Browse Prior Art Database

Voice route server hyding the originator and destinator

IP.com Disclosure Number: IPCOM000014466D
Original Publication Date: 2000-Apr-01
Included in the Prior Art Database: 2003-Jun-19
Document File: 2 page(s) / 35K

Publishing Venue

IBM

Abstract

Current voice communications , using circuits or packets as transmission media are not totally secured. Only few people and equipments are able to encrypt the voice communication but the calling called people are easily identified with the current digital voice central exchanges.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 55% of the total text.

Page 1 of 2

Voice route server hyding the originator and destinator

Current voice communications , using circuits or packets as
transmission media are not totally secured. Only few people and
equipments are able to encrypt the voice communication but the
calling / called people are easily identified with the current
digital voice central exchanges.

    It is possible, using currently available technologies to
offer a more secure voice call between two end users.

    The proposed system for protecting voice communication over
a data network uses a set of secure voice servers located on
internet or intranet.

    End users stations or phones using
voice over IP (VoIP) as communication
protocol are able to protect both their
identity (calling number)and the called
number corresponding to the identity of
the call destination thanks to the use of
these secure voice servers.

    When is call setup is established to
any destination, a secure communication
tunnel is established between the end user
station and the local or closest voice
server . No called number is provided
until this secure tunnel can be used.

    On another hand, all secure voice
servers have permanent secure
communication channels or tunnels between
themselves.

    Once a secure tunnel , for example an
IPSec tunnel, is established between the
calling end user station and a secure
voice server, the latter will receive the
called number and identify which other (or
itself) is the closest secure voice server
for this destination number. It will
propagate the call setu...