FIELD: communication equipment.
SUBSTANCE: invention relates to a method of organizing voice communication with end-to-end encryption and user authentication. Method includes registration and authentication of communication users by initiators of communication and responders, loading key information on all devices, preparing the voice communication headset for operation, initializing the application on user devices, synchronizing contacts of the user device and the initialized application, controlling voice communication using an initialized application, including sending a call, responding to an incoming call and dropping an incoming call, as well as pairing and connecting a user device with a voice communication headset, wherein during user registration, a telephone number, an e-mail address are indicated and a unique user identifier is assigned, while in preparation for operation, the users headsets are connected to the administrator computer using trusted connections, random bit sequences unique for each headset, as well as information necessary for mutual authentication of devices during operation of the headsets in the system, are loaded onto the headsets, after that, the administrator computer, in interaction with the headsets, generates headset certificates, wherein the private keys are known only to the headsets, and in the process of organizing voice communication between headsets, a direct secure connection is established using end-to-end encryption, wherein the initiator user device transmits data from the initiator headset to the address of the responder headset through the user device of the responder without their additional processing on user devices of the initiator and the responder.
EFFECT: high level of security of the voice communication process.
4 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS | 2001 |
|
RU2297037C2 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
COMPUTER SYSTEM WITH REMOTE MANAGEMENT OF SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT | 2017 |
|
RU2690782C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
METHOD AND SYSTEM FOR TRUSTED LOADING OF COMPUTING DEVICE OPERATING SYSTEM | 2021 |
|
RU2773456C1 |
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS | 2005 |
|
RU2378773C2 |
COMPUTER-IMPLEMENTED METHOD OF PROVIDING SECURE GROUP COMMUNICATIONS WITH FAILURE PROPERTIES, PERFECT DIRECT PRIVACY AND CORRESPONDENCE OF TEXT OF CORRESPONDENCE | 2018 |
|
RU2693192C1 |
SINGLE NETWORK LOGIN DISTRIBUTED SERVICE | 2006 |
|
RU2417422C2 |
Authors
Dates
2024-05-21—Published
2023-10-10—Filed