Secured cellular telephone communications system, method, and computer program product
First Claim
1. A method for securing cellular telephone transmissions utilizing a conventional cellular telephone, said method comprising the steps of:
- providing a conventional cellular telephone, said conventional cellular telephone being incapable of independently encrypting or decrypting signals;
providing a computer system coupled between an external microphone and said conventional cellular telephone, wherein inputs into said conventional cellular telephone are received first by said computer system, said computer system being separate and apart from said conventional cellular telephone;
receiving, within said computer system, an input signal from said external microphone;
encrypting within said computer system, said input signal utilizing public key encryption to form an encrypted input signal;
passing said encrypted input signal from said computer system to said conventional cellular telephone; and
transmitting said encrypted input signal utilizing said conventional cellular telephone, wherein cellular telephone transmissions from said conventional cellular telephone are secured.
1 Assignment
0 Petitions
Accused Products
Abstract
A data processing system, method, and product are disclosed for securing cellular telephone transmissions utilizing a conventional cellular telephone. A conventional cellular telephone and a computer system are provided. The computer system is separate and apart from the conventional cellular telephone. The conventional cellular telephone is capable of receiving an input signal from an external microphone and then transmitting that input signal using cellular technology. The conventional cellular telephone is incapable of encrypting the input signal.
The computer system is coupled between the external microphone and the cellular telephone such that inputs into the external microphone are received first by the computer system. The computer system receives an input from the microphone, encrypts the input utilizing public key encryption, and passes the encrypted input to the cellular telephone. The cellular telephone then transmits the encrypted input using cellular technology. Thus, cellular telephone transmissions from the conventional cellular telephone are secured.
-
Citations
30 Claims
-
1. A method for securing cellular telephone transmissions utilizing a conventional cellular telephone, said method comprising the steps of:
-
providing a conventional cellular telephone, said conventional cellular telephone being incapable of independently encrypting or decrypting signals; providing a computer system coupled between an external microphone and said conventional cellular telephone, wherein inputs into said conventional cellular telephone are received first by said computer system, said computer system being separate and apart from said conventional cellular telephone; receiving, within said computer system, an input signal from said external microphone; encrypting within said computer system, said input signal utilizing public key encryption to form an encrypted input signal; passing said encrypted input signal from said computer system to said conventional cellular telephone; and transmitting said encrypted input signal utilizing said conventional cellular telephone, wherein cellular telephone transmissions from said conventional cellular telephone are secured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing cellular telephone transmissions utilizing a conventional cellular telephone, comprising:
-
a conventional cellular telephone, said conventional cellular telephone being incapable of independently encrypting or decrypting signals; a computer system coupled between an external microphone and said conventional cellular telephone, wherein inputs into said conventional cellular telephone are received first by said computer system, said computer system being separate and apart from said conventional cellular telephone; said computer system capable of receiving an input signal from said microphone; said computer system capable of encrypting said input signal utilizing public key encryption to form an encrypted input signal; said computer system capable of passing said encrypted input signal from said computer system to said conventional cellular telephone; and said conventional cellular telephone capable of transmitting said encrypted input signal, wherein cellular telephone transmissions from said conventional cellular telephone are secured. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising:
-
a computer usable medium having computer usable program code for securing a cellular telephone transmission utilizing a conventional cellular telephone, said computer program product including; computer usable program code for first receiving inputs intended for the conventional cellular phone into a computer system coupled between an external microphone and the conventional cellular telephone, wherein the conventional cellular telephone is capable of encrypting or decrypting signals and wherein the computer system is separate and apart from the conventional cellular telephone; computer usable program code for receiving, within said computer system, an input signal from said microphone; computer usable program code for encrypting, within said computer system, said input signal utilizing public key encryption to form an encrypted input signal; computer usable program code for passing said encrypted input signal from said computer system to said conventional cellular telephone; and computer usable program code for transmitting said encrypted input signal utilizing said conventional cellular telephone, wherein cellular telephone transmissions from said conventional cellular telephone are secured. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification