Java applications for secured palm held cellular communications

ABSTRACT

The present invention is a data processing apparatus and method for encrypting, sending, receiving, and decrypting secure transmissions using a cellular telephone. The user may either purchase a cellular telephone which contains the encryption and decryption software, download the encryption and decryption software to an existing cellular telephone, or may purchase an encryption component which is adaptable to a conventional cellular telephone. Additionally, the described system of encryption and decryption can be used for secure communications in PDA/cellular telephones combinations and any other type of portable communications device.  
     The encryption process is a Java application which converts the user&#39;s audio signal into a wav file. The encryption program then creates a second wav file using the first wav file header. The encryption program then converts the data in the first wav file into encrypted data in the second wav file using public key encryption and a series of data manipulations. The encrypted second wav file is then transmitted to the intended recipient. Only recipients with the corresponding private key which matches the public key used to encrypt the data will be able to decrypt the transmitted data.  
     In the decryption process, the user receives a wav file transmitted from the sender. The decryption program then decrypts the encrypted wav file using public key encryption and a series of data manipulations. The decryption program then converts the encrypted data in the first wav file into decrypted data in the second wav file using public key encryption and a series of data manipulations. The decrypted second wav file is then emitted over a speaker to the intended recipient.

CROSS-REFERENCE TO RELATED APPLICATION

[0001] The present invention is related to the subject matter ofco-pending U.S. patent application number 10/042,505 entitled “SecuredRadio Communications System, Method, and Computer Program Product,”filed on Jan. 9, 2002.

FIELD OF THE INVENTION

[0002] The present invention relates generally to the field of cellulartelephone communications, and more specifically to a data processingsystem, method, and apparatus for transmitting secure cellular telephonecommunications.

BACKGROUND OF THE INVENTION

[0003] Cellular telephones are well known in the art. A cellulartelephone is defined as a handheld computer, embedded controller, orembedded controller that includes a system unit having a centralprocessing unit (CPU) and associated volatile and non-volatile memory.The cellular telephone may also include random access memory (RAM),basic input/output system read only memory (BIOS ROM), an attached LCDdisplay touch screen, a pointing device to enter text (stylus), serialports, parallel ports, infrared ports, a wireless modem,analog-to-digital converters (ADC), digital-to-analog converters (DAC),or CODEC devices for connecting to the public telephone switchednetwork. One of the distinguishing characteristics about cellulartelephones is that the components are sufficiently small and modular toallow them to fit on a system board that fits into the user's hand andis powered by batteries.

[0004] Cellular telephones can receive input from either an internalmicrophone or an external microphone connected to the cellular telephonethrough a microphone port in the cellular telephone. Likewise, thesignal received by a cellular telephone can be emitted by either aninternal speaker or an external speaker connected to the cellulartelephone through a speaker port in the cellular telephone. Cellulartelephones transmit and receive information using radio signals and arecapable of sending and receiving radio signals in either an analog ordigital format. Unfortunately, the signal emitted form the cellulartelephone is not encrypted and can be monitored using radio scanners.Furthermore, even if an encrypted signal is sent to a cellulartelephone, existing technology does not provide the means for thecellular telephone to decrypt the signal.

[0005] Encryption algorithms which ensure that only the intendedrecipient of an electronic message will access the message are wellknown. One such method is the asymmetric or public key algorithmdescribed in U.S. Pat. No. 6,169,805 entitled “System and Method ofOperation for Providing User's Security on Demand Over InsecureNetworks.” The public key algorithm is a method for encryptingelectronic messages sent from a first entity to a second entity using apair of mathematical keys. The algorithm comprises a public key and aprivate key which are mathematically related such that if the privatekey is used to encrypt data, then only the matched public key can beused to decrypt the data, and vice-versa. Encryption keys may beobtained form a certificate authority, which is a mutually trusted thirdparty who issues digital certificates. The certificate authority matchesthe public and private keys to an identity, e-mail address, or similarinformation provided by the two original parties.

[0006] Secured telephone communications are essential to manyorganizations, particularly the military. Presently however, thepreferred method of sending and receiving encrypted data over a cellulartelephone is to purchase a telephone which is specifically designed forencrypted communication. Alternatively, separate equipment may bepurchased and utilized with conventional cellular telephones in order totransmit and receive encrypted telephone communications. Therefore, aneed exists for an apparatus, method, and system to allow a user toencrypt, transmit, receive, and decrypt data on conventional cellulartelephone.

SUMMARY OF THE INVENTON

[0007] The present invention, which meets the needs above, is a dataprocessing apparatus and method for encrypting, sending, receiving, anddecrypting secure transmissions using a cellular telephone. The user mayeither purchase a cellular telephone which contains the encryption anddecryption software, download the encryption and decryption software toan existing cellular telephone, or may purchase an encryption componentwhich is adaptable to a conventional cellular telephone. Additionally,the described system of encryption and decryption can be used for securecommunications in PDA/cellular telephones combinations and any othertype of portable communications device.

[0008] The encryption process is a Java application which converts theuser's audio signal into a wav file. The encryption program then createsa second wav file using the first wav file header. The encryptionprogram then converts the data in the first wav file into encrypted datain the second wav file using public key encryption and a series of datamanipulations. The encrypted second wav file is then transmitted to theintended recipient. Only recipients with the corresponding private keywhich matches the public key used to encrypt the data will be able todecrypt the transmitted data.

[0009] In the decryption process, the user receives a wav filetransmitted from the sender. The decryption program then decrypts theencrypted wav file using public key encryption and a series of datamanipulations. The decryption program then converts the encrypted datain the first wav file into decrypted data in the second wav file usingpublic key encryption and a series of data manipulations. The decryptedsecond wav file is then emitted over a speaker to the intendedrecipient.

BRIEF DESCRIPTION OF THE DRAWING

[0010]FIG. 1 is a pictorial representation of a cellular telephone.

[0011]FIG. 2 is a diagram of the data processing system contained withinthe cellular telephone of FIG. 1.

[0012]FIG. 3 is a diagram of a cellular telephone interacting withsoftware and external devices.

[0013]FIGS. 4A and 4B are a flow chart of the encryption programreceiving an audio signal, encrypting the signal, and transmitting theencrypted signal.

[0014]FIGS. 5A and 5B are a flow chart of the decryption programreceiving an encrypted signal, decrypting the signal, and emitting anaudio signal.

[0015]FIG. 6 is a flow chart illustrating the selection and de-selectionof secured transmissions.

[0016]FIG. 7 is a flow chart illustrating the process of a cellulartelephone initiating a communication process with another telephone.

[0017]FIG. 8 is a pictorial representation of the datum found in audiosector of a wav file and the encrypted data in the datum.

[0018]FIG. 9 is a graphical representation of a voice signal.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

[0019] The term “Java application” as used herein means any programwritten in the object-oriented programming language developed by SunMicrosystems. The term “wav file” as used herein means an audio fileformat developed by the Microsoft Corporation in which audio waveformsare stored as integers. The term “wav file header” as used herein meansan information structure in a wav file that precedes and identifies theinformation that follows in the remainder of the wav file. The wav fileheader includes the sampling rate for the wav file. The term “samplingrate” as used herein means the frequency with which samples of an analogaudio signal are taken when the analog audio signal is transformed intothe digital wav format. The term “total number of samples” as usedherein means the total number of integers that represent the raw audiosector data within the wav file. The term “loop invariant” means acondition that allows a program loop to reiterate and determines whenthe loop ends. The term “public key encryption” as used herein means anasymmetric scheme that uses a pair of keys for encryption where thepublic key encrypts the data, and a unique corresponding private keydecrypts the data. The process may be reversed where the sender uses theprivate key to encrypt data and only the people who have thecorresponding public key are able to decrypt the data. The term “privatekey” as used herein means one of the two keys in public key encryption.The user keeps the private key secret and uses it to encrypt data to besent by the user and to decrypt data received by the user. The term“public key” as used herein means the other one of the two keys inpublic key encryption. The user releases the public key to theauthorized recipients of the encrypted data, who can use it forencrypting data to be sent to the user and for decrypting data sent bythe user. The term “telephony” as used herein means a telephonetechnology-voice, fax, or modem transmissions based on either theconversion of sound into electrical signals or wireless communicationvia radio waves. The term “native” as used herein means of, pertainingto, or characteristic of something that is in its original form. Forexample, many applications are able to work with files in a number offormats; the format the application uses internally is its native fileformat. Files in other formats must be converted to the application'snative format before they can be processed by the application. The term“WAP” as used herein is an acronym for Wireless Application Protocol andmeans a standard for providing Internet access and other data-basedservices, such as e-mail, electronic transactions, news, and weatherreports, over wireless networks. The WAP is designed to provide suchservices to digital mobile telephones and other wireless terminals. Justas the TCP/IP standards make it possible for many different kinds ofcomputer equipment to communicate through the Internet, the WAPspecification is intended to work across different types of wirelessnetwork. The term “WTAI” as used herein is an acronym for WirelessTelephony Applications Interface and is a collection of featurescompiled into function libraries which provides the means to createtelephony applications. Typically, WTAI is used to set-up a mobileoriginated call.

[0020]FIG. 1 is a pictorial representation of a cellular telephone 100.Cellular telephone 100 contains housing 102, antenna 104, stylus 106,LCD screen 107, keypad 108, microphone 110, speaker 112, andinput/output (I/O) ports 114. Antenna 104 transmits and receives datafor cellular telephone 100. Keypad 108 is used for data entry and LCDscreen 107 is used for data display. Optionally, stylus 106 is used toinput data onto LCD screen 107. I/O ports 114 are used for direct wireconnection of microphone 110 and speaker 112. Microphone 110 is used toinput voice signals into cellular telephone 100. Speaker 112 is used tocommunicate voice signals received by cellular telephone 100 to theuser.

[0021]FIG. 2 is a depiction of the data processing system 200 containedwithin housing 102 of cellular telephone 100. Data processing system 200comprises processor 202, boot ram 204, and LCD controller 205 coupled tosystem bus 206. Also connected to system bus 206 is memorycontroller/cache 208, which provides an interface to local memory 209.I/O bus bridge 210 is connected to system bus 206 and provides aninterface to I/O bus 212. Memory controller/cache 208 and I/O bus bridge210 may be integrated as depicted. Peripheral components are connectedvia I/O bus 212. Typical peripheral components include UniversalAsynchronous Receiver Transmitter (UART) 218, a keypad or touch screen220, digital-to-analog converters 228, analog-to-digital converters 230,serial interface controller 240, clocks and timers 242, modem 244, powercontroller 246, CODEC ports 248 for communicating with the PublicTelephone Switch, and infrared ports 250. Those skilled in the art willappreciate the depiction of data processing system 200 in FIG. 2 isexemplary and is not intended as an architectural limitation of thepresent invention. Data processing system 200 may be a separate,embedded controller, such as model number EP7309 from the CIRRUSCorporation.

[0022]FIG. 3 is a depiction of cellular telephone 300 interacting withsoftware and external devices. Cellular telephone 300 comprises modem302 with antenna 306 and computer system 304. Modem 302 is atransmitter/receiver which interacts with a wireless network throughantenna 306. Computer system 304 is a computer system similar to dataprocessing system 200. Those skilled in the art will be aware of howbest to configure modem 302 and computer system 304.

[0023] Encryption program 312 is a software program (similar toencryption program 400) which runs on computer system 304. Encryptionprogram 312 monitors microphone 308 (similar to microphone 110) andencrypts the voice data received from microphone 308. The encryptedvoice data is transmitted from cellular telephone 310 by modem 302 andtravels over a wireless network to the intended recipient. Likewise,decryption program 314 is a software program (similar to decryptionprogram 500) which runs on computer system 304. Decryption program 314monitors modem 302 for reception of encrypted transmissions. Encryptedtransmissions are received from a wireless network via modem 302.Decryption program 314 then decrypts the voice data in the encryptedtransmission and emits the audio signal contained therein on speaker 310(similar to speaker 112).

[0024]FIG. 4 is a flow chart of encryption program 400. Encryptionprogram starts (402) and the user selects an icon on the LCD Screen toinitiate a secured call and enters their public key (403). The cellulartelephone then awaits audio signal input via the microphone (404). Whenthe user speaks into the microphone (406), the communications driversconvert the audio signal into a first wav file (408). The communicationsdriver then sends the first wav file to a Java application (410). TheJava application obtains the first wav file, extracts the first wav fileheader, and creates a second wav file (412). The Java application thenobtains the total number of samples from the first wav file header(414). The total number of samples is equal to the number of raw audiosectors in the first wav file multiplied by the number of samples perraw audio sectors in the first wav file.

[0025] Encryption program 400 then enters the primary loop (consistingof steps 415-432) where the loop invariant is controlled by the totalnumber of samples. Encryption program 400 determines if all audio datain the first wav file has been processed by decrementing the value ofthe sampling rate of the first wav file (415). When the total number ofsamples reaches zero, all audio data in the first wav file has beenprocessed, and encryption program 400 proceeds to step 434. If the totalnumber of samples is greater than zero, encryption program 400 proceedsto step 416 where the first datum (defined here as audio datum) is readfrom the first wav file (416). The audio datum, which for a wav filewill always be an integer, is converted into text (418). The text isthen encrypted using the public key, which creates a character array(420). Encryption program 400 counts the number of text characters inthe character array and obtains an integer count (422). Encryptionprogram 400 then computes a state variable, x, where x is equal to thenumber of samples processed divided by the number of samples per rawaudio sector in the first wav file. (422′). Encryption program 400 thendetermines if the the value determined by subtracting the number ofaudio sectors in the second wav file header from x is less than 1 andgreater than 0. (423). If so, then the number of audio sectors in thesecond wav file header is incremented (424), and encryption program 400proceeds to step 426. If not, then encryption program 400 bypasses step424 and proceeds directly to step 426. The integer count from step 422is then stored as an audio datum in the audio sector of the second wavfile (426).

[0026] Encryption program 400 then enters a secondary loop (steps427-431) wherein the text string created in step 420 is indexed and ifthe number of characters in the resulting array is greater than zero,encryption program 400 proceeds to step 428 (427). If the number ofcharacters in the array at step 427 is equal to zero, then encryptionprogram 400 proceeds to step 432. At step 428, the text characters inthe indexed character array are converted to an integer (428). Adetermination is then made whether the number of samples processed inthe second wav file is greater than the number of samples processed inthe first wav file (429). If so, then the number of audio sectors in thesecond wav file header is incremented (430), and encryption program 400proceeds to step 431. If at step 429 the number of samples processed inthe second wav file is not greater than the number of samples processedin the first wav file, then encryption program 400 bypasses step 430 andproceeds to step 431. The integer obtained in step 428 is then stored asan audio datum in the second wav file (431). The secondary loopreiterates until the character array created in step 420 has beencompletely indexed (427). The number if samples in the second wav fileheader is then incremented (432) and encryption program 400 returns tostep 415. The primary loop ends when all audio data in the first wavfile has been processed. At that point, encryption program 400 transmitsthe second wav file to the intended recipient (434). Encryption program400 continues back to step 406 until the user terminates the program byselecting the appropriate icon on the LCD screen (435), at which pointencryption program 400 ends (436).

[0027]FIG. 5 is a flow chart of decryption program 500. Decryptionprogram 500 starts (501) and an encrypted call is received on thecellular telephone (502). The cellular telephone then indicates that anencrypted call is being received by displaying a decryption program iconon the LCD screen and optionally emitting a unique audible tone whichalso signifies reception of an encrypted incoming call (503). The userthen selects the decryption program icon from the LCD screen to launchthe Java application that will decrypt the encrypted call and the userthen enters the private key corresponding to the private key used toencrypt the encrypted data (504). The communication drivers on thecellular telephone then acknowledge the incoming call (505). Thecommunication driver then converts the incoming call into a first wavfile (506). The communication driver then sends the first wav file to aJava application, which obtains the first wav file header and uses it tocreate a second wav file (510). Decryption program 500 then obtains thetotal number of samples from the first wav file header (512). The totalnumber of samples is equal to the number of raw audio sectors in thefirst wav file multiplied by the number of samples per raw audio sectorin the first wav file.

[0028] Decryption program 500 then enters a primary loop (steps 514-536)where the total number of samples obtained from step 512 is used as theloop invariant. Decryption program 500 then makes a determination ofwhether the the first wav file is completely processed (514). If thenumber of processed samples is not greater than the number of samples inthe first wav file, then decryption program 500 proceeds to step 516. Ifthe number of processed samples is greater than the number of samples inthe first wav file, then encryption program proceeds to step 538. Afterdetermining that the number of processed samples is less than the numberof samples in the first wav file, decryption program 500 uses the audiodatum obtained in step 512 as an integer count to create a characterarray that will store the encrypted string of the first wav file createdin step 420 (516).

[0029] A secondary loop (steps 517-526) is then entered to control theprocess of storing encrypted text. Decryption program 500 makes adetermination if the integer count, initially obtained in step 516, isgreater than zero (517). If the integer count is greater than zero, thendecryption program 500 proceeds to step 518. If the integer count in 517is not greater than zero, then decryption program 500 proceeds to step528. After determining that the integer count from 516 is greater thanzero in step 517, decryption program 500 increments by one the number ofsamples processed (518). Using the number of samples processed as anindex, the next integer is obtained from the audio datum (520). Here,decryption program 500 uses the sum of the number of samples processedas the index to the next integer with the audio datum. Decryptionprogram 500 then converts the audio datum to text characters (522) andthen converts the text characters into a character array (524).Decryption program 500 then decrements the integer count processed (526)and proceeds back to step 517. Once the character array has been filled,the secondary loop terminates and decryption program 500 proceeds tostep 528 where a text string is created from the character array (528).Decryption program 500 then decrypts the text string using the privateencryption key (530) and converts the encrypted text into an integer(532). Decryption program 500 then computes a state variable, x, where xis equal to the number of samples processed divided by the number ofsamples per raw audio sector in the first wav file (532′). Decryptionprogram 500 then makes a determination if the value determined bysubtracting the number of audio sectors in the second wav file headerfrom x is less than 1 and greater than 0 (533). If the number of samplesin the second wav file is greater, then decryption program 500 storesthe audio datum in the second wav file and the number of sectors in thesecond wav file header is incremented (534) and proceeds to step 536. Ifthe number of samples in the second wav file is not greater, thendecryption program 500 bypasses step 534 and proceeds immediately tostep 536. In step 536, decryption program 500 stores the integer asaudio datum in the second wav file (536) and proceeds back to step 514.The primary loop is repeated until all of the audio data in all of theaudio sectors of the first wav file has been processed. Decryptionprogram 500 then transmits the second wav file to the speaker where itis emitted as an audible signal to the user (538). Decryption program500 continues back to step 506 until the user terminates the program byselecting the appropriate icon on the LCD Screen (539), at which pointencryption program 500 ends (540).

[0030]FIG. 6 is a flow chart illustrating the process of sending andreceiving an encrypted communication using a cellular telephone. Anytimea cellular telephone call is initiated, communications process 600starts (601) and an encryption icon appears on the cellular telephoneLCD screen. The user selects this icon to initiate an encryptedcommunication (602). Selection of the icon in step 602 launchesencryption program 300, which prompts the user to enter a private key(604). The user enters the private key (606) and the private key isacquired by the encryption program (608). The encryption program thenprompts the user to enter a public key (610). The user enters a publickey (612), which is obtained by the encryption program (614). When theencryption program is prepared to begin encrypting the voice data, theencryption program prompts the user to start speaking (616). As the userspeaks, the encryption program converts the user's voice signal into awav file and encrypts the wav file using the public and private keys(618). The encryption program then presents the user with an icon whichwill allow the user to terminate the process (620). When the userselects the icon (622), encryption program 400 stops encrypting theaudio data (624). The telephone call is allowed to continue and ends atthe user's discretion (626). The process then stops (628).

[0031]FIG. 7 is a flow chart illustrating the process of a cellulartelephone initiating a secured telephone call. Before this processinitiates, the user has to download the appropriate encryption softwareand public and private keys form an external source. External sourcescan include a certificate authority or any other source available overthe internet. The required data can be downloaded via the modem,infrared ports, or I/O ports or purchase the program as a separatemodule of the cellular telephone. Communications program 700 starts(702) and the user selects an icon to launch the telephone applicationfrom the LCD screen (704). Communications program 700 then loads theJava application associated with encryption program 300 (706).Communications program 700 then creates a window on the cellular screenwhich resembles a typical telephone keypad (708). The user then selectsthe appropriate telephone number using the stylus or other input device(710). Communications program obtains the telephone number entered bythe user (712) and makes a native method call using the telephone numberas a parameter (714). The native method performs a WAP WTAI telephonyinitiating the call (716). The native method performs a WAP WTAIfunction that waits on the ringing (718). The native method thenperforms a WAP WTAI function that waits for an answer (720). Then therecipient answers the call (722) and the native method then returnscontrol to the Java application (724). The Java application then opensthe corn port with the attached modem (726). When the Java applicationreceives acknowledgement that the port is open, the Java applicationtransmits the second wav file (728) and the program ends (730).

[0032]FIG. 8 is a pictorial representation of datum 800 found in theaudio sector of the second wav file and the encrypted data 804, 806,808, and 810 in datum 800. For every audio datum in the first wav file,audio datum 802 is encrypted and the encrypted text is converted tointegers. Integer count 804 processed from the encrypted text is thefirst audio datum and converted integers 806, 808, and 810 are storedafter integer count 804.

[0033]FIG. 9 is a graphical representation of voice signal 900. Thisvoice signal is intercepted by the communication driver of themicrophone port. The y-axis of the graph represents the value of theinteger stored in the wav file and the x-axis represents time. The audiodatum is an integer that can be found along the curve represented by thevoice signal in this illustration. The signal in FIG. 9 represents a 16bit sampling rate; however the sampling rate is best determined by thoseskilled in the art.

[0034] While the described invention discloses the use of the encryptionand decryption process for a cellular telephone, it is not meant tolimit in any way the general concept of the invention. For example, thedescribed process could be utilized on any type of communicationsdevices including PDA/cellular telephone combinations, pagers,convention telephones, fax machines, and portable email devices.Additionally, the present invention can be utilized over a wirednetwork, the internet, or a satellite network. While a wav file isdescribed here, the present invention also includes any type ofelectronic file used to capture data. Additionally, the presentinvention could be used to transfer non-audio data from one user toanother.

[0035] Additionally, the described invention can be utilized in aseparate apparatus which may interact with a pre-existing cellulartelephone, PDA/cellular telephone combinations, or similarcommunications device through the I/O ports, USB ports, infrared ports,or serial ports of the communications device. In this case, a preferredusage of the invention is to attach an external microphone and speakerto the invention, and attach the invention to the conventional cellulartelephone. As the user speaks into the telephone, the invention encryptsthe audio signal using the described encryption program and transmitsthe encrypted signals through the cellular telephone. Likewise, thepresent invention can be utilized to decrypt encrypted messages byreceiving them on a cellular telephone, decrypting the encrypted messagein the invention using the described decryption process and emitting theresulting audio signal over an external microphone.

[0036] It will be understood from the foregoing that variousmodifications and changes may be made in the preferred embodiment of thepresent invention by those skilled in the art without departing from itstrue spirit. It is intended that this description is for purposes ofillustration only and should not be construed in a limiting sense. Thescope of the invention should be limited only by the language of thefollowing claims.

What is claimed is:
 1. A method of transmitting encrypted datacomprising: capturing data in a first electronic file; encrypting saidfirst electronic file using an encryption process; manipulating saidfirst electronic file to create a second electronic file; andtransmitting said second electronic file.
 2. The method of claim 1,wherein said data is an audio signal.
 3. The method of claim 1, whereinsaid data is captured using a microphone.
 4. The method of claim 1,wherein said first electronic file is a wav file.
 5. The method of claim1, wherein said second electronic file is a wav file.
 6. The method ofclaim 1, wherein said encryption process uses a private key and a publickey.
 7. The method of claim 1 further comprising: converting said datain said first electronic file to alphanumeric text; creating a textarray from said alphanumeric text; and counting the number of charactersin said text array.
 8. The method of claim 1, wherein said manipulationcomprises: comparing the number of characters in said first file to thenumber of characters in said second file; and indexing the characters ofsaid first file into said second file.
 9. The method of claim 1 whereinsaid capturing, manipulation, and encryption are performed in a firstcommunications device and said transmission occurs in a secondcommunications device.
 10. The method of claim 9 wherein said firstcommunications device is a data processing system operable between anexternal microphone and said second communications device.
 11. Themethod of claim 9 wherein said second communications device is atelephone.
 12. The method of claim 9 wherein said second communicationsdevice is a cellular telephone.
 13. The method of claim 9 wherein saidsecond communications device is a PDA telephone.
 14. The method of claim9 wherein said second communications device is a portable communicationsdevice.
 15. A method of receiving encrypted data comprising: receiving afirst electronic file from an external source; manipulating said firstelectronic file to create a second electronic file; decrypting saidsecond electronic file using an decryption process; and transmittingdata in said second electronic file to a user.
 16. The method of claim15, wherein said data is an audio signal.
 17. The method of claim 15,wherein said data is transmitted over a speaker.
 18. The method of claim15, wherein said first electronic file is a wav file.
 19. The method ofclaim 15, wherein said second electronic file is a wav file.
 20. Themethod of claim 15, wherein said encryption process uses a private keyand a public key.
 21. The method of claim 15 further comprising:converting said data in said first electronic file to alphanumeric text;creating a text array from said alphanumeric text; and counting thenumber of characters in said text array.
 22. The method of claim 15,wherein said manipulation comprises: comparing the number of charactersin said first file to the number of characters in said second file; andindexing the characters of said first file into said second file. 23.The method of claim 15 wherein said capturing, manipulation, andencryption are performed in a first communications device and saidtransmission occurs in a second communications device.
 24. The method ofclaim 23 wherein said first communications device is a data processingsystem operable between an external microphone and said secondcommunications device.
 25. The method of claim 23 wherein said secondcommunications device is a telephone.
 26. The method of claim 23 whereinsaid second communications device is a cellular telephone.
 27. Themethod of claim 23 wherein said second communications device is a PDAtelephone.
 28. The method of claim 23 wherein said second communicationsdevice is a portable communications device.
 29. An apparatus forconducting a secured telephone call comprising: a processor; a memorycapable of storing data; a program residing in said memory, wherein saidprogram contains instructions comprising: capturing data in a firstelectronic file; encrypting said first electronic file using anencryption process; manipulating said first electronic file to create asecond electronic file; and wherein said program causes said processorto interact with peripheral devices to transmit an encrypted message.30. The apparatus of claim 29 wherein said program further comprises:converting said data in said first electronic file to alphanumeric text;creating a text array from said alphanumeric text; and counting thenumber of characters in said text array.
 31. The apparatus of claim 29wherein said program further comprises: comparing the number ofcharacters in said first file to the number of characters in said secondfile; and indexing the characters of said first file into said secondfile.
 32. The apparatus of claim 29, wherein said data is an audiosignal.
 33. The apparatus of claim 29, wherein said data is capturedusing a microphone.
 34. The apparatus of claim 29, wherein said firstelectronic file is a wav file.
 35. The apparatus of claim 29, whereinsaid second electronic file is a wav file.
 36. The apparatus of claim29, wherein said encryption process uses a private key and a public key.37. The apparatus of claim 29 wherein said capturing, manipulation, andencryption are performed in a first communications device and saidtransmission occurs in a second communications device.
 38. The apparatusof claim 37 wherein said first communications device is a dataprocessing system operable between an external microphone and saidsecond communications device.
 39. The apparatus of claim 37 wherein saidsecond communications device is a telephone.
 40. The apparatus of claim37 wherein said second communications device is a cellular telephone.41. The apparatus of claim 37 wherein said second communications deviceis a PDA telephone.
 42. The apparatus of claim 37 wherein said secondcommunications device is a portable communications device.
 43. Theapparatus of claim 29 wherein said peripheral device is an externalmicrophone.
 44. The apparatus of claim 29 wherein said peripheral deviceis microphone attached to said apparatus.
 45. An apparatus forconducting a secured telephone call comprising: a processor; a memorycapable of storing data; a program residing in said memory, wherein saidprogram contains instructions comprising: receiving a first electronicfile from an external source; manipulating said first electronic file tocreate a second electronic file; decrypting said second electronic fileusing a decryption process; transmitting data in said second electronicfile to a user; and wherein said program causes said processor tointeract with peripheral devices to receive and emit an encryptedmessage.
 46. The apparatus of claim 45 wherein said program furthercomprises: converting said data in said first electronic file toalphanumeric text; creating a text array from said alphanumeric text;and counting the number of characters in said text array.
 47. Theapparatus of claim 45 wherein said program further comprises: comparingthe number of characters in said first file to the number of charactersin said second file; and indexing the characters of said first file intosaid second file.
 48. The apparatus of claim 45, wherein said data is anaudio signal.
 49. The apparatus of claim 45, wherein said data isemitted on a speaker.
 50. The apparatus of claim 45, wherein said firstelectronic file is a wav file.
 51. The apparatus of claim 45, whereinsaid second electronic file is a wav file.
 52. The apparatus of claim45, wherein said encryption process uses a private key and a public key.53. The apparatus of claim 45 wherein said capturing, manipulation, andencryption are performed in a first communications device and saidtransmission occurs in a second communications device.
 54. The apparatusof claim 53 wherein said first communications device is a dataprocessing system operable between an external microphone and saidsecond communications device.
 55. The apparatus of claim 53 wherein saidsecond communications device is a telephone.
 56. The apparatus of claim53 wherein said second communications device is a cellular telephone.57. The apparatus of claim 53 wherein said second communications deviceis a PDA telephone.
 58. The apparatus of claim 53 wherein said secondcommunications device is a portable communications device.
 59. Theapparatus of claim 45 wherein said peripheral device is an externalspeaker.
 60. The apparatus of claim 45 wherein said peripheral device isspeaker attached to said apparatus.
 61. A system of communicationcomprising: a first communications device capable of: capturing data ina first electronic file; encrypting said first electronic file using anencryption process; manipulating said first electronic file to create asecond electronic file; transmitting said second electronic file; asecond communications device capable of: receiving said secondelectronic file; manipulating said second electronic file to create athird electronic file; decrypting said third electronic file using andecryption process; and transmitting the data in said third electronicfile to a user.
 62. The system of claim 61 wherein the firstcommunications device is capable of performing the same functions as thesecond communications device.
 63. The system of claim 61 wherein thesecond communications device is capable of performing the same functionsas the first communications device.
 64. The system of claim 61, whereinsaid data is an audio signal.
 65. The system of claim 61, wherein saiddata is captured using a microphone.
 66. The system of claim 61, whereinsaid data is transmitted using a speaker.
 67. The system of claim 61,wherein said first electronic file is a wav file.
 68. The system ofclaim 61, wherein said second electronic file is a wav file.
 69. Thesystem of claim 61, wherein said encryption process and said decryptionprocess use a private key and a public key.
 70. The system of claim 61further comprising: converting said data in said first electronic fileto alphanumeric text; creating a text array from said alphanumeric text;and counting the number of characters in said text array.
 71. The systemof claim 61, wherein said manipulation comprises: comparing the numberof characters in said first file to the number of characters in saidsecond file; and indexing the characters of said first file into saidsecond file.
 72. The system of claim 61 wherein said capturing,manipulation, and encryption are performed in a first part of said firstcommunications device and said transmission occurs in a second part ofsaid first communications device.
 73. The system of claim 72 whereinsaid first part of said first communications device is a data processingsystem operable between an external microphone and said second part ofsaid first communications device.
 74. The system of claim 72 whereinsaid second part of said first communications device is a telephone. 75.The system of claim 72 wherein said second part of said firstcommunications device is a cellular telephone.
 76. The system of claim72 wherein said second part of said first communications device is a PDAtelephone.
 77. The system of claim 72 wherein said second part of saidfirst communications device is a portable communications device.
 78. Thesystem of claim 61 wherein said capturing, manipulation, and encryptionare performed in a first part of said second communications device andsaid transmission occurs in a second part of said second communicationsdevice.
 79. The system of claim 78 wherein said first part of saidsecond communications device is a data processing system operablebetween an external microphone and said second communications device.80. The system of claim 78 wherein said second part of said secondcommunications device is a telephone.
 81. The system of claim 78 whereinsaid second part of said second communications device is a cellulartelephone.
 82. The system of claim 78 wherein said second part of saidsecond communications device is a PDA telephone.
 83. The system of claim78 wherein said second part of said second communications device is aportable communications device.