Method and system for voice guided secure entry of private data in a public setting
First Claim
1. A method for a user securely entering private user data using a system in public, the method comprising:
- said system choosing an encryption function based on one or more of a security strength user for said encryption function, a life span of said encryption function, and a data entry to said user burden of said encryption function;
generating vocal instructions for entering response data, the vocal instructions implementing the encryption function;
communicating the vocal instructions for entering response data to the user, the vocal instructions being communicated in a manner to be secure from observers of entry of the response data by the user;
receiving the response data entered by the user, wherein said response data is entered vocally by said user;
ascertaining the private user data from the response data received from the user; and
determining the validity of the private user data.
2 Assignments
0 Petitions
Accused Products
Abstract
Private user data is securely entered from a public location in a way that the private user data cannot be ascertained by observers. A voice agent generates vocal instructions for a user, instructing the user to enter response data. The vocal instructions are communicated to the user with a telephonic link, in a manner that is secure from observers of entry of the response data. The instructions implement an encryption function, which causes the private user data to be encrypted within the response data. The response data is entered by the user vocally into a telephone, or by pressing buttons on a telephone keypad, or by pressing keys on a computer keyboard. The response data entered by the user is received by a security agent, which ascertains the private user data from the response data, and which also determines the validity of the data.
-
Citations
23 Claims
-
1. A method for a user securely entering private user data using a system in public, the method comprising:
-
said system choosing an encryption function based on one or more of a security strength user for said encryption function, a life span of said encryption function, and a data entry to said user burden of said encryption function;
generating vocal instructions for entering response data, the vocal instructions implementing the encryption function;
communicating the vocal instructions for entering response data to the user, the vocal instructions being communicated in a manner to be secure from observers of entry of the response data by the user;
receiving the response data entered by the user, wherein said response data is entered vocally by said user;
ascertaining the private user data from the response data received from the user; and
determining the validity of the private user data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for a user securely entering private user data in public, comprising:
-
means for generating vocal instructions for entering response data;
wherein said vocal instructions implement an encryption function based on one or more of a security strength needed for said encryption function chosen by said system, a life span of said encryption function, and a data entry burden to said user of said encryption function;
means for communicating the vocal instructions for entering response data to the user, the vocal instructions being communicated in a manner to be secure from observers of entry of the response data by the user;
means for receiving the response data entered by the user, wherein said response data is entered vocally by said user;
means for ascertaining the private user data from the response data received from the user; and
means for determining the validity of the private user data. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for a user securely entering private user data in public, comprising:
-
a voice agent configured to generate vocal instructions implementing an encryption function for entering response data based on one or more of a security strength needed for said encryption function chosen by said system, a life span of said encryption function, and a data entry burden to said user of said encryption function;
a telephonic communication link configured to communicate the vocal instructions for entering response data to the user, the vocal instructions being communicated in a manner to be secure from observers of entry of the response data by the user;
a security agent configured to receive the response data entered by the user, ascertain the private user data from the response data, and determine the validity of the private user data, wherein said response data is entered vocally by said user; and
a wherein said service provider configured to provide services to the user if the private user data is determined to be valid;
providing services to the user if the private user data is determined to be valid.
-
-
18. An article of manufacture comprising a data storage medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform a method for a user securely entering private user data using a system in public, the method comprising:
-
said system choosing an encryption function based on one or more of a security strength needed for said encryption function, a life span of said encryption function, and a data entry burden to said user of said encryption function;
generating vocal instructions for entering response data, the vocal instructions implementing the encryption function;
communicating the vocal instructions for entering response data to the user over a communications link that is secure from observers of entry of the response data by the user;
receiving the response data entered by the user, wherein said response data is entered vocally by said user, ascertaining the private user data from the response data received from the user; and
determining the validity of the private user data;
p1 providing services to the user if the private user data is determined to be valid.- View Dependent Claims (19, 20, 21, 22, 23)
-
Specification