The present invention concerns communication systems. In particular the invention relates to encrypted communication systems whereby the communications link is always at least partially encrypted and recipient contact numbers are kept secret.
Communication links such as those made on mobile or landline phones between a user and a recipient are usually initiated by the user dialling the real contact number of the desired recipient.
It may be required in certain circumstances to send voice or data information to one or more recipients via secure communication links as standard ‘open’ communications may be intercepted by unwanted parties. Such a situation may arise when a mobile phone user is travelling in a country where third parties may wish to ‘spy on the users’ communications. The desirable characteristics of secure communications links include both data content and contact number anonymity. To facilitate secure communication links, data or voice calls are often encrypted. Standard encryption systems work on the principle of key sharing whereby the communication contents are coded upon transmission and decoded after reception using a key shared between the user device and recipient device.
To facilitate encryption in the above systems, both the user and the recipient necessarily require means for encryption and decryption. If a user wants to contact a recipient device without such encryption means, the whole communication link must be made using standard open communications which are subject to interception. Additionally, for mobile phone systems, the recipient numbers are often stored on the mobile phone in a phone list accessible by any user of the phone. Even if a phone call is made using encrypted communications, a security threat remains if the mobile device is stolen. In such a circumstance, the thief may be able to gain access to the recipient contact numbers stored on the phone memory. This situation may pose a significant problem when the recipient contact numbers themselves are intended to be kept confidential.
Several techniques and systems exist that facilitate encrypted communications, also systems exist that protect a phone number. Existing examples of both systems are described as follows.
An example of an existing secure number system can be found at the website https://www.flextel.ltd.uk/cgi-bin/secure.sh. Here, a user of the system chooses a number from a list of phone numbers that are not attached to any landline, mobile or physical location. The user affiliates this chosen number to the actual existing phone number that the user wants to receive calls on, for example a landline or mobile number. A chosen number sits in front and protects the existing number. The chosen number is an unchanging number that allows the user to receive incoming calls at any normal telephone wherever the user may be. In this secure number system however, a third party may still be able to intercept and spy on the call content.
An example of an existing technology facilitating an encrypted communication system can be found at the website http://www.tripleton.com/product_security_T301B.htm. The website describes a mobile phone capable of making secure calls to and from mobile phones or other devices such as landlines equipped with compatible encryption technology such as that described in http://www.tripleton.com/product_security_LineCrypt_I_plus.htm. In this system, to make secure communications, the mobile or landline devices require the connecting recipient device to have compatible encryption technology. The number used to initiate the call is the same number used to dial the recipient device.
It is desirable in secure communications to encrypt the content of a communication and also to protect the identity of the real number of the caller and/or the recipient receiving the call.
It is an object of the present invention to provide a secure communications system wherein communication is encrypted at least between a user device and an intermediary device, regardless of whether or not a recipient device has access to compatible encryption technology. Another object of the present invention is to provide recipient contact number anonymity at least between the user device and the intermediary.
According to the present invention, a secure communication system, includes a communications network; a user device connectable to the network; a recipient device connectable to the network and having a recipient contact number; encryption/decryption means in the user device and operative after connection; and an intermediary device connectable to the network having an intermediary contact number and complimentary encryption/decryption means to the user device encryption/decryption means; the intermediary device is operative to connect to the user device therefrom a communication initiated using the intermediary contact number, enable the encryption/decryption means in the intermediary device, securely obtain a recipient contact number using a communication made to the intermediary device by the user device, and enable connection between the user and recipient devices.
Only the initial contact between the user and the intermediary device is a standard ‘open’ communication, all other communications including the recipient contact number are encrypted, at least, from the user device to the intermediary device and irrespective of whether the recipient device comprises means for encryption/decryption. An encrypted or open communication link exists between the intermediary device and the recipient device.
The secure communications system may further include a caller device, the user device having a user contact number, the intermediary device being further operative to connect to the caller device upon request therefrom a communication initiated using the intermediary contact number, securely obtain a user contact number from a communication made to the intermediary device by the caller device and enable an encrypted connection between the intermediary device and user device.
Also according to the present invention is a method of making secure communications in a communications network having a user device connectable to the network, a recipient device connectable to the network and having a recipient contact number, an encryption/decryption means in the user device operative after connection; comprising connecting an intermediary device to the network, providing the intermediary device with an intermediary contact number and complimentary encryption/decryption means to the user device encryption/decryption means and operating the intermediary device to connect to the user device upon a call therefrom initiated using the intermediary contact number, enabling the encryption/decryption means in the intermediary device, securely obtaining a recipient contact number using a communication made to the intermediary device from the user device and enabling connection between the user and recipient devices.
In a preferred embodiment, the intermediary device is a server comprising a database operative to store and concatenate one or more recipient contact numbers with one or more dummy contact numbers and/or recipient identifiers, the server further being operative to receive the dummy contact number or recipient identifier from the user device, obtain a concatenated recipient contact number from the database and enable connection between the user device and the recipient device associated with the concatenated recipient contact number. The present invention additionally overcomes the above recipient number security risk by allowing the real recipient numbers to be stored on the server rather than on the user device itself.
According to a first embodiment of the present invention the dummy contact numbers are unencrypted server contact numbers, the recipient contact number being obtained from the dummy contact number.
According to a second embodiment of the present invention the recipient contact numbers are encrypted and obtained from the user device.
According to a third embodiment of the present invention the dummy contact number or recipient identifier is encrypted and obtained from the user device.
The server may receive the dummy contact number, recipient contact number or recipient identifier by a vocal command. In this case, the server comprises voice recognition technology operating in use to obtain the recipient contact number or the dummy contact number or the recipient identifier from the vocal command.
The user device and/or recipient device and/or caller device may be; a wireless phone, and/or a non-wireless phone, and/or, any other communications device utilizing electronic/electromagnetic means.
The user device preferably comprises network communication equipment, a memory unit, a processor unit, encryption technology, control software and optionally voice recognition technology, the user device being operative to; connect to the server upon request thereto, enable the encryption means and provide dummy contact numbers, recipient identifiers or recipient contact numbers to the server.
The intermediary device for the system comprises a memory unit, a processor unit, network communication equipment, a database, encryption technology and optionally voice recognition technology. The database of the intermediary device comprises a user group table comprising user contact numbers and, optionally, a recipient group table comprising recipient contact numbers.
Further features of the invention are as set out in the claims and are exemplified in the following illustrative description with reference to the drawings.
The above and further features of the present invention are described with reference to the Drawings, wherein:—
and,
It is desirable that a user may use an encrypting communication device 2 for secure communication with a recipient device 4 by either directly dialling the recipient contact number, as per the current state of the art, or by utilizing the system 6 and methods of the present invention. In accordance with the present invention, the user of the user device 2 is provided with an option of making a communication to a recipient with at least a part-way secure connection to the recipient device 4 regardless of whether of not the recipient device 4 comprises hardware or software to enable secure communications. Secure communications are realized using encrypted means such as encryption/decryption technology 8 embodied in hardware and/or software. The system 6, as shown in
The server 10, as shown in
The server 10 securely obtains a recipient contact number according to any of the embodiments described in this application, and then establishes an ongoing communication link with the recipient device 4, using this recipient contact number 120 to complete the full-way communication link. The minimum, part-way encrypted link 122 from the user device 2 to the server 10 as shown in
The present invention thus gives the user the flexibility of calling any recipient number available on conventional accessible networks 12 with the added feature of the first part of the communication circuit between the user device and the server being securely encrypted. This is particularly advantageous when the user is located in territories where security threats exist.
The server 10 may securely obtain the desired recipient contact number by different methods. Each method however is similar in that the recipient contact number is not used to make the initial call to the server 10. Each method is further described in the following preferred embodiments.
In the first embodiment, the method of which is represented by the flow diagram in
In the second and third embodiments, the methods of which are represented in the flow diagrams of
Alternatively in the second and third above embodiments, the user may issue a vocal command through the user device 2 corresponding to the recipient that the user wishes to make contact with. This vocal command may be a recipient name or number, which the server 10, using voice recognition technology, then obtains the recipient contact number or the dummy contact number or the recipient identifier. Additionally the vocal command may also be used to verify the identity of the user using the voice recognition technology. In both the second and third embodiments, once the recipient contact number is recalled 116, the server 10 then causes the communication to be routed to the recipient device 4 using the recipient contact number 120 such that the user device 2 and recipient device 4 are then connected.
In all the above preferred embodiments, voice recognition technology may also be included within the user device to further implement identity verification. Voice recognition technology on the user device may also be used to concatenate the vocal command by the user to a recipient name, recipient contact number, recipient identifier or dummy contact number, from which the user device implements the above preferred embodiments of the present invention.
In all the above preferred embodiments, part-way encryption 122 between the user device 2 and server 10 is provided, regardless of any encryption technology 8 of the recipient device 4.
When a communication is intended from a third party or a ‘caller’ to the user, the caller may optionally dial, on a caller device, the user contact number or a user dummy number associated with the user contact number. If the user contact number is dialled, the communication is connected through routes other than the system 6. If however the user dummy number is dialled, the network 12 handling this initial communication, such as a PSTN, recognises the user dummy number as being affiliated to the system 6 and routes the call to the server 10. This first initial connection to the server 10 may be a conventional open connection or an encrypted connection depending on the existence and compatibility of the encryption technology 8 between the server 10 and the caller device.
Once this initial connection from the caller is established, the server 10 then cross references the user dummy number with the associated user contact number. The user dummy number is the number associated by the system 6 to the user device 2 that is not the real user contact number. The server 10 then dials the concatenated user contact number and makes an encrypted connection with the user device 2, thus connecting the caller device to the user device 2. In this manner, the identity of the user contact number of the user device 2 is secure in the initial communication between the caller device and the server 10. The system 6 still provides at least part-way encryption between the server 10 and the user device 2 regardless of the initial communication method between the caller device and the server 10.
The system 6 may further comprise a call handling subsystem 16 (
A user device 2 as shown in
In use, as shown in
The server 10 of the present invention, as shown in
The recipient device 4 may also encompass the encryption/decryption technology 8 and other features of the user device 2 of the system 6 as shown in
Number | Date | Country | Kind |
---|---|---|---|
0712022.3 | Jun 2007 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/GB08/02083 | 6/18/2008 | WO | 00 | 12/18/2009 |