the coding key 26 of the information transmitting terminal device 20 can be found in a resident way.
- the master coding key 41a and the MC- register 41 containing it 41 does not necessarily have to be situated in the central traffic coordinating unit 40.
- the MC-register and the master coding key 41a can be situated remote from the central traffic co-ordinating unit so that the master coding key 41a and the master decoding key 42a are not accessible on the same place.
- the information transmitting terminal device 10 has a keyboard, microphone and sound emitter - not shown here - and apart from these it also has a storage partial unit 11, a sender partial unit 18 and a receiver partial unit 19.
- the storage partial unit 11 also has an ID-register 12 for recording the device identification signal 12a and a D-register 14 containing the information transmitting terminal device's 10 own decoding key 17.
- the C-register 13 suitable for the temporary or permanent storage of the master coding key 41a of the central traffic co-ordinating unit 40 also belongs here, as well as the temporary storage register 15, which is responsible for storing the coding key 26 of the other terminal device performing actual data traffic - in our case this is the information transmitting terminal device 20 - during the connection. Practically the temporary storage register 15 of the information transmitting terminal device 10 should be connected to the sender partial unit 18.
- the structural construction of the information transmitting terminal device 20 is the same as that of the information transmitting terminal device 10. Similarly to traditional telephone sets it also has a keyboard, microphone and sound emitter - not shown here either - and a storage partial unit 21, a sender partial unit 28 and a receiver partial unit 29.
- the ID-register 22, the D-register .24 and the temporary storage register 25 belong to the storage partial unit 21.
- the ID-register records the unique device identifying signal 22a of the information transmitting terminal device 20, while the D-register 24 carries the information transmitting terminal device's 20 own decoding key 27.
- the coding key 16 of the currently connected information transmitting terminal device 10 - in our case - can be found in the temporary storage register 25.
- the C-register 23 is for the temporary or permanent storage of the master coding key 41a. From the aspect of the information transmitting terminal device 20 it is favourable, if the temporary storage register 25 is in connection with the sender register 28.
- the information transmitting terminal device 10 acts as the call initiating unit, and the information transmitting terminal device 20 acts as the called unit, but the set of equipment is also suitable for establishing several signal forwarding connections simultaneously, that is for establishing so-called conference connection.
- the master decoding key 41a recorded in its MD-register 42
- the central traffic co-ordinating unit 40 disassembles the message coded with the master coding key 41a.
- the information transmitting terminal device 10 On the one part on the basis of the content of the message it identifies the information transmitting terminal device 10 on the basis of its own device identifying signal 12a, and on the other part it checks whether an information transmitting terminal device 20 really belongs to the received device identifying signal 22a, and if yes, according to the device identifying signal 22a it finds the coding key 26 of the information transmitting terminal device 20 in the base cell 43b of the memory unit 43.
- the central traffic co-ordinating unit 40 encrypts the coding key 26 of the information transmitting terminal device 20 with the help of the coding key 16 of the information transmitting terminal device 10 and sends it to the receiver partial unit 19 of the information transmitting terminal device 10.
- the receiver partial unit 19 of the information transmitting terminal device 10 disassembles the received information with the help of its decoding key 17 and by this it gains temporary access to the coding key 26 of the information transmitting terminal device, which it stores in the temporary storage register 15 of the information transmitting terminal device.
- the call initiating information transmitting terminal device 10 tries to get in contact with the information transmitting terminal device 20 through the information forwarding network 30. If the information transmitting terminal device 10 cannot get in contact with the information transmitting terminal device 20 belonging to the device identifying signal 22a, then the connection cannot be established.
- the information transmitting terminal device 10 In the case that the information transmitting terminal device 10 has managed to get in contact with the information transmitting terminal device 20, then it sends its own device identifying signal 12a encrypted with the coding key 26 of the information transmitting terminal device 10 to the information transmitting terminal device 20.
- the information transmitting terminal device 20 disassembles it with its own decoding key 27 and then coding it with the help of the master coding key belonging to the central traffic coordinating unit 40 it sends it through the information forwarding network 30 to the central traffic co-ordinating unit 40, and requests the coding key 16 of the information transmitting terminal device 10 from it.
- the central traffic co-ordinating unit 40 selects the coding key 16 of the information transmitting terminal device from the base cell 43 a of the memory unit 43. Then the central traffic co-ordinating unit 40 encrypts the coding key 16 of the information transmitting terminal device 10 with the help of the coding key 26 of the information transmitting terminal device 20, and sends it to the information transmitting terminal device 20.
- the information transmitting terminal device 20 receives the encrypted message sent by the central traffic co-ordinating unit 40 in its receiver partial unit 29, disassembles it with its own decoding key 27 as a result of which it gets to know the coding key 16 of the call initiating information transmitting terminal device 10, which it stores temporarily in the temporary storage register 25 of the information transmitting terminal device 20 in a way impossible to read.
- the information transmitting terminal device 10 can encrypt its information to be sent to the information transmitting terminal device 20 with the help of the coding key 26, so that now the information can be sent through the sender partial unit 18 straight to the information transmitting terminal device 20, which in its receiver partial unit 29 receives the data sent from the sender partial unit 18 of the information transmitting terminal device 10 through the information forwarding network 30 - and coded with the coding key 26 of the information transmitting terminal device 20 - it can disassemble it and so it becomes easily interpretable for the person or equipment using the information transmitting terminal device 20.
- the information transmitting terminal device 20 can answer the information received from the information transmitting terminal device 10 so that it encrypts the data it intends to send with the help of the coding key 16 situated in the temporary storage register 25, sends it to the sender partial unit 28, from there to the information forwarding network 30, and then it is directly furthered to the receiver partial unit 19 of the information transmitting terminal device 10. It tries to disassemble the data arriving at the receiver partial unit 19 with the decoding key 17 of the information transmitting terminal device 10, and it succeeds, then the data can be easily interpreted by the person or equipment using the information transmitting terminal device 10.
- This direct signal traffic between the information transmitting terminal device 10 and the information transmitting terminal device 20 through the information forwarding network is realised in a way that the central traffic co-ordinating unit 40 does not take part in it.
- the information transmitting terminal device 10 and the information transmitting terminal device 20 temporarily get to know each other's coding key 16 and coding key 26, and they are able to realise direct information exchange.
- the coding key 26 situated in the temporary storage register 15 of the information transmitting terminal device 10 is deleted, and the same happens with the coding key 16 situated in the temporary storage register 25 of the information transmitting terminal device 20.
- the information transmitting terminal device 20 After finishing the call of the information transmitting terminal device 10, in the information transmitting terminal device 20 only its own decoding key 27 situated in the D- register 24 and the master coding key 41a situated in the C-register 23 remain. At the same time the information transmitting terminal device 10 only keeps its own decoding key 17 situated in the D-register 14 and the master coding key 41a situated in the C-register 13.
- the information transmitting terminal device 20 and the central traffic co-ordinating unit 40 do not get in a position even for a moment when they have a coding-decoding key pair belonging together at the same time. So it is not possible for anyone of the users of the set of equipment to have access to the coding key 16 and the decoding key 17, or the coding key 26 and the decoding key 27 at the same time.
- the central traffic co-ordinating unit 40 is able to store and administrate network addresses needed for network access, determined by the characteristics of the information forwarding network 40, and forward the addresses needed for establishing connection towards the information transmitting terminal devices 10 and 20.
- the central traffic co-ordinating unit 40 does not contain the master coding key 41a and the master decoding key 42a at the same time. Knowing only one member of the coding-decoding key pairs makes it impossible to decrypt encrypted messages.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Information Transfer Between Computers (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SI200430671T SI1730920T1 (en) | 2004-03-01 | 2004-11-02 | Set of equipment for secure direct information transfer over the internet |
DK04798739T DK1730920T3 (en) | 2004-03-01 | 2004-11-02 | Equipment device for secure, direct information transmission over the Internet |
JP2007501359A JP4586065B2 (en) | 2004-03-01 | 2004-11-02 | Secure direct information transfer device on the Internet |
US10/591,541 US8208638B2 (en) | 2004-03-01 | 2004-11-02 | Set of equipment for secure direct information transfer over the internet |
CA2557912A CA2557912C (en) | 2004-03-01 | 2004-11-02 | Set of equipment for secure direct information transfer over the internet |
EP04798739A EP1730920B1 (en) | 2004-03-01 | 2004-11-02 | Set of equipment for secure direct information transfer over the internet |
DE602004011402T DE602004011402T2 (en) | 2004-03-01 | 2004-11-02 | DEVICE ARRANGEMENT FOR THE PROTECTION OF DIRECT INFORMATION TRANSMISSION OVER THE INTERNET |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
HU0400489A HU226781B1 (en) | 2004-03-01 | 2004-03-01 | Device set for secure direct information transmission over internet |
HUP0400489 | 2004-03-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005083972A1 true WO2005083972A1 (en) | 2005-09-09 |
Family
ID=89982024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/HU2004/000101 WO2005083972A1 (en) | 2004-03-01 | 2004-11-02 | Set of equipment for secure direct information transfer over the internet |
Country Status (12)
Country | Link |
---|---|
US (1) | US8208638B2 (en) |
EP (1) | EP1730920B1 (en) |
JP (1) | JP4586065B2 (en) |
AT (1) | ATE384391T1 (en) |
CA (1) | CA2557912C (en) |
CY (1) | CY1107409T1 (en) |
DE (1) | DE602004011402T2 (en) |
DK (1) | DK1730920T3 (en) |
ES (1) | ES2300847T3 (en) |
HU (1) | HU226781B1 (en) |
PT (1) | PT1730920E (en) |
WO (1) | WO2005083972A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10616177B2 (en) | 2015-03-31 | 2020-04-07 | Willie L. Donaldson | Secure dynamic address resolution and communication system, method, and device |
US10110552B2 (en) | 2015-03-31 | 2018-10-23 | Willie L. Donaldson | Secure dynamic address resolution and communication system, method, and device |
US10110580B2 (en) * | 2015-03-31 | 2018-10-23 | Willie L. Donaldson | Secure dynamic address resolution and communication system, method, and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
WO1999062222A2 (en) | 1998-05-27 | 1999-12-02 | Telia Ab (Publ) | Method for safe telephony with mobility in a tele and data communications system which includes an ip-network |
WO2000041383A1 (en) | 1999-01-08 | 2000-07-13 | Ranalli Douglas J | Method and apparatus for correlating a unique identifier, such as a pstn telephone number, to an internet address to enable communications over the internet |
US6240514B1 (en) * | 1996-10-18 | 2001-05-29 | Kabushiki Kaisha Toshiba | Packet processing device and mobile computer with reduced packet processing overhead |
EP1328101A2 (en) | 2002-01-10 | 2003-07-16 | Avaya Technology Corp. | Method and apparatus for secure internet protocol communication in a call processing system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6346028A (en) * | 1986-08-13 | 1988-02-26 | Kokusai Denshin Denwa Co Ltd <Kdd> | Cryptographic key distribution system |
US5161193A (en) * | 1990-06-29 | 1992-11-03 | Digital Equipment Corporation | Pipelined cryptography processor and method for its use in communication networks |
FR2746566B1 (en) * | 1996-03-21 | 1998-04-24 | Alsthom Cge Alcatel | METHOD FOR ESTABLISHING SECURE COMMUNICATIONS AND RELATED ENCRYPTION / DECRYPTION SYSTEM |
US6219786B1 (en) * | 1998-09-09 | 2001-04-17 | Surfcontrol, Inc. | Method and system for monitoring and controlling network access |
ES2379863T3 (en) * | 2000-03-03 | 2012-05-04 | Qualcomm Incorporated | Procedure, system and apparatus for participating in group communications services in an existing communications system |
US7228427B2 (en) * | 2000-06-16 | 2007-06-05 | Entriq Inc. | Method and system to securely distribute content via a network |
-
2004
- 2004-03-01 HU HU0400489A patent/HU226781B1/en not_active IP Right Cessation
- 2004-11-02 JP JP2007501359A patent/JP4586065B2/en not_active Expired - Fee Related
- 2004-11-02 US US10/591,541 patent/US8208638B2/en not_active Expired - Fee Related
- 2004-11-02 PT PT04798739T patent/PT1730920E/en unknown
- 2004-11-02 CA CA2557912A patent/CA2557912C/en not_active Expired - Fee Related
- 2004-11-02 DE DE602004011402T patent/DE602004011402T2/en active Active
- 2004-11-02 WO PCT/HU2004/000101 patent/WO2005083972A1/en active IP Right Grant
- 2004-11-02 DK DK04798739T patent/DK1730920T3/en active
- 2004-11-02 EP EP04798739A patent/EP1730920B1/en active Active
- 2004-11-02 ES ES04798739T patent/ES2300847T3/en active Active
- 2004-11-02 AT AT04798739T patent/ATE384391T1/en active
-
2008
- 2008-04-15 CY CY20081100413T patent/CY1107409T1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US6240514B1 (en) * | 1996-10-18 | 2001-05-29 | Kabushiki Kaisha Toshiba | Packet processing device and mobile computer with reduced packet processing overhead |
WO1999062222A2 (en) | 1998-05-27 | 1999-12-02 | Telia Ab (Publ) | Method for safe telephony with mobility in a tele and data communications system which includes an ip-network |
WO2000041383A1 (en) | 1999-01-08 | 2000-07-13 | Ranalli Douglas J | Method and apparatus for correlating a unique identifier, such as a pstn telephone number, to an internet address to enable communications over the internet |
EP1328101A2 (en) | 2002-01-10 | 2003-07-16 | Avaya Technology Corp. | Method and apparatus for secure internet protocol communication in a call processing system |
Also Published As
Publication number | Publication date |
---|---|
CA2557912C (en) | 2012-08-21 |
HU226781B1 (en) | 2009-10-28 |
CY1107409T1 (en) | 2012-12-19 |
EP1730920B1 (en) | 2008-01-16 |
PT1730920E (en) | 2008-04-17 |
DK1730920T3 (en) | 2008-05-26 |
EP1730920A1 (en) | 2006-12-13 |
JP2007525918A (en) | 2007-09-06 |
CA2557912A1 (en) | 2005-09-09 |
JP4586065B2 (en) | 2010-11-24 |
DE602004011402T2 (en) | 2009-01-08 |
ATE384391T1 (en) | 2008-02-15 |
US20070277030A1 (en) | 2007-11-29 |
HUP0400489A2 (en) | 2005-11-28 |
US8208638B2 (en) | 2012-06-26 |
ES2300847T3 (en) | 2008-06-16 |
DE602004011402D1 (en) | 2008-03-06 |
HU0400489D0 (en) | 2004-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104333455B (en) | A kind of smart mobile phone secret signalling and method | |
US20090025075A1 (en) | On-demand authentication of call session party information during a telephone call | |
CN101197674A (en) | Encrypted communication method, server and encrypted communication system | |
US8953771B2 (en) | Method and apparatus to provide cryptographic identity assertion for the PSTN | |
CN101719825A (en) | Method and system for realizing safe bifurcation call session in IP multimedia subsystem | |
CN101188498B (en) | Communication terminal and communication method | |
US20100177899A1 (en) | Encrypted communication system | |
CN101904148B (en) | Method and arrangement for network roaming of corporate extension identities | |
CN1972278B (en) | A method for implementing safe remote video monitoring | |
CA2557912C (en) | Set of equipment for secure direct information transfer over the internet | |
CN103139774B (en) | Short message service processing method and short message service treatment system | |
CN101937584A (en) | Method for generating passwords of access control system | |
AU772998B2 (en) | Internal line control system | |
JPH11507782A (en) | Method and apparatus for transmitting secret connection establishment information and service information between a subscriber terminal and one or more digital exchanges | |
CN110035089A (en) | A kind of network security verification method and system of distributed system | |
CN102113301A (en) | Access management for connection-accompanying data of telecommunication connections | |
JP2007013254A (en) | Speech recording method and system in ip telephon call | |
KR100385860B1 (en) | Caller Identification Method Using Public CA In The PC-To-Phone Environment | |
US8023625B2 (en) | Communication system and voice mail apparatus | |
CN101677313A (en) | Internet computer software lock method and service system thereof | |
CN101420494B (en) | Method and apparatus for establishing session connection for prepaid user | |
CN1322702C (en) | Identificaton method of internet protocol speech sound cut-in equipment | |
KR20040026220A (en) | Apparatus and method for preventing a forgery/an alteration of a conversation data in computer telephony integration | |
CN1889706B (en) | Method for raising interoffice transfer content security in soft exchange | |
WO2012022992A2 (en) | Encryption system for protecting phone calls |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2557912 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10591541 Country of ref document: US Ref document number: 2007501359 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004798739 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004798739 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10591541 Country of ref document: US |
|
WWG | Wipo information: grant in national office |
Ref document number: 2004798739 Country of ref document: EP |