GSM (Global System for Mobile communication) handset with carrier independent personal encryption
First Claim
1. A method of generating personal encryption for telephony, the method comprising:
- entering a private code;
entering a telephone number;
generating encryption and decryption key sequences based on the entered information;
encrypting the outgoing information if in communication with the entered telephone number; and
decrypting the incoming information if in communication with the entered telephone number.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure introduces simple methods and systems for personal encryption of messages and data, using a GSM handset. The proposed methods and systems furnish another layer of communication security instead of or in addition to that of the carrier. Users can generate and customize their own encrypted communication, independent of the carrier. In one embodiment the existing handset hardware can be used to implement the personal encryption, without the need for additional hardware. The present disclosure also provides methods and systems for generating different encryption keys and synchronization methods. In one exemplary system the encryption key is kept in the memory of the handset, while in another exemplary system the key is downloaded from an SMS (Short Message Service) station. In one exemplary method the encryption key sequence is as long as the block data and is synchronized with each block data, while in another exemplary method the transmitted information is segmented and flagged for synchronization with the encryption key.
29 Citations
44 Claims
-
1. A method of generating personal encryption for telephony, the method comprising:
-
entering a private code;
entering a telephone number;
generating encryption and decryption key sequences based on the entered information;
encrypting the outgoing information if in communication with the entered telephone number; and
decrypting the incoming information if in communication with the entered telephone number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of generating personal encryption for telephony, independent of the carrier, using a handset, the method comprising:
-
entering a private code;
entering a telephone number;
generating encryption and decryption key sequences based on the entered information;
checking the telephone number communicating with;
encrypting the outgoing information, if the entered telephone number is the same as the telephone number being in communication with; and
decrypting the incoming information, if the entered telephone number is the same as the telephone number being in communication with. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method of generating personal encryption by Global System for Mobile Communication handsets, the method comprising:
-
entering a private code;
entering a telephone number;
generating encryption and decryption key sequences based on the entered private code, the entered telephone number, or both;
checking the telephone number communicating with;
encrypting the outgoing information with the generated encryption key, if the entered telephone number is the same as the telephone number being in communication with;
decrypting the incoming information with the generated decryption key, if the entered telephone number is the same as the telephone number being in communication with;
encrypting the outgoing information with a key sequence of all 0'"'"'s, if the entered telephone number is not the same as the telephone number being in communication with; and
decrypting the incoming information with a key sequence of all 0'"'"'s, if the entered telephone number is not the same as the telephone number being in communication with. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A system for generating personal encryption for telephony, the system comprising:
-
a user interface;
an encryption and decryption key sequence generator;
a telephone number comparator;
a key sequence selector;
an exclusive-OR functional module; and
an arrangement in which;
the user enters a private code and a telephone number into the user interface;
the comparator receives the telephone number being in communication with and receives the entered telephone number from the user interface;
the key sequence generator receives the private code and the entered telephone number from the user interface and generates encryption and decryption sequences based on the private code, the telephone number, or both;
the key sequence selector receives the generated keys of the key generator, a string of 0'"'"'s, and the comparison result of the comparator; and
the exclusive-OR functional module receives the output of the selector, which is the generated key sequence if the comparator'"'"'s inputs are the same, or the string of 0'"'"'s if the comparator'"'"'s inputs are not the same.
-
Specification