METHOD AND DEVICE FOR SECURE PHONE BANKING
First Claim
Patent Images
1. A method operational on a small form-factor telephone security device, comprising:
- receiving dual tone multi-frequency (DTMF) tones front a telephone over a first communication interface;
encrypting the DTMF tones received from the telephone; and
sending the encrypted DTMF tones to a security server over a second communication interface.
1 Assignment
0 Petitions
Accused Products
Abstract
A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
40 Citations
53 Claims
-
1. A method operational on a small form-factor telephone security device, comprising:
-
receiving dual tone multi-frequency (DTMF) tones front a telephone over a first communication interface; encrypting the DTMF tones received from the telephone; and sending the encrypted DTMF tones to a security server over a second communication interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A small form-factor telephone security device, comprising:
-
means for receiving dual tone multi-frequency (DTMF) tones from a telephone over a first communication interface; means for encrypting the DTMF tones received from the telephone; and means for sending the encrypted DTMF tones to a security server over a second communication interface. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A small form-factor telephone security device, comprising:
-
a first communication interface for communicating with a telephone; a second communication interface for communicating with a security server; a processing circuit coupled between the first communication interface and the second communication interface, the processing circuit configured to receive dual tone multi-frequency (DTMF) tones from the telephone; encrypt the received DTMF tones; and send the encrypted DTMF tones to the security server. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A machine-readable medium having one or more instructions operational on a security device for securing information transmitted by a telephone, which when executed by a processor causes the processor to:
-
receive dual tone multi-frequency (DTMF) tones from the telephone over a first communication interface; encrypt the DTMF tones received from the telephone; and sending the encrypted DTMF tones over a second communication interface. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method operational on a telephone security server, comprising:
-
receiving a call from a dual tone multi-frequency (DTMF)-enabled telephone; sending an activation signal to a security device associated with the DTMF-enabled telephone to activate encryption of DTMF tones from the telephone; receiving encrypted DTMF tones from the security device; and decrypting the received DTMF tones to obtain information sent by the telephone. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A telephone security server, comprising:
-
means for receiving a call from a dual tone multi-frequency (DTMF)-enabled telephone; means for sending an activation signal to a security device associated with the DTMF-enabled telephone to activate encryption of DTMF tones from the telephone; means for receiving encrypted DTMF tones from the security device; and means for decrypting the received DTMF tones to obtain information sent by the telephone. - View Dependent Claims (34, 35)
-
-
36. A telephone security server, comprising:
-
a communication module for receiving telephone calls from dual tone multi-frequency (DTMF) enabled telephones; a DTMF decryption module for decrypting encrypted DTMF tones; and a processing circuit coupled to the communication module and the DTMF decryption module, the processing circuit configured to receive encrypted DTMF tones from a security device associated with a DTMF-enabled telephone; and decrypt the received DTMF tones to obtain information sent by the telephone. - View Dependent Claims (37, 38, 39)
-
-
40. A machine-readable medium having one or more instructions operational on a telephone security server for securing information transmitted from a telephone as dual tone multi-frequency (DTMF) tomes, which when executed by a processor causes the processor to:
-
authenticate a security device associated with the telephone; receive encrypted DTMF tones from the security device; and decrypt the received DTMF tones to obtain information sent by the telephone. - View Dependent Claims (41, 42)
-
-
43. A method operational on a mobile communication device, comprising:
-
initiating a call to a tele-services station; receiving a pseudorandom authentication challenge from the tele-services station; sending an authentication response to the tele-services station, wherein the authentication response is based on the pseudorandom authentication challenge and an authentication key pre-arranged by both the mobile communication device and the tele-services station; requesting sensitive information from the tele-services station; and receiving the requested sensitive information from the tele-services station if the authentication response is accepted by the tele-services station. - View Dependent Claims (44, 45, 46)
-
-
47. A mobile communication device, comprising:
-
means for initiating a call to a tele-services station; means for receiving a pseudorandom authentication challenge from the tele-services station; means for sending an authentication response to the tele-services station, wherein the authentication response is based on the pseudorandom authentication challenge and an authentication key pre-arranged by both the mobile communication device and the tele-services station; means for requesting sensitive information from the tele-services station; and means for receiving the requested sensitive information from the tele-services station if the authentication response is accepted by the tele-services station. - View Dependent Claims (48, 49)
-
-
50. A mobile communication device, comprising:
-
a communication module for communicating over a wireless communication network; and a processing circuit coupled to the communication module, the processing circuit configured to initiate a call to a tele-services station; receive a pseudorandom authentication challenge from the tele-services station; send an authentication response to the tele-services station, wherein the authentication response is based on the pseudorandom authentication challenge and an authentication key pre-arranged by both the mobile communication device and the tele-services station; request sensitive information from the tele-services station; and receive the requested sensitive information from the tele-services station if the authentication response is accepted by the tele-services station. - View Dependent Claims (51)
-
-
52. A machine-readable medium having one or more instructions operational on a security device for securing information transmitted by a telephone, which when executed by a processor causes the processor to:
-
initiate a call to a tele-services station; receive a pseudorandom authentication challenge from the tele-services station; send an authentication response to the tele-services station, wherein the authentication response is based on the pseudorandom authentication challenge and an authentication key pre-arranged by both the mobile communication device and the tele-services station; request sensitive information from the tele-services station; and receive the requested sensitive information from the tele-services station if the authentication response is accepted by the tele-services station. - View Dependent Claims (53)
-
Specification