Method and apparatus for preventing unauthorized monitoring of wireless data transmissions
First Claim
1. In a communication system envoronment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for preventing unauthorized monitoring of wireless data transmissions to a communication unit of the plurality of communication units, the method comprising:
- a) transmitting, by the communication unit, a request for data to the wireless communication system;
b) routing, by the wireless communication system, the request to a security gateway;
c) determining, by the security gateway, type of data requested, identity of the communication unit, and identity of a particular database of the public data system that contains the data requested;
d) determining, by the security gateway, a transmission security level;
e) determining, by the security gateway, a unique user key of the communication unit;
f) attempting, by the security gateway, to establish a secure communication with the communication unit based on the unique user key and the transmission security level; and
g) when the secure communication is established, routing, by the security gateway, the request to the particular database.
4 Assignments
0 Petitions
Accused Products
Abstract
Preventing unauthorized monitoring of wireless data transmissions is accomplished by routing requests for data, from communication units (114) operating on wireless communication systems (101), to a security gateway (103) which determines a transmission security level, based on the type of data requested, the identity of the data requester, and the identity of the database containing the requested data. Once this is determined, the security gateway (103) establishes a secure communication with the communication unit according to the transmission security level. If the secure communication was successful, the security gateway (103) routes the requested data to the communication unit (114).
153 Citations
32 Claims
-
1. In a communication system envoronment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for preventing unauthorized monitoring of wireless data transmissions to a communication unit of the plurality of communication units, the method comprising:
-
a) transmitting, by the communication unit, a request for data to the wireless communication system; b) routing, by the wireless communication system, the request to a security gateway; c) determining, by the security gateway, type of data requested, identity of the communication unit, and identity of a particular database of the public data system that contains the data requested; d) determining, by the security gateway, a transmission security level; e) determining, by the security gateway, a unique user key of the communication unit; f) attempting, by the security gateway, to establish a secure communication with the communication unit based on the unique user key and the transmission security level; and g) when the secure communication is established, routing, by the security gateway, the request to the particular database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a communication environment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for a communication unit of the plurality of communication units to receive authorized data transmissions, the method comprising:
-
a) transmitting a request for data to the wireless communication system; b) determining a unique user key and a transmission security level; c) establishing a secure communication based on the unique user key and the transmission security level; and d) decrypting encrypted data using a default decryption code, wherein the default decryption code is based on the unique user key and the transmission security level. - View Dependent Claims (12, 13, 14)
-
-
15. A method for a security gateway to prevent unauthorized monitoring of wireless data transmissions, the method comprising:
-
a) receiving a request for data; b) determining type of data requested, identity of requesting unit, and identity of a particular database that contains the data; c) determining a transmission security level; d) determining a unique user key of the requesting unit; e) attempting to establish a secure communication with the requesting unit based on the unique user key and the transmission security level; and f) when the secure communication is established, routing the request to the particular database. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A communication unit for use in a wireless communication system and for receiving data from a public data system, the communication unit comprising:
-
a wireless transceiver, an encryption processor operably coupled to the wireless transceiver, wherein the encryption processor decrypts received data based on a unique user key and a transmission security level; memory operably coupled to the encryption processor, wherein the memory stores the unique user key and transmission security level; a variable identification processor, operably coupled to the memory for varying the unique user key based on a predetermined variation algorithm; and a display operably coupled to the encryption processor, wherein the display provides an image of received data. - View Dependent Claims (21)
-
-
22. A security gateway for using in a wireless communication system and for prevention unauthorized monitoring of data transmissions, the security gateway comprises:
-
a transceiver that provides a communication path with the wireless communication system and a public data system; a variable identification processor for providing a unique user key based on a time variant function; an encryption processor operably coupled to the transceiver, wherein the encryption processor determines a transmission security level based on type of data requested and a unique user key of a requesting unit; memory operable coupled to the encryption processor and the variable identification processor, wherein the memory stores the unique user key and the transmission security level. - View Dependent Claims (23)
-
-
24. In a communication environment that includes a wireless communication system operably coupled to a public data system, wherein the wireless communication system includes a plurality of communication units, a method for preventing unauthorized monitoring of wireless data transmissions to a communication unit of the plurality of communication units, the method comprising:
-
a) transmitting, by the communication unit, a request for data to the wireless communication system; b) routing, by the wireless communication system, the request to the public data system; c) receiving, by a security gateway, the data from the public data system; d) determining, by the security gateway, transmission security level based on identity of the communication unit, and identity of a particular database of the public data system that contains the data; e) determining, by the security gateway, a unique user key of the communication unit based on the identity of the communication unit; f) attempting, by the security gateway, to establish a secure communication with the communication unit based on the unique user key and the transmission security level; and g) when the secure transmission is established, transmitting, by the security gateway, the data to the communication unit. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A method for a security gateway to prevent unauthorized monitoring of wireless data transmissions, the method comprising:
-
a) receiving data from a data base of a public data system; b) determining type of data, identity of requesting unit, and identity of the database; c) determining a transmission security level; d) determining a unique key of the requesting unit; e) attempting to establish a secure communication with the requesting unit based on the unique user key and the transmission security level; and f) when the secure communication is established, routing the data to the requesting unit. - View Dependent Claims (30, 31)
-
-
32. A method comprising the steps of:
-
a) receiving a request from a requesting communication unit over a wireless communication resource for data, wherein at least part of the data is stored in a first database; b) automatically selecting a particular transmission security level from amongst a plurality of transmission security levels in response to receiving the request, to provide a selected transmission security level; c) using the selected transmission security level when providing at least some of the data to the requesting communication unit.
-
Specification