发明名称 SECURE COMMUNICATION METHOD
摘要 A first computing device receives over a telecommunications network from a second computing device a verification message encrypted using a public key. The verification message is generated by the second computing device when initiating a call to the first computing device. The first computing device transmits to a wireless router via a wireless local area network (WLAN) created by the wireless router, the encrypted verification message. The first computing device receives from the wireless router over the WLAN, a decrypted verification message decrypted from the encrypted message by the wireless device using a private key associated with the public key. The first computing device transmits over the telecommunications network to the second computing device, the decrypted verification message. If the second computing device determines that the decrypted verification message corresponds to the encrypted verification message, the second computing device allows the call to the first computing device to proceed.
申请公布号 US2014195806(A1) 申请公布日期 2014.07.10
申请号 US201414176196 申请日期 2014.02.10
申请人 International Business Machines Corporation 发明人 Kritt Barry A.;Rakshit Sarbajit K.
分类号 H04W12/04 主分类号 H04W12/04
代理机构 代理人
主权项 1. A method for providing secure communication, the method comprising: a first computing device to receive, over a network from a second computing device, a verification message generated by the second computing device in association with initiating a communication to the first computing device over the network, wherein the verification message is encrypted by the second computing device using a first cryptographic key; the first computing device transmitting to a wireless device via a wireless channel between the first computing device and the wireless device, the encrypted verification message, wherein the first computing device is located within a geographical area that is fixed by a location of the wireless device and defined by a signaling range of the wireless device; the first computing device receiving, from the wireless device over the wireless channel, a decrypted verification message decrypted from the encrypted verification message by the wireless device using a second cryptographic key associated with the first cryptographic key; and the first computing device transmitting over the network to the second computing device, the decrypted verification message, wherein if the second computing device determines that the decrypted verification message matches the verification message, the second computing device allows the communication to the first computing device to proceed.
地址 Armonk NY US