Secured radio communications method
First Claim
1. A method for securing radio transmissions utilizing a conventional radio, said method comprising the steps of:
- providing a conventional radio, said conventional radio being incapable of encrypting or decrypting signals, said radio including a conventional microphone port that is configured to be coupled to a conventional microphone and a conventional speaker port that is configured to be coupled to a conventional speaker, said radio remaining unmodified;
providing a computer system coupled between a microphone and said radio, wherein inputs into said radio are received first by said computer system, said computer system being separate and apart from said radio;
receiving, within said computer system, an input analog signal from said microphone;
encrypting, within said computer system, said input analog signal utilizing public key encryption to form an encrypted voice file;
passing said encrypted voice file from said computer system to said microphone port that is included within said unmodified radio; and
transmitting said encrypted voice file utilizing said unmodified radio, wherein radio transmissions from said radio are secured.
2 Assignments
0 Petitions
Accused Products
Abstract
A data processing system, method, and product are disclosed for securing radio transmissions utilizing a conventional radio. A conventional radio and a computer system are provided. The computer system is separate and apart from the conventional radio. The conventional radio is capable of receiving an input analog signal from a microphone and then transmitting the input analog signal. The conventional radio is incapable of encrypting the input analog signal. The computer system is coupled between the microphone and the radio such that inputs into the microphone are received first by the computer system. The computer system receives an input from the microphone, encrypts the input utilizing public key encryption, and passes the encrypted input to the radio. The radio then transmits the encrypted input. Thus, radio transmissions from the conventional radio are secured.
-
Citations
9 Claims
-
1. A method for securing radio transmissions utilizing a conventional radio, said method comprising the steps of:
-
providing a conventional radio, said conventional radio being incapable of encrypting or decrypting signals, said radio including a conventional microphone port that is configured to be coupled to a conventional microphone and a conventional speaker port that is configured to be coupled to a conventional speaker, said radio remaining unmodified; providing a computer system coupled between a microphone and said radio, wherein inputs into said radio are received first by said computer system, said computer system being separate and apart from said radio; receiving, within said computer system, an input analog signal from said microphone; encrypting, within said computer system, said input analog signal utilizing public key encryption to form an encrypted voice file; passing said encrypted voice file from said computer system to said microphone port that is included within said unmodified radio; and transmitting said encrypted voice file utilizing said unmodified radio, wherein radio transmissions from said radio are secured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification