Techniques to provision and manage a digital telephone to authenticate with a network
First Claim
1. A method, comprising:
- receiving a personal identification number by a digital telephone comprising a microphone;
receiving encrypted security credentials from a first computing device, the digital telephone and the first computing device comprising a trusted pair;
decrypting the encrypted security credentials with the personal identification number;
transmitting the decrypted security credentials to a communications server at a second computing device, the decrypted security credentials comprising security information;
receiving an authentication request by the digital telephone from the communications server, the authentication request requesting for a remaining portion of the security information;
transmitting the authentication request from the digital telephone to the first computing device;
receiving the remaining portion of the security information by the digital telephone from the first computing device;
transmitting the remaining portion of the security information of the digital telephone to the communications server at the second computing device; and
completing authentication of the digital telephone with the communications server at the second computing device using the remaining portion of the security information.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed.
19 Citations
20 Claims
-
1. A method, comprising:
-
receiving a personal identification number by a digital telephone comprising a microphone; receiving encrypted security credentials from a first computing device, the digital telephone and the first computing device comprising a trusted pair; decrypting the encrypted security credentials with the personal identification number; transmitting the decrypted security credentials to a communications server at a second computing device, the decrypted security credentials comprising security information; receiving an authentication request by the digital telephone from the communications server, the authentication request requesting for a remaining portion of the security information; transmitting the authentication request from the digital telephone to the first computing device; receiving the remaining portion of the security information by the digital telephone from the first computing device; transmitting the remaining portion of the security information of the digital telephone to the communications server at the second computing device; and completing authentication of the digital telephone with the communications server at the second computing device using the remaining portion of the security information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An article of manufacture comprising a storage device containing instructions that if executed enable a system to:
-
receive a personal identification number by a digital telephone comprising a microphone; receive encrypted security credentials from a first computing device, the digital telephone and the first computing device comprising a trusted pair; decrypt the encrypted security credentials with the personal identification number; transmit the decrypted security credentials to a communications server at a second computing device, the decrypted security credentials comprising security information; receive an authentication request by the digital telephone from the communications server, the authentication request requesting for a remaining portion of the security information, the remaining portion of the security information comprising a password; transmit the authentication request from the digital telephone to the first computing device; receive the remaining portion of the security information by the digital telephone from the first computing device; transmit the remaining portion of the security information of the digital telephone to the communications server at the second computing device; and complete authentication of the digital telephone with the communications server at the second computing device using the remaining portion of the security information. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus, comprising:
a digital telephone management component operative to manage a digital telephone, the digital telephone comprising a microphone, the digital telephone management component comprising; a telephone interface module operative to receive a personal identification number by the digital telephone; a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a first computing device, and decrypt the encrypted security credentials with the personal identification number, the encrypted security credentials comprising a first portion of security information, the digital telephone and the first computing device comprising a trusted pair; and a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to provide a relay circuit between the first computing device and a communications server at a second computing device to transmit the first portion of the security information and a second portion of the security information and authenticate the digital telephone with the communications server at the second computing device using the first portion of the security information and the second portion of the security information. - View Dependent Claims (17, 18, 19, 20)
Specification