Claims
- 1. A method for exchanging data between a plurality of microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
providing a plurality of security devices each being associated with at least one of said plurality of microprocessor based devices; establishing a point-to-point electronic communications session between a first of said security devices being associated with a first of said microprocessor based devices and a second of said security devices being associated with a second of said microprocessor based devices; exchanging security data between said first and second security devices using said point-to-point communications session; encrypting data to be transmitted using said first security device and said security data; and, transmitting said encrypted data from said first microprocessor based device to said second microprocessor based device over said computer network.
- 2. The method of claim 1, further comprising decrypting said encrypted data after reception thereof by said second microprocessor based device using said second security device and security data.
- 3. The method of claim 2, wherein said first security device is directly electronically coupled to said first microprocessor based device and said second security device is directly electronically coupled to said second microprocessor based device.
- 4. The method of claim 1, wherein said point-to-point communications session is established distinct from said computer network.
- 5. The method of claim 4, wherein each of said plurality of computer devices comprises a modem and said establishing said point-to-point communications session between said first and second security devices comprises electronically coupling said modem of said first security device to said modem of said second security device.
- 6. The method of claim 1, further comprising the step of encrypting said security data using said second device prior to exchanging it with said first security device using said point-to-point communications session
- 7. The method of claim 2, further comprising electronically attaching said encrypted data to an electronic message using said first microprocessor based device prior to transmitting.
- 8. The method of claim 1, wherein said encrypting said data comprises:
sending said data from said first microprocessor based device to said first security device; and, sending said encrypted data from said first security device to said first microprocessor based device.
- 9. The method of claim 2, wherein said decrypting said encrypted data comprises:
sending said encrypted data from said second microprocessor based device to said second security device; and, sending said decrypted data from said second security device to said second microprocessor based device.
- 10. The method of claim 1, wherein said security data comprises encryption key data associated with at least said second security device.
- 11. The method of claim 10, wherein said security data further comprises password data supplied by either a user of said first microprocessor device or a user of said second microprocessor based device.
- 12. The method of claim 1, further comprising storing said security data on said first microprocessor based device.
- 13. A method for exchanging data between a plurality of electronic devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
providing a plurality of security devices each being associated with at least one of said plurality of electronic devices; identifying an intended recipient having one of said electronic devices using an originating one of said electronic devices; determining whether security data associated with said recipient electronic device is available to said originating electronic device, and if not: establishing a point-to-point electronic communications session between a first of said security devices being associated with said originating electronic device and a second of said plurality of security devices being associated with said recipient electronic device, exchanging said security data between said first and second security devices using said point-to-point communications session, and storing said security data so as to be available to said first electronic device; encrypting data residing on said first electronic device using said first security device and said security data; and, transmitting said encrypted data from said first electronic device to said second electronic device over said computer network.
- 14. The method of claim 13, wherein said point-to-point communications session is established distinct from said computer network.
- 15. The method of claim 14, wherein each of said plurality of computer devices comprises a modem and said establishing said point-to-point communications session between said first and second security devices comprises electronically coupling said modem of said first security device to said modem of said second security device.
- 16. The method of claim 13, further comprising electronically attaching said encrypted data to an e-mail using said first microprocessor based device prior to transmitting.
- 17. A method for operating an electronic device adapted to be electronically coupled to at least one microprocessor based device and prevent unauthorized access to data exchanged between said at least one microprocessor based device and other microprocessor based devices, said method comprising:
in a first mode, establishing a secure point-to-point communications session with another like device and receiving security data from said other like device, said security data being associated with an intended recipient microprocessor based device; and, in a second mode, receiving said data from an originating one of said at least one microprocessor based devices, encrypting said data using at least said received security data and sending said encrypted data to said originating microprocessor based device.
- 18. The method of claim 17, wherein said encrypting said data comprises:
sending said data from said first microprocessor based device to said first security device; and, sending said encrypted data from said first security device to said first microprocessor based device.
- 19. The method of claim 18, wherein said decrypting said encrypted data comprises:
sending said encrypted data from said second microprocessor based device to said second security device; and, sending said decrypted data from said second security device to said second microprocessor based device.
- 20. The method of claim 19, wherein said point-to-point communications session is established using a communication channel distinct from said computer network.
- 21. A method for exchanging data between a plurality of suitable microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising:
identifying at least first and second recipients for said data to be exchanged; identifying first security data associated with said first recipient and second security data associated with said second recipient; and, encrypting said data using said first and second security data.
- 22. The method of claim 21, wherein said identifying at least first and second recipients comprises addressing an e-mail.
- 23. The method of claim 21, wherein said identifying said first security data comprises establishing a first point-to-point communications session with a first security device being associated with a first of said plurality of microprocessor based devices and establish a second point-to-point communications session with a second security device associated with a second of said microprocessor based devices, wherein said first microprocessor based device is further associated with said first recipient and said second microprocessor based device is further associated with said second recipient.
- 23. The method of claim 22, wherein said identifying said first security data further comprises receiving said first security data from said first security device using said first point-to-point communications session.
- 24. The method of claim 23, wherein said identifying said second security data comprises receiving said second security data from said second security device using said second point-to-point communications session.
- 25. The method of claim 24, further comprising storing said first and second security data on one of said plurality of microprocessor based devices.
- 26. The method of claim 25, further comprising retrieving said first and second security data from said one of said plurality of microprocessor based devices.
- 27. The method of claim 21, wherein said encrypting said data using said first and second security data comprises:
inserting a first demarcation packet associated with said fist security device; encrypting said data using said first security data; inserting a second demarcation packet associated with said second device; and, encrypting said data using said second security data.
RELATED APPLICATION
[0001] This application is a continuation-in-part of commonly assigned U.S. patent application Ser. No. 09/336,948, entitled “STAND-ALONE TELECOMMUNICATIONS SECURITY DEVICE” filed Jun. 21, 1999.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09336948 |
Jun 1999 |
US |
Child |
10096811 |
Mar 2002 |
US |