US 12,149,342 B2
Randomly-modified first network to second network communication
Matthew Lazzaro, Churchville, MD (US); and William Toth, Ocean, NJ (US)
Assigned to The Government of the United States, as represented by the Secretary of the Army, Washington, DC (US)
Filed by The Government of the United States, as represented by the Secretary of the Army, Washington, DC (US)
Filed on Jun. 26, 2023, as Appl. No. 18/213,910.
Application 18/213,910 is a division of application No. 17/499,923, filed on Oct. 13, 2021, granted, now 11,695,495.
Application 17/499,923 is a division of application No. 15/933,931, filed on Mar. 23, 2018, granted, now 11,153,025, issued on Oct. 19, 2021.
Prior Publication US 2023/0353271 A1, Nov. 2, 2023
Int. Cl. H04W 12/03 (2021.01); H04K 1/00 (2006.01)
CPC H04K 1/00 (2013.01) [H04W 12/03 (2021.01); H04L 2209/80 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system configured to be part of a first secure network, the system comprising:
a reception component configured to receive an encrypted first secure network voice communication with an intended destination of a second secure network;
a decryption component configured to decrypt the first secure network voice communication with the intended destination of the second secure into a decrypted first secure network voice communication; and
a transmission component configured to transmit the decrypted first secure network voice communication to a communication modification component,
where at the communication modification component the decrypted first secure network voice communication is randomly-modified to produce a randomly-modified first secure network voice communication,
where the randomly-modified decrypted first secure network voice communication is transferred to the second secure network,
where the first secure network employs a first encryption scheme,
where the second secure network employs a second network encryption scheme, and
where the first network encryption scheme and the second network encryption scheme are different encryption schemes.