Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security apparatus for data transmission with dynamic random encryption

a technology of dynamic random encryption and security apparatus, which is applied in the field of data transmission, can solve the problem that the encryption schema stored in the memory of the external security unit cannot be read by anyone gaining unauthorized access to the computer itself, and achieves the effect of greater security and higher security

Inactive Publication Date: 2001-09-27
MARCHANT BRIAN E
View PDF1 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011] The present invention provides a variety of advantages over the prior art. In one embodiment, the security unit is external to the computer, thus preventing any hacker who can gain access to the computer from gaining access to the encryption schema or PIN stored within the security unit. By plugging into a port of the computer, the security unit is still able to provide decryption information to the computer, yet the encryption schema stored within the memory of the external security unit is not able to be read by anyone gaining unauthorized access to the computer itself. In other words, the encryption schema that defines which encryption algorithm to use and how many bytes to decrypt using that algorithm along with the user's PIN is not retained within the computer. In one particular embodiment, the security unit conveniently plugs into a mouse port located near the front of the computer system, thus allowing convenient attachment. Also, an external unit allows the security unit to be extremely portable and attachable to any suitable computer.
[0012] In addition, the security unit is a simple device enabling it to be built inexpensively and small, which means it is more portable. The unit is especially useful for business travelers who need to access large amount of corporate information while on the road. The unit is portable, and the encryption technique used is suitable for the security of large amounts of information.
[0015] Having a unique encryption schema per security unit also has advantages. Although it is contemplated that any number of security units distributed to multiple users might use the same encryption schema, for higher security it may be desirable to have a unique encryption schema for every security unit. The encryption schema is a random array of bits that provides for even higher security in choosing an encryption algorithm and for choosing how many bytes of a message to encrypt using an algorithm. A combination of the public code and the PIN provide a first random entry into the encryption schema. From this entry point, a random set of bits identify a particular encryption algorithm to use for decryption, and a random set of bits identify how many bytes of the message to decrypt using that algorithm. Because these bits are random, the encryption algorithm chosen for a portion of the message is entirely random and it is difficult to break this code. Also, because the random bits also identify a length of string to encrypt, the encryption algorithm changes randomly within a given message at random points within that message. Thus, the encryption algorithm changes within a given message, but this change is completely random and is not transmitted over the network or along with the encrypted message. Using a random choice of encryption algorithms on a randomly chosen length of a string results in a code that is nearly impossible to break.
[0016] Furthermore, a reset feature allows a user to reset the encryption process if a message is unreadable for any reason. Additionally, the data site itself may force a reset, provide a new public code and / or require the user to reenter his PIN in order to provide a greater level of security. In addition, it is contemplated that secure data may not only be sent from a data site to a user's computer, but also from a user's computer to the data site or to other computers and / or mass storage devices.

Problems solved by technology

By plugging into a port of the computer, the security unit is still able to provide decryption information to the computer, yet the encryption schema stored within the memory of the external security unit is not able to be read by anyone gaining unauthorized access to the computer itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security apparatus for data transmission with dynamic random encryption
  • Security apparatus for data transmission with dynamic random encryption
  • Security apparatus for data transmission with dynamic random encryption

Examples

Experimental program
Comparison scheme
Effect test

embodiment 300

[0048] FIG. 5 illustrates a security unit 52 that communicates with computer 102. Security unit 52 includes a number input device 302 for inputting a number into either a PIN register 304 or public code register 306. The contents of these two registers are combined using merging logic 308 in order to produce an address which is stored in address register 312. Increment logic 310 is used to receive the contents of address register 312 and a relative address 314 from memory 316 in order to provide a new address for address register 312. Shift register 317 is used to transfer selected data from memory 316 through to computer 102.

[0049] Number input device 302 may be any suitable type of input device used for entering numbers, letters, and / or symbols into security unit 52. In one embodiment of the invention, simple number wheels 318 are used to enter a sequence of numbers. In the example shown, the number "4712" is being entered into the input device. The use of a rotary number wheel or...

embodiment 1200

[0096] FIG. 13 illustrates a flowchart 1300 of the embodiment 1200 operation. First, a key code is input to the controller 1210. The controller 1210 processes the key code and determines a first starting point and a length of control data. The first starting point is a first computed address within the array of random data 1220. The length of control data is defined as how many bytes of control data to retrieve from the array of random data 1220. The controller 1210 then accesses the array of random data 1220 at the first computed address determined by the key code, and retrieves the number of control bytes, from the array of random data 1220.

[0097] One skilled in the art will appreciate that the key code can include a plurality of key components or sub keys or codes such as a private code, a personal identification number (PIN) or a public code or combinations and multiples thereof. Such sub codes may be numeric, alphabetical, alpha-numeric, biometric, or graphical or any other for...

embodiment 1500

[0133] FIG. 15 illustrates another embodiment 1500 of the present invention. In this embodiment, the encryption / decryption system 1500 includes a first and second electronically readable media 1510, 1550 such as a magnetic media, optical media, magneto-optical media, CDROM, digital video disk (DVD), hard disk, or any other electronically readable media method. The first and second electronically readable media 1510, 1550 contains a random array. In an alternative embodiment, the first and second electronically readable media 1510, 1550 also include a plurality of encryption / decryption algorithms.

[0134] The encryptor 1530 includes the capability to read the first electronically readable media 1510 and to receive unencrypted data 1520. The encryptor 1530 reads the first electronically readable media 1510 and inputs the random array or a portion thereof and the encryption / decryption algorithm and then encrypts the unencrypted signal as described above to output an encrypted signal.

[013...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption / decryption apparatus is disclosed which includes a controller coupled to an array of random data, an encryptor / decryptor and a plurality of encryption / decryption algorithms. The array of random data and the plurality of encryption / decryption algorithms are stored on an electronically readable media. The data encryption / decryption apparatus can encrypt and decrypt data, video, audio. The electronically readable media includes random access memory, read only memory, magnetic media, optical media, magneto-optical media, CDROM, digital video disk (DVD), hard disk, a remote computer memory storage location accessible via an electronic network such as a telephone system or a computer network, or any other electronically readable media method. The controller is responsive to a key code input to the controller. The controller determines a first computed address in the array of random data and a control data length. The controller then retrieves the control data from the first computed address in the array of random data.

Description

[0001] The present application is a continuation in part of prior application Ser. No. 09 / 359,857 which represents the National Phase filing of International Application No. PCT / US98 / 12578 filed Jun. 15, 1998, which application claims priority of U.S. Provisional Application No. 60 / 050,176 filed Jun. 19, 1997, under 35 U.S.C. .sctn.1 19(e), the subject matter disclosed therein being incorporated herein by reference in its entirety.DESCRIPTION[0002] 1. Technical Field[0003] The present invention relates generally to transmission of data in a secure fashion between computer systems. More specifically, the present invention relates to a portable security apparatus that attaches to a computer and makes use of random encryption algorithms that change.[0004] 2. Background Art[0005] Within any computing system or within any network, data is often transmitted between two points such as between a server computer and a user's host computer. At times, this information may be transmitted over a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F1/00G06F12/14G06F21/00
CPCG06F12/1408G06F21/128G06F21/31G06F21/6272G06F21/72G06F21/85G06F2211/001G06F2211/008
Inventor MARCHANT, BRIAN E.
Owner MARCHANT BRIAN E
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products