Point-to-point secure modem and method

Pulse or digital communications – Transceivers – Modems

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C375S261000

Reexamination Certificate

active

06463094

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to modems generally and to generally secure point-to-point modems in particular.
BACKGROUND OF THE INVENTION
Personal computers are known in the art and have been widely available for some years. They are becoming more and more popular in the office and at home, especially for communication purposes, whether to send electronic mail, to “surf” the World Wide Web on the Internet or to talk via the Internet. Unfortunately, such actions leave the computer vulnerable to attack from the outside. There are several solutions to the problem, all of which operate at the higher layers of communication.
One solution is a “firewall” which considers a selected connection and determines if such a selection is of the allowable type. If the desired connection is not allowed, the communication is closed. This solution operates at the application layer (layer
7
).
Other solutions operate at the presentation, or sixth, layer. One involves data encryption in which all data is encrypted to ensure that, if an unauthorized user receives the data, he cannot understand it. The second solution at this layer utilizes a password. Communication between two modems is only allowed if the user requesting the communication has the correct password.
Callback modems operate at the fifth, or session, layer. These modems provide an initial session in which a requesting user provides his password. The session is then closed and the callback modem “calls back” to the phone number associated with the requesting user whose password was received. If the requesting user is at the phone number, the two modems will communicate. Otherwise, no communication will occur.
All of the above described methods permit a connection to occur and there are still chances that an intruder can break into the system being protected, despite the protection methods.
SUMMARY OF THE PRESENT INVENTION
It is therefore an object of the present invention to provide a modem which attempts to prevent a communication session from being established except between two authorized users.
There is therefore provided, in accordance with a preferred embodiment of the present invention, a modem including a symbol converting unit and a processing unit. The symbol converting unit converts between binary data and symbol data in accordance with a first constellation which is a transformed version of a standard constellation. The processing unit processes the symbol data for transmission and produces symbol data from received signals.
Additionally, in accordance with a preferred embodiment of the present invention, the modem includes a unit for generating the first constellation by placing symbols generally midway between at least two neighboring symbols of the standard constellation.
Moreover, in accordance with a preferred embodiment of the present invention, the transformed constellations are one of the following: translations, rotations and redefinitions of the standard constellations. The transformation can be half the size of a trellis subset. The present invention can include a unit for generating the first constellation by translating the standard constellation by more than half a symbol and also comprising unit for folding the constellation.
Alternatively, in accordance with a preferred embodiment of the present invention, the symbol converting unit can convert between binary data and symbol data in accordance with at least two different constellations. In this embodiment, the symbol converting unit can include a constellation changing unit for determining which constellation, of the at least two constellations, to utilize at any given time.
Moreover, in accordance with a preferred embodiment of the present invention, the modem can include a unit for maintaining the quality of modulation substantially the same as for the original modulation technique.
Furthermore, there is also provided, in accordance with a preferred embodiment of the present invention, a communication system including a host modem and at least one remote modem. The host modem includes a host unit for communicating via a constellation and a host unit for selecting one transformed constellation among a plurality of transformed constellations for use by the host unit for communicating. Each remote modem includes a remote unit for communicating via a constellation and a remote unit for activating the one transformed constellation for use by the remote unit for communicating.
Additionally, in accordance with a preferred embodiment of the present invention, the host unit includes a unit for indicating the selected transformed constellation to the at least one remote modem.
Moreover, in accordance with a preferred embodiment of the present invention, the remote modem includes a unit for identifying the remote modem to the host.
Further, in accordance with a preferred embodiment of the present invention, the host unit for selecting includes a unit for changing the transformed constellation after a predetermined number of symbols have been communicated. The unit for changing typically includes a unit for determining the time to change which typically uses at least one of the following as input: user identification, session duration, time and date.
Finally, the present invention includes the methods performed by the various modems and system described hereinabove.


REFERENCES:
patent: 4439863 (1984-03-01), Bellamy
patent: 4495619 (1985-01-01), Acampora
patent: 4894844 (1990-01-01), Forney, Jr.
patent: 5058134 (1991-10-01), Chevillat et al.
patent: 5063574 (1991-11-01), Moose
patent: 5081649 (1992-01-01), Kennard
patent: 5195107 (1993-03-01), Wei
patent: 5267021 (1993-11-01), Ramchandran et al.
patent: 5311547 (1994-05-01), Wei
patent: 5541955 (1996-07-01), Jacobsmeyer
patent: 5581578 (1996-12-01), De Bot
patent: 5628013 (1997-05-01), Anderson et al.
patent: 5710793 (1998-01-01), Greenberg
patent: 5721922 (1998-02-01), Dingwall
patent: 5832044 (1998-11-01), Sousa et al.
patent: 5953376 (1999-09-01), Wei
patent: 5970088 (1999-10-01), Chen
patent: 6092095 (2000-07-01), Maytal

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Point-to-point secure modem and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Point-to-point secure modem and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Point-to-point secure modem and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2993003

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.