The present invention relates to telecommunications devices, and more particularly to a device adapted for use with audible, facsimile and data transmissions.
As the demand for increased security of telecommunications systems grows, so that unauthorized interception of audible, data, facsimile and other electronically transmitted information is minimized, so does the need for devices capable of satisfying these demands. For example, a potential user may telecommute from a home office and use voice, computerized data and facsimile communications. Therefore, it is desirable to have some way for securing each communication of these types to prevent or at least impede unauthorized access thereto. If the telecommuting user telephones a second user, and in the course of their discussions decides to discuss sensitive information, he may wish to encrypt information in an attempt to frustrate unauthorized interception thereof. Further, in the course of the conversation he may wish to send or receive a facsimile. Further yet, it may be desirable that this facsimile also be encrypted. Therefore, it is desirable that the ability be provided to send and/or receive facsimile transmissions without being required to terminate the telephone call and initiate a new call.
Further yet, it is also desirable to permit the transfer of at least one computer file between the users, in such case it may again desirable to be able to encrypt the same and not require the users to initiate a new communications session, but rather just continue the original session. Finally, as many users already possess telephones, facsimile machines and computers, it is desirable to provide a security device capable of performing these functions in connection with these existing devices.
Accordingly, it is an object of the present invention to provide a method and system for enabling encryption of data in a manner that provides increased security. It is a further object of the present invention to provide a method and system adapted to acquire security keys directly from one another and encrypt e-mail using these keys.
A method for selectively enhancing a voice telephone call from a first location to a second location over a public switched telephone network, including receiving audio signals from a conventional telephone using a first device positioned at the first location; and, in a first mode, passing the received audio signals to the public switched telephone network in a substantially unaltered manner; and, in a second mode, generating data indicative of the received audio signals using the first device; multiplexing the generated data with other data desired to be communicated using the first device; and, transmitting the multiplexed data over the public switched telephone network; wherein, the transmitted data is suitable for being received from the public switched telephone network and de-multiplexed to generate reproduced audio signals indicative of the received audio signals and the other data by a second like device.
The multiplexed data may be encrypted prior to transmitting the same via the public switched telephone network, such that the transmitted data is decrypted prior to demultiplexing.
Referring now to the numerous figures, wherein like references refer to like elements and steps according to the instant invention,
As set forth, it is desirable that the first user and second user, in a single communications session be able to communicate in both encrypted and non-encrypted modes over the telephones 10 and 10′, transmit and receive documents either in an encrypted or non-encrypted mode using facsimile machines 30 and 30′ and transfer electronic documents, either in an encrypted or non-encrypted mode using the computers 40 and 40′.
Referring now also to
The data port 90 preferably takes the form of a serial I/O port, i.e. RS-232, which is adapted to permit direct communications between the computer 40 and security device 10 for example. It should be recognized though that the choice of data port 90 to be an RS-232 type port further permits security device 10 to be electronically coupled to any device capable of communicating with it there over, for example virtually any computer, personal data assistant or other proprietary device adapted to communicate over an RS-232 interface. However, other suitable interfaces can of course be utilized (wireless for example).
The device 10 preferably incorporates two (2) modems 100 and 110 each coupled to the telephone interface 160, at least one of which is preferably at least 56K and v.90 compatible as is understood by those skilled in the art (preferably 110). Obviously, the faster and more reliably these modems can perform, the better overall system performance will be. Modem 100 is adapted to communicate with a device attached to the phone port 80, i.e. facsimile machine 30, while modem 110 is adapted to communicate with a counterpart modem 110′ of a second security device (i.e. 10′).
The device 10 preferably further includes a microcontroller 120 coupled to the modems 100, 110, data port 90, encryption/decryption device 130, digital signal processor (“DSP”) 140, audio codec 150, telephone interface 160, SRAM 170 and program memory 180. Preferably the microcontroller 120 serves to control and pass data to and from these elements, as is well known. The microcontroller 120 preferably also performs multiplexing of data from separate sources (i.e. fax/data/voice). Preferably the digital signal processor (“DSP”) 140 serves to generate encryption/decryption codes. Preferably, the encryption/decryption device 140 serves to encrypt and decrypt data consistent with these encryption/decryption codes as is well known, and is preferably coupled to a EEPROM 190 to facilitate this purpose. The program memory 180 preferably stores the microcontroller's 120 program and the SRAM 170 serves as a memory unit for operation of the microcontroller. Preferably the microcontroller 120 takes the form of a model Intel N80C251SB16 and the DSP 140 takes the form of a model TI TMS320C542PGE2-40. As is well known, modems 100, 110 utilize ROMs 102, 112 and SRAMs 104, 114, which may either be internal or external to the modems 100, 110 as is known.
Referring now also to
Each device 10, 10′ preferably enters a standby, on-hook mode (i.e. 200, 200′) until an off-hook condition or ring in is detected. Thereafter each device 10, 10′ preferably and respectively enters a plaintext voice mode (i.e. 200, 200′). In this mode audio and facsimile communications pass through the devices 10 and 10′ without any change thereto. If computer or proprietary data is to be transmitted in the clear, i.e. without encryption, the devices 10, 10′ preferably and respectively enter a plaintext data mode 220, 220′. If the users of the devices 10, 10′ wish to secure communication between them, the devices preferably and respectively enter a ciphertext voice mode 230, 230′. If the users wish to transfer data in an encrypted format the devices preferably and respectively enter a ciphertext data mode 240, 240′. Finally, if the users want to share a secured facsimile transmission the devices 10, 10′ preferably and respectively enter ciphertext fax modes 250, 250′.
For sake of clarity, a preferred form of the invention will now be described with reference to a communications session between two users, although it is to be understood that the present disclosure of the preferred form has been made only by way of example, and that numerous changes in the details of construction and combination and arrangement of parts may be made without departing from the spirit and scope of the invention.
Plaintext Mode
Voice, facsimile and data transfer modes (i.e. computer-to-computer) are all preferably available in plaintext mode. In plaintext voice mode, the first user is, for example, using telephone 20 to communicate with another telephone (i.e. 20′). Essentially, the ports 70 and 80 are coupled together, allowing device 10 to appear transparent to the users. While in plaintext voice mode, either user may instruct his respectively associated device 10 to enter ciphertext mode, for example by activating or pressing a button on the device 10. Thereafter, the device 10, 10′, which was directly instructed to enter ciphertext mode by a user can signal the other device 10, 10′ to in turn enter ciphertext mode using conventional methodology. Alternatively, both users may respectfully instruct their respectively associated device 10, 10′ that they wish to enter the ciphertext mode, for example by each activating or pressing a button on their respective device 10, 10′.
Either way, responsively thereto the devices 10 and 10′ exchange keys as will be discussed and enter the ciphertext mode as set forth below. If a modem request is received via data port 90, modem 110 is preferably further adapted to operate as a standard external computer modem using the port 70 for the device initiating the request via the data port 90. In other words, it is operable as a standard external modem for a computer 40 for enabling it to contact other computers or connect to the Internet for example. Similarly, the facsimile machine 30 can communicate through the communications system 60 via the ports 70 and 80 and the computer 40 could alternatively communicate using an internal facsimile and/or modem card though the communications system 60 via the ports 70 and 80 for example.
Referring now to
Alternatively, if the incoming call is picked up by a user, the device 10′ detects the off-hook condition and enters an off-hook plaintext voice mode 260′. A plaintext voice mode is now commenced for example, as the originating device 10 is in plaintext voice mode 260 and the destination device 10′ is in plaintext voice mode 260′. In this plaintext voice mode 260 for the originating device 10 and 260′ for the destination device 10′, either device 10 or 10′ can send or receive a data file via the data ports 90, 90′.
Referring now also to
Thereafter, device 10 enters a data transmit mode 280 and device 10′ enters data receive mode 290′ wherein a file is transmitted from computer 40, through port 90, into device 10, to modem 110, through telephone interface 160 out port 70, into port 70′, through telephone interface 160′ to modem 110′, out port 90′ and into computer 40′. After the file transfer is complete, the devices 10, 10′ preferably return to plaintext voice modes 260, 260′. Of course, a file could be transmitted from computer 40′ to computer 40 in the same manner, i.e. device 10′ going into plaintext data transmit mode 280′ and device 10 going into plaintext data receive mode 290 and eventually back to plaintext voice modes 260 and 260′.
Alternatively, a user may wish to send a plaintext facsimile, in such case the modems of the facsimile machines 30 and 30′ preferably negotiate a communications session therebetween and transmit the document as is well known. It should be noted that the devices 10 and 10′ remain transparent to the facsimile machines 30 and 30′ and hence the users thereof in the plaintext mode. Hence, in plaintext mode, the users of the devices continue to operate telephones 20, 20′, facsimile machines 30, 30′ and computers 40 and 40′ conventionally, which of course makes the devices 10, 10′ easier to use.
When the users select to end their conversation, they simply hang up the telephones and both devices detect an on-hook condition and return to on-hook standby mode 200, 200′ for example.
Ciphertext Mode
As set forth, in the plaintext voice mode 160, 260′ either or both users can instruct the devices 10, 10′ that he wishes to enter a secured or ciphertext mode by pressing a button on his respectively associated device 10 or 10′ for example. It should be recognized that the device 10 could further be adapted to monitor voice, facsimile and data transmissions in the plaintext mode for instructions to convert over to the ciphertext mode, the drawbacks of such a configuration however include that it requires the device 10 monitor the line in case the other device 10′ attempts to convert over to ciphertext mode during facsimile or data transmissions, which in turn requires more complex circuitry and programming. Alternatively, the device 10 could begin, or default in ciphertext mode upon commencement of a communications session with a second user also utilizing a security device according to the present invention, i.e. device 10′.
Referring now to
After these steps have been performed, the modems 110, 110′ of the security devices 10, 10′ negotiate a protocol to be used for communications there between using conventional techniques as is well known 310. After the modems 110, 110′ have negotiated a protocol for a secured session which is commenced between them, the capabilities of this secured session are preferably reported to each microcontroller 120, 120′ by the respectively modem 110, 110′. Each microcontroller 120, 120′ preferably then, determines the capabilities of the secured communications session commenced 320 and directs 330 the mode of operation of the modem 100, 100′ and audio codecs 150, 150′. Each modem 100, 110′ and audio codec 150, 150′ can be controlled to operate in different modes as is well known. For example, the speed at which each modem 100, 100′ operates is controllable, as is a level of quality for the audio codecs 150, 150′. Preferably, the higher the capabilities of the secured session (i.e. higher the speed, better error correction) the faster the modems 100, 100′ can operate and the higher the level of quality the audio codecs can be operated in. Preferably for example, if a 33.6 Kbps connection can be established for the secure session, the modems 100, 100′ can operate at up to 14.4 Kbps and the audio codecs 140, 140′ can be operated in their highest level of quality. If a slower connection is established for the secure session between the devices 10, 10′, the modems 100, 100′ are preferably operated in a slower mode (i.e. 9600 bps) and the operational mode of the codecs 150, 150′ can be suitably adjusted.
Encrypt/decrypt devices 130, 130′ of the devices 10, 10′ preferably exchange keys to permit for secured communications between the devices 10, 10′ after a session protocol has been negotiated (illustrated in element 310). Referring again to
Referring now also to
Likewise, the device 10′ detects a modem request, either from the user thereof or from the device 10 for example, and enters a ciphertext data setup mode 350′, wherein modem 110′ also maintains the secure session over line port 70′, the audio codec 150′ couples to the phone port 80′ for reasons as will be set forth later and data is transmitted between the modem 110′ and data port 90′. Thereafter, device 10 enters a ciphertext data transmit mode 360 and device 10′ enters ciphertext data receive mode 370′. Therein, a file is transmitted from computer 40 through port 90 into device 10, directed by the microcontroller 120 to the encrypt/decrypt device 130 for encryption consistent with the previously negotiated security key, modulated by modem 110 and transmitted through telephone interface 160 out port 70 to the communications system 60. The data is then received by the device 10′ using port 70′ and telephone interface 160′, demodulated by modem 110′, and directed by microncontroller 120′ to the encrypt/decrypt device 130′ for decryption. The decrypted data is then directed out port 90′ by the microcontroller 120′ and into computer 40′. After the file transfer is complete, the devices preferably return to ciphertext voice modes 340 and 340′.
Of course, a file could be transmitted from computer 40′ to computer 40 in a reverse direction but identical manner. However, it should be understood that one cannot simply transmit a facsimile between facsimile machines 30, 30′ in ciphertext, or encrypted mode such as was done in plaintext mode, as a secured session has already been commenced over the communications system 60 for example, hence rendering it impossible to simultaneously commence a conventional facsimile protocol session thereover.
Therefore, and referring now also to
As is well known modems 100, 100′ can be configured to respectively provide an output signal to the microcontrollers 120, 120′ upon detection of a standard facsimile transmit or receive signal (i.e. DIS signal). Upon receipt of one of these signals, preferably the receive facsimile signal, one device 10, 10′ can be configured to transmit this status to the other device 10, 10′. For example, and referring again to the same communication session as has been described with regard to plaintext and ciphertext voice communications, the users of the devices 10, 10′ may wish to transmit a document from facsimile machine 30 to facsimile machine 30′ in an encrypted manner. To effectuate such a transmission, the users may agree to do such, and a document placed into facsimile machine 30 and a start button activated thereon for example. On the other end, a start button may also be activated on the facsimile machine 30′ which has had no document previously placed into its page feeder as it is intended to receive the document from facsimile machine 30. It should be understood that conventionally at this point facsimile machines 30 and 30′ would negotiate a communications session over communications system 60 for transmitting the document placed in the sheet feeder of the facsimile machine 30. However, due to the secure communications session already in place between modems 110, 110′ of the devices 10, 10′ over communications system 60 such is not feasible using conventional facsimile technology.
When the document was placed in facsimile machine 30 and the start button activated, a signal attempting to commence a facsimile session was transmitted by the facsimile machine 30 and received by the device 10 through phone port 80. This signal is indicative of attempting to transmit a facsimile document. Because modem 100 is monitoring the phone port 80, as has been set forth, it can detect this signal and in turn signal the microprocessor 120. Similarly, when the send button is activated on the facsimile machine 30′ a signal attempting to commence a facsimile session was transmitted by the facsimile machine 30′ and received by the device 10′ through phone port 80′. This signal is indicative of an attempt to receive a facsimile document. Because modems 100, 100′ are monitoring the phone ports 80, 80′, as has been set forth, they can individually detect these signals. Upon either unit detecting one of these signals, but preferably the receiving unit, i.e. 10′ in this example, a control signal can be passed over the communication session between modems 110, 110′ of devices 10, 10′ such that the microcontrollers 120, 120′ can direct the devices 10, 10′ to enter ciphertext facsimile mode. Upon such a direction the device 10 enters ciphertext facsimile setup mode 380. Therein, the phone port 80 is coupled to modem 100, the secure communications session is continued using modem 110 and the audio codec 150 is preferably uncoupled from phone port 80′ if both the fax machine 30 and telephone 20 are coupled to port 80. Correspondingly, the device 10′ enters ciphertext facsimile setup mode 380′ wherein phone port 80′ is coupled to modem 100′, the audio codec 150′ is uncoupled from phone port 80′ if both the fax machine 30′ and telephone 20′ are coupled to port 80′, and the secure communications session is continued using modem 110′.
Accordingly, the modem 100 of the device 10 negotiates a facsimile session with facsimile machine 30 and modem 100′ of device 10′ negotiates a facsimile session with facsimile machine 30′, this fax session preferably being consistent with the capabilities of the secure session as determined by the microcontroller 120. Thereafter, the device 10 enters ciphertext facsimile transmit mode 340 and device 10′ enters ciphertext facsimile receive mode 400′. Therein, data is transmitted from the facsimile machine 30 to modem 100 of the device 10 through phone port 80 and telephone interface 160. This data is demodulated by the modem 100 of the device 10 and directed by the microcontroller 120 to encrypt/decrypt device 130 which encrypts the data consistent with the security key previously negotiated between the devices 10, 10′. This encrypted data is then directed by the microcontroller 120 to the modem 110 and transmitted out line port 70 through telephone interface 160 to the communications system 60. The encrypted data is received by the device 10′ from the communications system 60 through the port 70′ and telephone interface 160′, demodulated using modem 110′ and directed by the microcontroller 120′ to the encrypt/decrypt device 130′ which decrypts the data consistent with the key previously negotiated between the devices 10, 10′. The microcontroller 120′ then directs the decrypted data to the modem 100′ which modulates the data consistent with the session commenced between it and the facsimile machine 30′. The modulated data is then sent to phone port 80′ though the telephone interface 160′ to the facsimile machine 30′ where it is received. After the facsimile transmission is complete the devices 10, 10′ preferably returns to ciphertext voice modes 340, 340′.
Advantageously, this all appears transparent to the users who only see facsimile machine 30 transmitting a facsimile document and facsimile machine 30′ receiving a facsimile document. Of course, a facsimile document could be sent from facsimile machine 30′ to facsimile machine 30 in the reverse but identical manner.
Use with Proprietary Hardware
The use of proprietary herein is meant to indicate any electronic device adapted to communicate over communications system 60. As set forth the device 10 preferably incorporates a standard format data port 90. In the preferred form this takes the form of an RS-232 type port. As stated, an advantage of incorporating such a standard port enables one to utilize the device 10 with any device, e.g., computer, cell phone, notebook computers, wireless modems, etc., capable communicating via the standard interface, i.e. in the preferred form RS-232.
Accordingly, the device 10 is further capable of being utilized with a variety of proprietary devices, i.e. Personal Data Assistants (PDAs) for example and other electronic devices. One such device is marketed under the tradename Magicom by Copytele, Inc., the assignee hereof. This device permits for handwriting on a pad to be digitized and transmitted to a like Magicom device for display. These Magicom devices preferably use a touch-screen as both a display and input device.
Similar as for the computer 40, a proprietary device is preferably coupled to the device 10 using the data port 90. A request for service can similarly be received by the device 10 using port 90 and microcontroller 120. Upon such a request for service, the device 10 handles it consistently as has been set forth for a modem request.
Encryption—Key Generation and Exchange
Any suitable encryption/decryption device 130, 130′ can be utilized as is well known in the art. For example, a Diffe-Hillman public/private key algorithm may be implemented. Preferably though, the encryption/decryption device 130 takes the form of a Harris Model Citadel CCX, using a Tripe DES or AES algorithm. The choice of a hardware encryption device generally results in more robust cryptographic implementation than software alone, generally resulting for example from better random number generation. However, any suitable means for encrypting and decrypting data as is well known in the art can be used. For example, the microcontroller 120 could perform the encryption/decryption software algorithms.
Preferably a new session key is generated for each point-to-point real-time communications session using standard public/private key technology and DSP 140. In other words, for each session the device 10 using the DSP 140 generates a new public/private key combination for use with another like device (10′) for encrypting and decrypting messages therebetween using conventional techniques. Likewise, the device 10′ preferably generates a new public/private key combination. The public portions of these keys are preferably exchanged, and the respective private portion is combined with the received public portion by each encryption/decryption device 130, 130′ for encrypting and decrypting in according with the present invention.
Each device 10 preferably also includes a permanent public/private key combination for non point-to-point transmissions, i.e. over the Internet. In these types of non-real-time transmissions, if the devices 10, 10′ were to exchange their public/private key as is done for point-to-point transmissions the key would change before the file or other transmission, i.e. E-mail, was recovered and would hence render it unrecoverable, as the devices 10, 10′ preferably generate a new public/private key combination for each communications session. It should also be recognized that this feature further permits for file securing within the computer 40 for example by a user sending data to the device 10 and then recovering the encrypted data from it. As the permanent decryption key is available in the device 10 and not the computer 40, separation of the device 10 from the computer 40 acts as a means of securing data residing in the computer 40.
More particularly, a user, utilizing suitable drivers as is well known to those possessing ordinary skill, could instruct computer 40 to transmit a file to the device 10 for encryption with the permanent key. This encrypted file could then be re-transmitted back to the computer 40. At this point, using a suitable utility the user could erase the non-encrypted version to prevent unauthorized access to the file. Now that the file is in encrypted format, the user simply needs to follow the same steps with the device, this time instead of decrypting the file for access thereto. In this way, even if the computer 40 becomes lost or stolen, unauthorized access to the encrypted file could still be frustrated by adequately safeguarding the device 10.
Further, of course, conventional digital signature technology can be utilized by the devices 10, 10′ to verify the identity of devices 10, 10′ and hence their owners or operators.
Simultaneous Voice/Facsimile/Data Transmission
When operating in a ciphertext mode, it should be noted that only digital data is transmitted between the modems 110, 110′ of the devices 10, 10′. For example, in ciphertext voice mode, audio data received from either telephone 20, 20′ is digitized by the audio codec 140, 140′. Similarly, in the ciphertext data mode digital data received from the data port 90, 90′ is transmitted between devices 10, 10′. Likewise, in the ciphertext facsimile mode, only computerized data, which is no longer in facsimile format, is transmitted between the devices 10, 10′. Accordingly, using multiplexing techniques which are well know to those possessing ordinary skill in the art, one can easily simultaneously transmit data, or for example a computer file, between computers 40, 40′ during facsimile transmission and/or a full-duplex voice conversation, and still encrypt all information (voice and/or facsimile and data). In order to facilitate such, it is necessary to have the audio codecs 150, 150′ coupled to the respective phone port 80, 80′ even while data is being transmitted between the data ports 90 and 90′. Accordingly, it is also necessary to couple the modems 100, 100′ to the phone port 80, 80′ to monitor for a facsimile commencement signals for simultaneous transmission of facsimile data and a computer file for example. In simultaneous modes, headers for each packet can be used, as is well known in the art, to distinguish between data types (i.e. whether the data associated with that particular packet is fax, computer, voice or that of a proprietary device for example). As will be readily understood by those possessing ordinary skill in the pertinent art though, any other suitable form of multiplexing the data could of course be used.
Referring now also to
Referring now also to
If separate ports are provided within the devices 10, 10′ for respective connection to facsimile machine 30 and telephone 20, data from these sources can also me multiplexed, and the audio codecs 150, 150′ need not be decoupled from the phone ports 80, 80′ during facsimile transmissions.
Non-Point-to-Point Transmissions
Another area of concern lies in securing non-point-to-point file transmissions. It is often desirable to transmit a file to a repository where it can later be retrieved by the intended recipient. Another example is an attachment to an e-mail. However, securing the transmitted file from unauthorized or unintended interception or reception is still desirable.
Referring now to
Using the PC 40, the first user can prepare an e-mail using any conventional software application such as Eudora or Groupwise for example. One or more files to be attached can be secured either prior to being attached, or after by using an appropriate plug-in application, as is well known. This can be accomplished by providing a button or menu option for example which calls a subprogram for securing the one or more files for transmission after they have been attached. Regardless of when invoked, an encryption key is obtained and used to encrypt the one or more files for transmission.
Using the PC 40, the first user identifies the intended recipient of the e-mail and hence the secured attachments. An internal database in the PC 40 can then be searched to determine whether an encryption key is on file for the PC 40 for the intended recipient. If it is not, the PC 40 prompts the first user that a key is not on file and must first be obtained. According to a preferred embodiment, the first user causes a session in ciphertext voice mode 230 to be established between the devices 10, 10′ as has been set forth above. According to a particularly preferred form of the invention, the PC 40 prompts the first user for a telephone number for the intended recipient which is then passed to the device 10. The device 10 then dials the entered phone number using the modem 10 and proceeds to enter ciphertext voice mode 230. The user's PC 40 is preferably signaled upon successful commencement of the ciphertext voice mode 230. Referring now to
Referring now also to
Referring now also to
Of course, if public/private key technology is used, the private portion of the recipient's key is combined with the public portion of the sender's key which was supplied to the device 10′ when the device 10′ transmitted 1140′ the sender's public key portion. Further, passwords can be provided and also used to wrap the file using conventional encryption techniques. In such an event, the wrapped file, the device 10′ and the password are advantageously required to unencrypt the attachment.
According to a preferred form of the invention, transmissions of secure e-mail attachments to multiple recipients can be accomplished by including an appropriately encrypted version for each intended recipient in a single e-mail each being separated by a demarcation packet. In other words, each e-mail attachment preferably includes separately versions of the same attachment for each intended recipient having demarcation packets interposed between them. For example, if user A intends to send an e-mail with an encrypted attachment to users B and C, the e-mail attachment preferably includes an encrypted portion that B can de-crypt and an encrypted portion C can decrypt using their devices 10 respectively. As the entire encrypted attachment is provided to each of user's B and C's devices 10, each device 10 identifies that portion of the encrypted file it can decrypt and decrypts that portion. As the entire attachment is preferably encrypted separately using each user's appropriate key as has been set forth, each user's decrypted portion represents the entire attachment A intended to transmit to them. Hence the encrypted file includes the entire attachment encrypted using users A's and B's keys and the entire attachment encrypted using users A's and C's keys. The demarcation packets are preferably specific to each device 10. For example, referring again to the immediately preceding user A, B and C example, the attachment preferably takes the form of: user B's device demarcation packet, the intended file suitably encrypted for user B's device to decrypt, user C's device demarcation packet, and finally the intended file suitably encrypted for user C's device to decrypt. When the file is to be decrypted, each device 10 preferably scans the entire attachment for it's demarcation packet, and upon identifying it decrypts the appropriate portion of the attachment as has been described. The demarcation packets can be associated with each device's 10 public key for example.
Although the invention has been described in a preferred form with a certain degree of particularity, it is understood that the present disclosure of the preferred form has been made only by way of example, and that numerous changes in the details of construction and combination and arrangement of parts may be made without departing from the spirit and scope of the invention as hereinafter claimed. It is intended that the patent shall cover by suitable expression in the appended claims, whatever features of patentable novelty exist in the invention disclosed.
This application is a continuation of commonly assigned U.S. patent application Ser. No. 10/096,811, filed Mar. 13, 2003, now U.S. Pat. No. 6,856,686 which is a continuation-in-part of commonly assigned U.S. patent application Ser. No. 09/336,948, entitled “STAND-ALONE TELECOMMUNICATIONS SECURITY DEVICE” filed Jun. 21, 1999, now U.S. Pat. No. 6,430,691, the entire disclosures of each of which are hereby incorporated by reference as if being set forth in their respective entireties herein.
Number | Name | Date | Kind |
---|---|---|---|
5222136 | Rasmussen et al. | Jun 1993 | A |
5410599 | Crowley et al. | Apr 1995 | A |
5455861 | Faucher et al. | Oct 1995 | A |
Number | Date | Country | |
---|---|---|---|
20050223215 A1 | Oct 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10096811 | Mar 2002 | US |
Child | 11058402 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09336948 | Jun 1999 | US |
Child | 10096811 | US |