US20050069106A1 - Method and apparatus for enabling a privacy feature in a communications network - Google Patents
Method and apparatus for enabling a privacy feature in a communications network Download PDFInfo
- Publication number
- US20050069106A1 US20050069106A1 US10/675,742 US67574203A US2005069106A1 US 20050069106 A1 US20050069106 A1 US 20050069106A1 US 67574203 A US67574203 A US 67574203A US 2005069106 A1 US2005069106 A1 US 2005069106A1
- Authority
- US
- United States
- Prior art keywords
- signals
- communications
- keypad
- receiving
- instructions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/10—Telephonic communication systems specially adapted for combination with other electrical systems with dictation recording and playback systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/60—Medium conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42382—Text-based messaging services in telephone networks such as PSTN/ISDN, e.g. User-to-User Signalling or Short Message Service for fixed networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q1/00—Details of selecting apparatus or arrangements
- H04Q1/18—Electrical details
- H04Q1/30—Signalling arrangements; Manipulation of signalling currents
- H04Q1/44—Signalling arrangements; Manipulation of signalling currents using alternate current
- H04Q1/444—Signalling arrangements; Manipulation of signalling currents using alternate current with voice-band signalling frequencies
- H04Q1/45—Signalling arrangements; Manipulation of signalling currents using alternate current with voice-band signalling frequencies using multi-frequency signalling
Definitions
- the present invention relates generally to an improved communications system and in particular to a method and apparatus for transferring data over a communications system. Still more particularly, the present invention relates to a method, apparatus, and computer instructions for securely transferring data over a communications system.
- PSTN public switched telephone network
- ISDN integrated services digital network
- FDDI fiber distributed data interface
- private or confidential information may be required as part of the transaction or conversation.
- one customer or user may be required to give a social security number, age, date of birth, or password to verify or obtain authorization to obtain information or perform various transactions.
- a customer or user must find a private location or speak in a low enough voice to avoid others overhearing the private or confidential information. In some cases, the user may not be able to find a private location in which to convey this information.
- the present invention provides a method, apparatus, and computer instructions for securely transferring information in a communications system.
- Signals are generated by a communications keypad.
- these signals are converted from the communications keypad into speech signals, and the speech signals are transmitted to a receiving party.
- FIG. 1 is a communications network in accordance with a preferred embodiment of the present invention
- FIG. 2 is a block diagram of a communications device in which a preferred embodiment of the present invention may be implemented
- FIG. 3 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention
- FIG. 4 is a block diagram illustrating components used in providing for a secure transfer of information in accordance with a preferred embodiment of the present invention
- FIG. 5 is a diagram illustrating components used in providing a secure data transfer feature in a communications network in accordance with a preferred embodiment of the present invention
- FIG. 6 is a flowchart of a process for providing secure data transmission in accordance with a preferred embodiment of the present invention.
- FIG. 7 is a flowchart of a process for providing a secure data transfer feature and a communications system in accordance with a preferred embodiment of the present invention.
- Communication network 100 is an example of a communications network in which the present invention may be implemented.
- Communication network 100 may include various networks, such as a public switched telephone network (PSTN), an integrated services digital network (ISDN), the Internet, or a fiber distributed data interface (FDDI) network.
- PSTN public switched telephone network
- ISDN integrated services digital network
- FDDI fiber distributed data interface
- Communication network 100 may include copper wire, fiber optics, and wireless transmission links to provide for voice and data transmissions.
- telephones 102 , 104 , and 106 are connected to communication network 100 .
- a user at telephone 102 may initiate a call to a person at telephone 104 for an interactive conversation between users.
- server 108 may provide various functions and features on communication network 100 including those of the present invention.
- the present invention provides a method, apparatus, and computer instructions for a privacy or secure feature for interactive conversations between human parties over communication network 100 .
- a user at telephone 102 may indicate that a secure or privacy function is desired to initiate a secure data transfer function. When that function is activated, input is taken from a keypad or other non verbal user interface. The input from a microphone on telephone 102 may be ignored depending on the particular implementation. The signals from the keypad are converted into speech and sent across communication network 100 to telephone 104 .
- This feature and the conversion of keypad signals into speech may be performed through logic located in telephone 102 . In other instances, this function may be provided as part of communication network 100 through server 108 . Further, an indicator at telephone 104 may be provided to allow the user at telephone 104 to have a visual queue that a privacy feature has been initiated or activated. Such a feature helps the user at telephone 102 to preserve the confidentiality of information in the event that privacy from others may not be found where telephone 102 is located. This feature is especially useful for when the conversation is between two persons rather than with an automated machine on the other end. In this manner, confidential or private information, such as a social security number or date of birth, may be transmitted by a user from telephone 102 to a user at telephone 104 .
- confidential or private information such as a social security number or date of birth
- FIG. 2 is a block diagram of a communications device in which a preferred embodiment of the present invention may be implemented.
- Communication device 200 is a telephone that includes processor 202 and memory 204 .
- Processor 202 functions to control operation of communication device 200 and may be a general-purpose microprocessor operating under the control of instructions stored in a memory, such as memory 204 , or device-specific circuitry for controlling the operation of the telephone device.
- Processor 202 is connected by system bus 206 to transmitter 208 , receiver 210 , keypad 214 , display 216 , and audio processor 218 .
- Keypad 214 is the user interface for non verbal input in these illustrative examples and may be a numeric keypad and may include other function buttons or alpha character buttons.
- Keypad 214 generates signals, in these examples, which are dual tone multi frequency (DTMF) signals used by touchtone telephones. With DTMF signals, a specific frequency or tone is assigned to each key to allow the signals to be easily identified by a processor.
- DTMF dual tone multi frequency
- Display 216 in communication device 200 may be any type of display device including a liquid crystal display (LCD) or other known displays, such as a cathode ray tube or active matrix display.
- LCD liquid crystal display
- other known displays such as a cathode ray tube or active matrix display.
- Transmitter 208 and receiver 210 are coupled to a telephone signal by interface 224 to provide full duplex communication.
- the telephone signal may be provided by a telephone line (not shown) in a land-based telephone or an antenna, for a wireless telephone.
- Audio processing circuit 218 provides basic analog audio outputs to speaker 220 and accepts analog audio inputs from microphone 222 .
- Received signals are demodulated and decoded by receiver 210 .
- Transmitter 208 encodes and modulates signals passed to it by processor 202 or audio processor 218 .
- the output of the transmitter is amplified by power amplifier 212 to control the power level at which the signal is transmitted.
- Processor 202 or audio processor 218 may detect audible call status information and call status codes received by receiver 210 .
- Memory 204 may include a lookup table associating call status information or call status codes with visual call status information, such as text messages.
- Processor 202 detects or receives a call status code and displays an appropriate call status message on display 216 .
- FIG. 2 may vary.
- Communications devices may take various forms, such as a LAN line telephone or a wireless mobile phone.
- the privacy or security feature of the present invention may be implemented as logic within communication device 200 .
- instructions may be included for execution by a processor to a tube to provide the privacy or security feature of the present invention.
- an applications specific integrated circuit may be designed to provide these features with such an ASIC being connected to system bus 206 .
- DTMF tones generated by keypad 214 may be transformed or converted into speech for transmission to a receiving party when providing secure data transfer features of the present invention.
- display 216 may provide an indicator, such as a message “privacy feature enabled” when the privacy or security feature has been activated.
- a data processing system such as server 108 in FIG. 1 may receive signals, such as DTMF signals generated by a keypad on a user communications device, such as communication device 200 in FIG. 2 . These DTMF tones may then be converted into voice for transmission to the called or receiving party for the call in progress.
- Data processing system 300 may be a symmetric multiprocessor (SMP) system including a plurality of processor 302 and 304 connected to system bus 306 . Alternatively, a single processor system may be employed. Also connected to system bus 306 is memory controller/cache 308 , which provides an interface to local memory 309 . I/O bus bridge 310 is connected to system bus 306 and provides an interface to I/O bus 312 . Memory controller/cache 308 and I/O bus bridge 310 may be integrated as depicted.
- SMP symmetric multiprocessor
- Peripheral component interconnect (PCI) bus bridge 314 connected to I/O bus 312 provides an interface to PCI local bus 316 .
- PCI Peripheral component interconnect
- a number of modems may be connected to PCI local bus 316 .
- Typical PCI bus implementations will support four PCI expansion slots or add-in connectors.
- Additional PCI bus bridges 322 and 324 provide interfaces for additional PCI local buses 326 and 328 , from which additional modems or network adapters may be supported. In this manner, data processing system 300 allows connections to multiple computers, routers or other devices in a communications system.
- a memory-mapped graphics adapter 330 and hard disk 332 may also be connected to I/O bus 312 as depicted, either directly or indirectly.
- FIG. 3 may vary.
- other peripheral devices such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted.
- the depicted example is not meant to imply architectural limitations with respect to the present invention.
- the data processing system depicted in FIG. 3 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, New York, running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
- IBM eServer pSeries system a product of International Business Machines Corporation in Armonk, New York, running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
- AIX Advanced Interactive Executive
- FIG. 4 a block diagram illustrating components used in providing for a secure transfer of information is depicted in accordance with a preferred embodiment of the present invention.
- secure logic 400 provides the privacy or security feature of the present invention for providing secure transfer of data.
- Secure logic 400 may be implemented using a processor or an ASIC, depending on the particular application.
- a button may be specifically assigned to activate the feature in secure logic 400 .
- a sequence of buttons depressed on a typical keypad may be used to initiate the secure data transfer features provided by secure logic 400 .
- a “*15” may be depressed by the user on keypad 404 to initiate the secure data transfer feature of the present invention.
- input is taken from keypad 404 and not microphone 402 by secure logic 400 .
- signals from keypad 404 are translated or converted into speech by speech converter 406 . This speech is then transmitted through transmitter 408 onto the communications network for receipt by a called party.
- a signal may be sent to the called party to generate an indication that a privacy feature has been initiated by the calling party.
- Indicator 410 may be activated by secure logic 400 .
- the indicator may be the display of a message on a LCD or a blinking light, depending on the particular implementation.
- the signal may be a particular DTMF tone or sequence of DTMF tones to indicate activation of the features in the illustrative examples.
- FIG. 4 may be implemented in a communications device, such as communication device 200 in FIG. 2 . These components are shown to illustrate the features of the present invention and are not meant as limitations to the architecture of devices in which the present invention may be implemented. In the depicted implementation no modifications are necessary to communications network to allow this data transfer feature to be enabled. In other implementations, the feature may be provided through the communications network.
- FIG. 5 a diagram illustrating components used in providing a secure data transfer feature in a communications network is depicted in accordance with a preferred embodiment of the present invention.
- a user at a telephone may generate voice transmissions through microphone 500 and also may generate signals to activate a secure data transfer feature through keypad 502 .
- the secure data transfer feature of the present invention in these illustrative examples may be activated through a voice command or some other user input, such as depressing one or more keys on a keypad, entered by the user. These transmissions are sent onto the communications network by transmitter 504 in these examples.
- server process 506 provides the secure data transfer feature.
- server process 506 takes signals generated by keypad 502 and converts those signals into voice or speech for transmission to a called party. Additionally, server process 506 also may generate a signal to activate an indicator on the called party to indicate that the secure data transfer feature has been enabled.
- server process 506 may be implemented in a data processing system, such as data processing system 300 in FIG. 3 .
- FIG. 6 a flowchart of a process for providing secure data transmission is depicted in accordance with a preferred embodiment of the present invention.
- the process illustrated in FIG. 6 may be implemented in a communications device, such as communication device 200 in FIG. 2 .
- the process begins by determining whether the secure data transfer feature has been activated (step 600 ). The process returns to step 600 until the privacy feature has been enabled.
- the privacy feature may be enabled through some user input. This user input may be, for example, a signal or series of signals generated by keypad or a voice command, depending on the particular implementation.
- Step 602 is an optional step in these examples.
- Input is then received from the keypad (step 604 ).
- the signals generated from the keypad are converted into voice or speech (step 606 ).
- each of the keys assigned a number may have signals from that particular key converted into a spoken representation of the number. For example, a number “1” may be converted into the spoken word “one” by a text to speech converter. Further, different keys may be assigned different words for conversion from text to speech depending on the particular implementation. In this manner, different types of user input may be converted into different voice transmissions depending on the particular use.
- step 608 The speech is then transmitted onto the communications network (step 608 ).
- step 610 a determination is made as to whether the secure data transfer feature has been deactivated. If the privacy feature has not been deactivated, the process then returns to step 604 . Otherwise, the input from the keypad is turned off or ignored (step 612 ) and the input from the microphone is turned back on with the process then returning to step 600 as described above.
- FIG. 7 a flowchart of a process for providing a secure data transfer feature in a communications system is depicted in accordance with a preferred embodiment of the present invention.
- the process illustrated in FIG. 7 may be implemented in a component in a communications system, such as data processing system 300 in FIG. 3 .
- the process begins by determining whether an indication to enable a secure data transfer state has been received (step 700 ). The process continues to return to step 700 until such an indication is received.
- a signal from the keypad is received for processing (step 702 ).
- the keypad signal is converted into a speech signal (step 704 ).
- the speech signal is then transmitted to the called party (step 706 ).
- a determination is made as to whether an indication has been received to exit the secure data transfer state (step 708 ). If such an indication is received, the process returns to step 700 as described above. Otherwise, the process returns to step 702 to receive another keypad signal.
- the financial service provider representative would authenticate the client credentials by asking for client's date of birth, social security number, address, and possibly mother's maiden name or such secret password.
- client information is present: the client date of birth is Jan. 1, 1975, the client social security number is 012-34-5678, and the client password is secret123.
- the client switches the conversation to secret or secure mode.
- the client presses *#* (star, pound, star) to set the telephone to a privacy mode.
- *#* star, pound, star
- the telephone keypad's privacy mode indicator lamp lights up on both ends of telephone line.
- the client proceeds to answer the representative's first question of DOB in privacy mode.
- the client presses the following series of keys “01011975” for the date of birth in a MMDDYYYY format. This information is relayed to the remote side in either voice, display, or some other special mode such as Braille.
- the representative then presses *#* on the phone keypad to toggle telephone to public mode and ask the client for a social security number.
- client presses *#* to set the telephone back to a privacy mode.
- the telephone keypad's privacy mode indicator lamp lights up on both ends of the telephone line. Now both parties are aware that they are operating in privacy mode and the phone instruments and all other intermediate pieces are made aware of privacy mode of operation.
- the client proceeds to answer the representative's second question requesting the social security number in the privacy mode.
- the client presses the following set of keys “012345678” for the social security number NNN-NN-NNNN format. This information is again relayed to the remote side in either voice or display or some other special mode such as Braille.
- keypad interprets the key inputs in alphabetical mode.
- the process reads two digits at a time to derive a letter.
- “73” maps to the letter “S” since on numeric key “7” three alphabetical letters “P ”, “R”, and “S” are present.
- Letter “S” is in 3 rd position on numeric key “7” indicating letter “S”.
- This information is relayed to the remote side in either voice or display or some other special mode such as Braille.
- the client telephone may remain in the privacy mode while the representative's phone may allow for voice transmissions to the client.
- the present invention provides an improved method, apparatus, and computer instructions for enabling a secure transfer of data over a communications network between two parties.
- the mechanism of the present invention allows a calling party to enter a secure transfer state in which signals from a keypad are converted into speech. The speech signal is then sent to the called party. In this manner, the calling party may send private or confidential information without others overhearing the information when the calling party is in a location that does not allow for privacy with respect to voice communications.
- the mechanism of the present invention may be applied to many situations lacking privacy such as public telephone booths, shared office rooms, or even in mobile phones being used by people in public places such as in trains or at concerts.
Abstract
Description
- 1. Technical Field
- The present invention relates generally to an improved communications system and in particular to a method and apparatus for transferring data over a communications system. Still more particularly, the present invention relates to a method, apparatus, and computer instructions for securely transferring data over a communications system.
- 2. Description of Related Art
- The public switched telephone network (PSTN) is the oldest and largest telecommunications network in existence. The PSTN is an analog network providing analog access at the 300 Hz to 3400 Hz range. Other types of communications networks use digital technologies, such as integrated services digital network (ISDN) and fiber distributed data interface (FDDI). Communications networks are used for many different purposes. For example, users or customers may talk to friends or relatives using the communications network. Further, business transactions may be conducted using a communications network.
- In some cases, it may be necessary for a customer or user to communicate personal and confidential information to another person on the other end of a phone line in a communications network. This communication of information may occur without adequate privacy for one or both parties on the phone line. Such a situation may occur when two or more people share an office or when a call is made from a public telephone. In some cases, inquiries or requests may require the exchange of private information.
- For example, if a customer calls a number for company benefits, a bank, a hospital, or an investment firm, private or confidential information may be required as part of the transaction or conversation. Typically, one customer or user may be required to give a social security number, age, date of birth, or password to verify or obtain authorization to obtain information or perform various transactions. Currently, a customer or user must find a private location or speak in a low enough voice to avoid others overhearing the private or confidential information. In some cases, the user may not be able to find a private location in which to convey this information.
- Therefore, it would be advantageous to have an improved method, apparatus, and computer instructions for securely transferring information over a communications network during interactive conversations between users.
- The present invention provides a method, apparatus, and computer instructions for securely transferring information in a communications system. Signals are generated by a communications keypad. In response to receiving an input indicating activation of a secure data transfer mode, these signals are converted from the communications keypad into speech signals, and the speech signals are transmitted to a receiving party.
- The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
-
FIG. 1 is a communications network in accordance with a preferred embodiment of the present invention; -
FIG. 2 is a block diagram of a communications device in which a preferred embodiment of the present invention may be implemented; -
FIG. 3 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention; -
FIG. 4 is a block diagram illustrating components used in providing for a secure transfer of information in accordance with a preferred embodiment of the present invention; -
FIG. 5 is a diagram illustrating components used in providing a secure data transfer feature in a communications network in accordance with a preferred embodiment of the present invention; -
FIG. 6 is a flowchart of a process for providing secure data transmission in accordance with a preferred embodiment of the present invention; and -
FIG. 7 is a flowchart of a process for providing a secure data transfer feature and a communications system in accordance with a preferred embodiment of the present invention. - With reference now to the figures and in particular with reference to
FIG. 1 , a communications network is depicted in accordance with a preferred embodiment of the present invention.Communication network 100 is an example of a communications network in which the present invention may be implemented.Communication network 100 may include various networks, such as a public switched telephone network (PSTN), an integrated services digital network (ISDN), the Internet, or a fiber distributed data interface (FDDI) network.Communication network 100 may include copper wire, fiber optics, and wireless transmission links to provide for voice and data transmissions. - In these illustrative examples,
telephones communication network 100. A user attelephone 102 may initiate a call to a person attelephone 104 for an interactive conversation between users. Further,server 108 may provide various functions and features oncommunication network 100 including those of the present invention. - The present invention provides a method, apparatus, and computer instructions for a privacy or secure feature for interactive conversations between human parties over
communication network 100. A user attelephone 102 may indicate that a secure or privacy function is desired to initiate a secure data transfer function. When that function is activated, input is taken from a keypad or other non verbal user interface. The input from a microphone ontelephone 102 may be ignored depending on the particular implementation. The signals from the keypad are converted into speech and sent acrosscommunication network 100 totelephone 104. - This feature and the conversion of keypad signals into speech may be performed through logic located in
telephone 102. In other instances, this function may be provided as part ofcommunication network 100 throughserver 108. Further, an indicator attelephone 104 may be provided to allow the user attelephone 104 to have a visual queue that a privacy feature has been initiated or activated. Such a feature helps the user attelephone 102 to preserve the confidentiality of information in the event that privacy from others may not be found wheretelephone 102 is located. This feature is especially useful for when the conversation is between two persons rather than with an automated machine on the other end. In this manner, confidential or private information, such as a social security number or date of birth, may be transmitted by a user fromtelephone 102 to a user attelephone 104. - Next,
FIG. 2 is a block diagram of a communications device in which a preferred embodiment of the present invention may be implemented.Communication device 200 is a telephone that includesprocessor 202 andmemory 204.Processor 202 functions to control operation ofcommunication device 200 and may be a general-purpose microprocessor operating under the control of instructions stored in a memory, such asmemory 204, or device-specific circuitry for controlling the operation of the telephone device. -
Processor 202 is connected bysystem bus 206 totransmitter 208,receiver 210,keypad 214,display 216, andaudio processor 218. Keypad 214 is the user interface for non verbal input in these illustrative examples and may be a numeric keypad and may include other function buttons or alpha character buttons. Keypad 214 generates signals, in these examples, which are dual tone multi frequency (DTMF) signals used by touchtone telephones. With DTMF signals, a specific frequency or tone is assigned to each key to allow the signals to be easily identified by a processor. -
Display 216 incommunication device 200 may be any type of display device including a liquid crystal display (LCD) or other known displays, such as a cathode ray tube or active matrix display. -
Transmitter 208 andreceiver 210 are coupled to a telephone signal byinterface 224 to provide full duplex communication. The telephone signal may be provided by a telephone line (not shown) in a land-based telephone or an antenna, for a wireless telephone.Audio processing circuit 218 provides basic analog audio outputs tospeaker 220 and accepts analog audio inputs frommicrophone 222. Received signals are demodulated and decoded byreceiver 210.Transmitter 208 encodes and modulates signals passed to it byprocessor 202 oraudio processor 218. The output of the transmitter is amplified bypower amplifier 212 to control the power level at which the signal is transmitted. -
Processor 202 oraudio processor 218 may detect audible call status information and call status codes received byreceiver 210.Memory 204 may include a lookup table associating call status information or call status codes with visual call status information, such as text messages.Processor 202 detects or receives a call status code and displays an appropriate call status message ondisplay 216. Those of ordinary skill in the art will appreciate that the hardware depicted inFIG. 2 may vary. - Communications devices may take various forms, such as a LAN line telephone or a wireless mobile phone. In these examples, the privacy or security feature of the present invention may be implemented as logic within
communication device 200. Specifically, instructions may be included for execution by a processor to a tube to provide the privacy or security feature of the present invention. Alternatively, an applications specific integrated circuit may be designed to provide these features with such an ASIC being connected tosystem bus 206. DTMF tones generated bykeypad 214 may be transformed or converted into speech for transmission to a receiving party when providing secure data transfer features of the present invention. Additionally,display 216 may provide an indicator, such as a message “privacy feature enabled” when the privacy or security feature has been activated. - In another embodiment of the present invention, a data processing system, such as
server 108 inFIG. 1 may receive signals, such as DTMF signals generated by a keypad on a user communications device, such ascommunication device 200 inFIG. 2 . These DTMF tones may then be converted into voice for transmission to the called or receiving party for the call in progress. - Referring to
FIG. 3 , a block diagram of a data processing system that may be implemented as a server, such asserver 108 inFIG. 1 , is depicted in accordance with a preferred embodiment of the present invention.Data processing system 300 may be a symmetric multiprocessor (SMP) system including a plurality ofprocessor system bus 306. Alternatively, a single processor system may be employed. Also connected tosystem bus 306 is memory controller/cache 308, which provides an interface tolocal memory 309. I/O bus bridge 310 is connected tosystem bus 306 and provides an interface to I/O bus 312. Memory controller/cache 308 and I/O bus bridge 310 may be integrated as depicted. - Peripheral component interconnect (PCI)
bus bridge 314 connected to I/O bus 312 provides an interface to PCIlocal bus 316. A number of modems may be connected to PCIlocal bus 316. Typical PCI bus implementations will support four PCI expansion slots or add-in connectors. - Additional
PCI bus bridges local buses data processing system 300 allows connections to multiple computers, routers or other devices in a communications system. A memory-mappedgraphics adapter 330 andhard disk 332 may also be connected to I/O bus 312 as depicted, either directly or indirectly. - Those of ordinary skill in the art will appreciate that the hardware depicted in
FIG. 3 may vary. For example, other peripheral devices, such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted. The depicted example is not meant to imply architectural limitations with respect to the present invention. - The data processing system depicted in
FIG. 3 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, New York, running the Advanced Interactive Executive (AIX) operating system or LINUX operating system. - Turning next to
FIG. 4 , a block diagram illustrating components used in providing for a secure transfer of information is depicted in accordance with a preferred embodiment of the present invention. In this example,secure logic 400 provides the privacy or security feature of the present invention for providing secure transfer of data.Secure logic 400 may be implemented using a processor or an ASIC, depending on the particular application. - Typically, during a telephone call, speech is detected by
microphone 402 and transmitted to a called party. Additionally, signals may be generated bykeypad 404. In these examples, the signals are DTMF tones. The secure data transfer feature of the present invention may be activated in a number of different ways in these examples. For example, a button may be specifically assigned to activate the feature insecure logic 400. Alternatively, a sequence of buttons depressed on a typical keypad may be used to initiate the secure data transfer features provided bysecure logic 400. For example, a “*15” may be depressed by the user onkeypad 404 to initiate the secure data transfer feature of the present invention. When this feature is initiated in these examples, input is taken fromkeypad 404 and notmicrophone 402 bysecure logic 400. In these examples, signals fromkeypad 404 are translated or converted into speech byspeech converter 406. This speech is then transmitted throughtransmitter 408 onto the communications network for receipt by a called party. - Further, a signal may be sent to the called party to generate an indication that a privacy feature has been initiated by the calling party.
Indicator 410 may be activated bysecure logic 400. In these examples, the indicator may be the display of a message on a LCD or a blinking light, depending on the particular implementation. The signal may be a particular DTMF tone or sequence of DTMF tones to indicate activation of the features in the illustrative examples. - The components illustrated in
FIG. 4 may be implemented in a communications device, such ascommunication device 200 inFIG. 2 . These components are shown to illustrate the features of the present invention and are not meant as limitations to the architecture of devices in which the present invention may be implemented. In the depicted implementation no modifications are necessary to communications network to allow this data transfer feature to be enabled. In other implementations, the feature may be provided through the communications network. - Turning next to
FIG. 5 , a diagram illustrating components used in providing a secure data transfer feature in a communications network is depicted in accordance with a preferred embodiment of the present invention. In this illustrative example, a user at a telephone may generate voice transmissions throughmicrophone 500 and also may generate signals to activate a secure data transfer feature throughkeypad 502. - The secure data transfer feature of the present invention in these illustrative examples may be activated through a voice command or some other user input, such as depressing one or more keys on a keypad, entered by the user. These transmissions are sent onto the communications network by
transmitter 504 in these examples. - In this illustrative example,
server process 506 provides the secure data transfer feature. When a signal is generated to indicate that such a feature is to be enabled,server process 506 takes signals generated bykeypad 502 and converts those signals into voice or speech for transmission to a called party. Additionally,server process 506 also may generate a signal to activate an indicator on the called party to indicate that the secure data transfer feature has been enabled. - In this manner, such a feature may be provided to users without requiring users to have special equipment in their communications devices to use this secure data transfer feature of the present invention. In these examples,
server process 506 may be implemented in a data processing system, such asdata processing system 300 inFIG. 3 . - Turning next to
FIG. 6 , a flowchart of a process for providing secure data transmission is depicted in accordance with a preferred embodiment of the present invention. The process illustrated inFIG. 6 may be implemented in a communications device, such ascommunication device 200 inFIG. 2 . - The process begins by determining whether the secure data transfer feature has been activated (step 600). The process returns to step 600 until the privacy feature has been enabled. In these examples, the privacy feature may be enabled through some user input. This user input may be, for example, a signal or series of signals generated by keypad or a voice command, depending on the particular implementation.
- Once the privacy feature has been activated, input is turned off from the microphone (step 602). Step 602 is an optional step in these examples. Input is then received from the keypad (step 604). The signals generated from the keypad are converted into voice or speech (step 606).
- This signal to speech conversion may be implemented in different ways. For example, each of the keys assigned a number may have signals from that particular key converted into a spoken representation of the number. For example, a number “1” may be converted into the spoken word “one” by a text to speech converter. Further, different keys may be assigned different words for conversion from text to speech depending on the particular implementation. In this manner, different types of user input may be converted into different voice transmissions depending on the particular use.
- The speech is then transmitted onto the communications network (step 608). Next, a determination is made as to whether the secure data transfer feature has been deactivated (step 610). If the privacy feature has not been deactivated, the process then returns to step 604. Otherwise, the input from the keypad is turned off or ignored (step 612) and the input from the microphone is turned back on with the process then returning to step 600 as described above.
- Turning next to
FIG. 7 , a flowchart of a process for providing a secure data transfer feature in a communications system is depicted in accordance with a preferred embodiment of the present invention. The process illustrated inFIG. 7 may be implemented in a component in a communications system, such asdata processing system 300 inFIG. 3 . - The process begins by determining whether an indication to enable a secure data transfer state has been received (step 700). The process continues to return to step 700 until such an indication is received. Upon receiving an indication to enable the secure data transfer state, a signal from the keypad is received for processing (step 702). The keypad signal is converted into a speech signal (step 704). The speech signal is then transmitted to the called party (step 706). Next, a determination is made as to whether an indication has been received to exit the secure data transfer state (step 708). If such an indication is received, the process returns to step 700 as described above. Otherwise, the process returns to step 702 to receive another keypad signal.
- The components and processes of present invention in the illustrative examples described above may be implemented for use in many situations in which privacy or secure transfer of information is required. For example, in a financial transaction, an individual client talks to a financial service provider representative on a telephone that is located in an environment that does not provide privacy, such as a shared office space or public telephone booth setting.
- Typically, the financial service provider representative would authenticate the client credentials by asking for client's date of birth, social security number, address, and possibly mother's maiden name or such secret password. In this illustrative example, the following client information is present: the client date of birth is Jan. 1, 1975, the client social security number is 012-34-5678, and the client password is secret123.
- After the initial conversation between the parties, the client switches the conversation to secret or secure mode. First, on the phone keypad, the client presses *#* (star, pound, star) to set the telephone to a privacy mode. Next, the telephone keypad's privacy mode indicator lamp lights up on both ends of telephone line. Now both parties are aware that they are operating in a privacy mode, and the phone instruments and all other intermediate components are made aware of privacy mode of operation.
- Now, the client proceeds to answer the representative's first question of DOB in privacy mode. The client presses the following series of keys “01011975” for the date of birth in a MMDDYYYY format. This information is relayed to the remote side in either voice, display, or some other special mode such as Braille. The representative then presses *#* on the phone keypad to toggle telephone to public mode and ask the client for a social security number. On the phone keypad, client presses *#* to set the telephone back to a privacy mode. The telephone keypad's privacy mode indicator lamp lights up on both ends of the telephone line. Now both parties are aware that they are operating in privacy mode and the phone instruments and all other intermediate pieces are made aware of privacy mode of operation.
- The client proceeds to answer the representative's second question requesting the social security number in the privacy mode. The client presses the following set of keys “012345678” for the social security number NNN-NN-NNNN format. This information is again relayed to the remote side in either voice or display or some other special mode such as Braille.
- After receiving the information, representative presses “*#*” on the phone keypad to toggle telephones back to a public mode and asks the client for the secret password now. On the phone keypad, the client presses “*#*”. The telephone keypad's privacy mode indicator lamp lights up on both ends of line. Now both parties are aware that they are operating in privacy mode and the phone instruments and all other intermediate pieces are made aware of privacy mode of operation. The client then proceeds to answer the representative's third question of secret password in the privacy mode. The client presses the following series of keys “**733223723281**123” to send the secret password.
- When “**” is pressed on the phone keypad, keypad interprets the key inputs in alphabetical mode. The process reads two digits at a time to derive a letter. For example, “73” maps to the letter “S” since on numeric key “7” three alphabetical letters “P ”, “R”, and “S” are present. Letter “S” is in 3rd position on numeric key “7” indicating letter “S”. Using this logic, the following are the mappings for this illustrative example, **—alphabetical mode; 73—S; 32—E; 23—C; 72—R; 32—E; 81—T; and **—Numeric Mode; 1; 2; and 3.
- This information is relayed to the remote side in either voice or display or some other special mode such as Braille. Depending on the implementation, the client telephone may remain in the privacy mode while the representative's phone may allow for voice transmissions to the client.
- Thus, the present invention provides an improved method, apparatus, and computer instructions for enabling a secure transfer of data over a communications network between two parties. The mechanism of the present invention allows a calling party to enter a secure transfer state in which signals from a keypad are converted into speech. The speech signal is then sent to the called party. In this manner, the calling party may send private or confidential information without others overhearing the information when the calling party is in a location that does not allow for privacy with respect to voice communications. The mechanism of the present invention may be applied to many situations lacking privacy such as public telephone booths, shared office rooms, or even in mobile phones being used by people in public places such as in trains or at concerts.
- Further, this feature is especially useful when the called party is another human user. The conversion of the keypad signals into speech allows the called party to receive and understand the private or confidential information.
- It is important to note that while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer readable medium of instructions and a variety of forms and that the present invention applies equally regardless of the particular type of signal bearing media actually used to carry out the distribution. Examples of computer readable media include recordable-type media, such as a floppy disk, a hard disk drive, a RAM, CD-ROMs, DVD-ROMs, and transmission-type media, such as digital and analog communications links, wired or wireless communications links using transmission forms, such as, for example, radio frequency and light wave transmissions. The computer readable media may take the form of coded formats that are decoded for actual use in a particular data processing system.
- The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/675,742 US6879669B1 (en) | 2003-09-30 | 2003-09-30 | Method and apparatus for enabling a privacy feature in a communications network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/675,742 US6879669B1 (en) | 2003-09-30 | 2003-09-30 | Method and apparatus for enabling a privacy feature in a communications network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050069106A1 true US20050069106A1 (en) | 2005-03-31 |
US6879669B1 US6879669B1 (en) | 2005-04-12 |
Family
ID=34377255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/675,742 Expired - Fee Related US6879669B1 (en) | 2003-09-30 | 2003-09-30 | Method and apparatus for enabling a privacy feature in a communications network |
Country Status (1)
Country | Link |
---|---|
US (1) | US6879669B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130339008A1 (en) * | 2012-06-07 | 2013-12-19 | Samsung Electronics Co., Ltd. | Device and method for maintaining voice communication security in terminal |
US20150373406A1 (en) * | 2008-10-31 | 2015-12-24 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7170977B2 (en) * | 2003-04-01 | 2007-01-30 | Fairleigh Dickinson University | Telephone interface for a handicapped individual |
KR100714725B1 (en) * | 2005-08-29 | 2007-05-07 | 삼성전자주식회사 | Apparatus and method for protecting exposure of inputted information |
WO2009098704A2 (en) * | 2008-02-06 | 2009-08-13 | Onmobile Global Limited | Method and system for secure data transfer |
US11355034B2 (en) * | 2018-03-10 | 2022-06-07 | John Gutmann | Systems and methods of braille transceiving |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455861A (en) * | 1991-12-09 | 1995-10-03 | At&T Corp. | Secure telecommunications |
US5594798A (en) * | 1991-12-09 | 1997-01-14 | Lucent Technologies Inc. | Secure telecommunications |
US5974142A (en) * | 1993-08-27 | 1999-10-26 | Lucent Technologies, Inc. | Secure telecommunications |
US5995590A (en) * | 1998-03-05 | 1999-11-30 | International Business Machines Corporation | Method and apparatus for a communication device for use by a hearing impaired/mute or deaf person or in silent environments |
US6266418B1 (en) * | 1998-10-28 | 2001-07-24 | L3-Communications Corporation | Encryption and authentication methods and apparatus for securing telephone communications |
-
2003
- 2003-09-30 US US10/675,742 patent/US6879669B1/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455861A (en) * | 1991-12-09 | 1995-10-03 | At&T Corp. | Secure telecommunications |
US5594798A (en) * | 1991-12-09 | 1997-01-14 | Lucent Technologies Inc. | Secure telecommunications |
US5974142A (en) * | 1993-08-27 | 1999-10-26 | Lucent Technologies, Inc. | Secure telecommunications |
US5995590A (en) * | 1998-03-05 | 1999-11-30 | International Business Machines Corporation | Method and apparatus for a communication device for use by a hearing impaired/mute or deaf person or in silent environments |
US6266418B1 (en) * | 1998-10-28 | 2001-07-24 | L3-Communications Corporation | Encryption and authentication methods and apparatus for securing telephone communications |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150373406A1 (en) * | 2008-10-31 | 2015-12-24 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US10469901B2 (en) * | 2008-10-31 | 2019-11-05 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US11070874B2 (en) | 2008-10-31 | 2021-07-20 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US11778268B2 (en) | 2008-10-31 | 2023-10-03 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US20130339008A1 (en) * | 2012-06-07 | 2013-12-19 | Samsung Electronics Co., Ltd. | Device and method for maintaining voice communication security in terminal |
Also Published As
Publication number | Publication date |
---|---|
US6879669B1 (en) | 2005-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6490343B2 (en) | System and method of non-spoken telephone communication | |
KR940006007B1 (en) | Telephone answering service with integrated voice and textual message storage | |
JP3651508B2 (en) | Information processing apparatus and information processing method | |
KR20000005679A (en) | Method and Apparatus for transmitting data to a pager in a communications system | |
US20070015496A1 (en) | Method and apparatus for rejecting call reception in a mobile communication terminal | |
US6879669B1 (en) | Method and apparatus for enabling a privacy feature in a communications network | |
KR101506434B1 (en) | Method of counsulting with changing a text to a voice | |
US6728342B2 (en) | TTY messaging | |
WO2003098955A1 (en) | Information communication system | |
KR20030040570A (en) | Caller identity input/display terminal, method of processing caller identity to the terminal, system and method for offering caller identity registration service on based web | |
TW544590B (en) | Fax server system and method | |
EP1298943A2 (en) | Method for processing incoming call in telephone having electronic mail function | |
US6882717B2 (en) | Undetected provision of auxiliary services during a telephone conversation | |
JPH09266510A (en) | System for generating message to pager | |
KR100362526B1 (en) | Telephone instrument having a response function of indirect voice | |
US6775379B1 (en) | Method for automatic input and transmission of pass word in using telephone set | |
JP2000224306A (en) | Mail server for transmitting character message over mobile telephone terminals of different communication common carriers | |
KR20010035279A (en) | Method of book a ticket using Calling Identity Delivery Equipment | |
TW465218B (en) | Method and system for sending E-mail by telephone | |
KR20010004868A (en) | Apparatus for call waiting service of a telephone set | |
JPH1146240A (en) | Portable communication terminal provided with voice notice function | |
US9197449B1 (en) | Apparatus and method for providing enhanced telecommunication terminal status information | |
JPH1117825A (en) | Telephone system | |
KR20070082661A (en) | Method and apparatus for serving emergency call of mobile terminal using a voice message | |
JPH04355555A (en) | Voice transmission method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PEREPA, BHARGAV V.;PEREPA, SUJATHA;VENKATARAMAPPA, VISHWANATH;REEL/FRAME:014572/0976 Effective date: 20030929 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20170412 |