Secure communications system and device
10868800 ยท 2020-12-15
Assignee
Inventors
Cpc classification
H04L63/0428
ELECTRICITY
H04W12/33
ELECTRICITY
H04L63/0861
ELECTRICITY
A42B3/283
HUMAN NECESSITIES
G06F21/32
PHYSICS
International classification
G06F21/32
PHYSICS
Abstract
A secure communication system includes a wearable secure communication device which may receive and transmit information via a network. A wearable secure communication device may include a noise generator. The wearable secure communication device further includes a power input connection. Additionally, the wearable secure communication device may include a communication processor. The secure communication system and the wearable secure communication device may provide access to a secure information exchange system.
Claims
1. A secure communication system, comprising: a wearable secure communication device comprising: a helmet, a display screen disposed within the helmet, a noise generator disposed within the helmet, a power input connection disposed within the helmet, a communication processor disposed within the helmet; wherein the helmet receives and transmits information via a network; and wherein the helmet includes a seal around a head opening of the helmet that reduces the volume of sound generated inside the helmet outside the helmet.
2. The secure communication system of claim 1, wherein the wearable secure communication device is configured to be positioned to cover at least a portion of a user's head.
3. The secure communication system of claim 1, wherein the information received and transmitted via a network is encrypted.
4. The secure communication system of claim 3, wherein the network transmits information from one wearable secure communication device to a secure communication environment.
5. The secure communication system of claim 1, wherein the display screen of the wearable secure communication device is viewable to a user when the user is wearing the secure communication device.
6. The secure communication system of claim 5, wherein the display screen is viewable only to the wearer of the wearable secure communication device.
7. The secure communication system of claim 1, further comprising an authentication device.
8. The secure communication system of claim 7, wherein the authentication device is implemented as one or more of a retinal scan, a finger print analyzer, and a voice print analyzer.
9. The secure communication system of claim 1, wherein the helmet includes a visor.
10. The secure communication system of claim 1, wherein the noise generator generates white noise.
11. The secure communication system of claim 1, wherein the noise generator generates pink noise.
12. A wearable secure communication device which includes: a noise generator, a helmet, a display screen disposed within the helmet, a power input connection disposed within the helmet, and a communication processor disposed within the helmet wherein the helmet includes a seal around a head opening of the helmet that reduces the volume of sound generated inside the helmet outside the helmet.
13. The wearable secure communication device of claim 12, further comprising an air vent disposed on an outside surface of the wearable secure communication device.
14. The wearable secure communication device of claim 12, further comprising a first air duct which connects the vent to a fan and a second air duct which connects to an exhaust.
15. The wearable secure communication device of claim 14, wherein the fan pulls air into the wearable secure communication device and causes air within the wearable secure communication device to be exhausted through the second air duct.
16. The wearable secure communication device of claim 12, wherein the seal is a sound proof seal and positioned on the helmet as to be situated about a neck of a user when the helmet is worn by the user.
17. The wearable secure communication device of claim 12, wherein the wearable communication device includes one or more of a communication connector and a peripheral device connector.
18. The wearable secure communication device of claim 12, further comprising a wiring cavity disposed between an exterior surface of the wearable secure communication device and an interior surface of the wearable secure communication device.
19. The wearable secure communication device of claim 12, further comprising a visor.
20. The wearable secure communication device of claim 19, wherein the visor includes one or more layers of double glazed plexiglass.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The accompanying drawings illustrate several embodiments of a secure communication system and device. The illustrated embodiments are exemplary and do not limit the scope of the disclosure.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
(9) In the following description, for purposes of explanation and not limitation, specific techniques and embodiments are set forth, such as particular techniques and configurations, in order to provide a thorough understanding of the system and device disclosed herein. While the techniques and embodiments will primarily be described in context with the accompanying drawings, those skilled in the art will further appreciate that the techniques and embodiments may also be practiced in other similar devices.
(10) Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers are used throughout the drawings to refer to the same or like parts. It is further noted that elements disclosed with respect to particular embodiments are not restricted to only those embodiments in which they are described. For example, an element described in reference to one embodiment or figure, may be alternatively included in another embodiment or figure regardless of whether or not those elements are shown or described in another embodiment or figure. In other words, elements in the figures may be interchangeable between various embodiments disclosed herein, whether shown or not.
(11)
(12) Helmet 105 may further include a microphone 125 to receive speech input provided by a user. Helmet 105, as discussed below, may transmit the speech input over a secure connection to another person authorized to access a secure communications environment. Microphone 125 may further be connected to a voice print analyzer 130 as another device that may be used to authenticate an authorized user by obtaining a voice print of the user's voice for comparison of the voice print to a library or database of voice prints of authenticated users. Authentication of specific users will be discussed below.
(13) Helmet 105 may further include an earphone 135 which may be implemented in a number of ways. For example, earphone 135 may be implemented as an in-ear speaker (i.e., an earbud), a headset that provides a speaker that rests on the ear of the user, or a speaker configured to produce sound at a volume comfortable to most users, both loud enough to be heard by an authenticated user and quiet enough to not cause pain or irritate the authenticated user. Earphone 135 may provide the user with auditory input obtained from other sources, such as spoken input from another user.
(14) To further facilitate a secure environment, helmet 105 may include a white and/or a pink noise generator 140. A white noise generator generates noise that has equal intensity at different frequencies and may be used to drown out noise that is both internal to helmet 105 and external to helmet 105 (i.e., the authenticated user cannot hear sounds generated external to helmet 105). For example, white noise generated by noise generator 140 may be used to counteract the user's speech inside helmet 105 such that the user's speech is imperceptible to another person outside helmet 105. Similarly, noise generator 140 may be used to counteract noise that is external to helmet 105 to prevent the authenticated user from experiencing disruption by noise generated outside of helmet 105. Noise generator 140 may also generate pink noise which generates noise in a power spectral density that is inversely proportional to the frequency of the signal such that each octave (halving or doubling of the frequency) carries an equal amount of noise energy. Pink noise may be generated for reasons similar to those just discussed for white noise inside helmet 105. And, in some embodiments, noise generator 140 may generate only white noise, only pink noise, no noise, or both white and pink noise simultaneously, as desired by an authenticated user of helmet 105.
(15) Helmet 105 may provide a temperature controlled environment. For example, helmet 105 may include a fan 145 which may blow warm air, cold air, and or fresh air into helmet 105 through air duct 145a and air duct 145b. Air ducts may be implemented throughout helmet 105 and the locations shown in
(16) Helmet 105 may be powered by a power port 150. In one embodiment, power port 150 may connect to an electrical outlet to receive power. In another embodiment, power port 150 may receive a battery in a battery compartment. Any battery sufficient to power the various elements of helmet 105 for a suitable amount of time are acceptable for use with helmet 105. Power port 150 may provide electricity to various components within helmet 105, including to a processor 155 which executes computer instructions to perform the functionalities of helmet 105 such as communications. Processor 155 may also act to facilitate communications between different users of the network as a communications processor
(17) Processor 155 may be a hardware component that may execute one or more application programs and be implemented as one or more hardware components. For example, application programs may include software modules, sequences of instructions, routines, data structures, display interfaces, and other types of structures that execute operation. Further, hardware components may include a combination of CPUs, such as CPU 155, buses, volatile and non-volatile memory devices, non-transitory computer readable memory devices and media, data processors, control devices, transmitters, receivers, antennas, transceivers, input devices, output devices, network interface devices, and other types of components that are apparent to those skilled in the art. Essentially, processor 155 may allow an authorized user to connect to a secure communication line, whether telephone, internet, satellite, intranet, or other secure communication line, through various connections installed in helmet 105 to provide processor 155 access to the secure communication line.
(18) Other hardware components may be installed within helmet 105. For example, hardware components necessary to allow communication between an authenticated user via a secure communication system may be included within helmet 105. Helmet 105 may include various ports for connecting various communications and power cables to helmet 105 using various communications protocols. Helmet 105 may include a transmitter/receiver for communicating wirelessly using any communication protocol, such as, Wi-Fi, ZigBee, Z-Wave, RF4CE, Ethernet, telephone line, cellular channels, or others that operate in accordance with protocols defined in IEEE (Institute of Electrical and Electronics Engineers) 802.11, 801.11a, 801.11b, 801.11e, 802.11g, 802.11h, 802.11i, 802.11n, 802.16, 802.16d, 802.16e, or 802.16m using any network type including a wide-area network (WAN), a local-area network (LAN), a 2G network, a 3G network, a 4G network, a Worldwide Interoperability for Microwave Access (WiMAX) network, a Long Term Evolution (LTE) network, Code-Division Multiple Access (CDMA) network, Wideband CDMA (WCDMA) network, any type of satellite or cellular network, or any other appropriate protocol to facilitate communication or data access between helmet 105 and another point on a secure communications network.
(19) Finally, helmet 105, in one embodiment, may be built to technical specifications established by various government entities to meet security procedures and protocols. Helmet 105 may be suitable to replace certain secure facilities by meeting the same rigorous directive requirements, while drastically reducing cost, time, coordination, cumbersome construction, and eventual decommissioning.
(20)
(21) Helmet 200 may further include a fingerprint scanner 215. Fingerprint scanner 215 may be used to authenticate an authorized user by obtaining a fingerprint of a user's finger for comparison to fingerprints stored in a library or database of fingerprints of authorized users. Authentication of specific users will be discussed below.
(22) Helmet 200 may further include a hinge 220 which allows a user to articulate visor 110 between an open and closed position. In one embodiment, visor 110 may be programmed to automatically shut off when opened and require the authenticated user to interact with video interface button 205 to resume display of a video on the display screen. Hinge 220 may be sealed as discussed below.
(23) Helmet 200 may further include an earphone interface button 225 which exerts control over earphone 135, shown in
(24) Helmet 200 may further include a white/pink noise generator interface button 230 which exerts control over noise generator 140, shown in
(25) Helmet 200 may further include a power switch 235 which allows an authenticated user to selectively allow power to flow to the components of helmet 200. Switch 235 may be electrically coupled to power port 150 and may interrupt power supplied through power port 150 to selectively turn off helmet 200.
(26)
(27) Secure communication device 300 may create wiring cavity 310 between shell 305 and a layer of mass loaded vinyl 315 disposed within secure communication device 300 in a manner that creates wiring cavity 310 between shell 305 and the layer of mass loaded vinyl 315. The layer of mass loaded vinyl 315 serves a number of purposes. First, the layer of mass loaded vinyl 315 acts as a semi-rigid barrier to provide structural support to secure communication device 300. Second, the layer of mass loaded vinyl 315 provides a degree of rigidity for secure communication device 300 that ensures secure communication device 300 remains in position on an authenticated user's head. Third, mass loaded vinyl enjoys relatively high sound attenuation properties. In combination with a layer of aerogel 320, this configuration shown in
(28) For the authenticated user's comfort, and for sound attenuation purposes, a layer of aerogel 320 may be disposed on an inside surface of the layer of mass loaded vinyl 315. The layer of aerogel 320 may allow a form fit to an authenticated user that tends to keep secure communication device 300 in place on the authenticated user's head while spreading contact between secure communication device 300 and the authenticated user's head over a greater surface area of the user's head, enhancing comfort. The layer of aerogel 320 may also serve as further electrical insulation between the authenticated user's head and the wires disposed in wiring cavity 310.
(29) Secure communication device 300 may further include a polycarbonate layer 330 which provides a substantially rigid location within secure communication device 300 for mounting various internal components such as earphone 135, shown in
(30)
(31)
(32)
(33) CPU 602 may execute computer instructions based on input from an authorized user. For example, an authorized user may interface with CPU interface 604 to receive information from a data source input 606. Data source input 606 may include any kind of information. Examples of information provided as data source input 606 include text data, picture data, video data, audio data, voice data, and, in some embodiments, include tactile data. However, any data required by an authorized user or desired to be communicated to another user of communication system 600 may be included in data source input 606.
(34) Communication system 600 may include a white/pink noise generator 608. Noise generator 608 may be similar in implementation and description to noise generator 140, discussed above with respect to
(35) CPU 602 may further have access to a separate audio processor 614 or may also include an integral audio processor 614. Audio processor 614 receives data source input 606 that includes audio data via CPU 602 and allows an authenticated user to adjust parameters of the audio data via a button associated with audio control 612. In this manner, audio data may be provided to an authenticated user via earphones 616. Moreover, audio processor 614 may also be used to receive voice recognition data from a voice recognition module 618 after an authenticated user speaks into a microphone 620 based on user interaction with a microphone activation button associated with audio control 612. Thus, voice data may be used as a biometric authorization tool within communication system 600.
(36) CPU 602 may also include a connection to a USB hub 622 to allow peripheral devices, such as a keyboard device, a mouse device, a touch interface, a fingerprint scanner, and a host of other peripheral devices to interact with secure communication system 600. It should be noted that while all USB protocols are desired implementations, this disclosure is not limited solely to USB connectors and protocols. Any input protocol and physical connectors may be installed within communication system 600 to facilitate any desirable form of communication and input, whether wired or wireless using any desirable protocol. USB hub 622 is merely representative of various connections, communications, and interface protocols that may be desirable for implementation within secure communication system 622.
(37) CPU 602 may further interface with a fan assembly 624 and fan control 626. Fan assembly 624 may include a fan, similar to fan 145 shown in
(38) CPU 602 may also include a video processor 628 as an integral component of CPU 602 or may have access to a separate video processor 628 to perform video processing. Video processor 628 may include video control 630 which may also include a video interface button, similar to video interface button 205 shown in
(39)
(40) Should a user fail one or more of these tests, the secure communication system determines the user is not accepted at step 720 and locks the wearable secure communication device from use. Should a user pass one or more of these tests at step 730, or in some cases all of these tests, the user becomes an authenticated user at step 730. At step 735, the authenticated user may interface with a white/pink noise generator control to select appropriate levels of noise at step 735. At step 740, the authenticated user may log in to audio and video controls and adjust audio levels and video display characteristics to a preferred level. Once settings within secure communication system are appropriately set, the secure communication system provides secure information processing at step 745. Secure information processing allows a user to access secure information and data, to participate in secure communication sessions, and to otherwise interface with secure or sensitive data while being assured that the information, data, and communications are fully secure within a secure communication device.
(41) Once the authenticated user has accessed the desired information or participated in the desired communication session, the user may log off from the audio and video controls at step 750. The authenticated user may then remove the secure communication device from the authenticated user's head, turn off the main CPU at step 755, and return the secure communication system and secure communication device to the locked enclosure at step 760.
(42) The foregoing description has been presented for purposes of illustration. It is not exhaustive and does not limit the invention to the precise forms or embodiments disclosed. Modifications and adaptations will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed embodiments. For example, components described herein may be removed and other components added without departing from the scope or spirit of the embodiments disclosed herein or the appended claims.
(43) Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.