State machine representation for encrypting and decrypting a...

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S045000

Reexamination Certificate

active

10644446

ABSTRACT:
A state machine representation is provided that includes a plurality of nodes that are assigned a unique node identifier and an output value, and that are grouped into color segments. The nodes are interconnected by transitional vectors, with each transitional vector being assigned a unique value. Further, at least one of the nodes has a termination vector that leads to a termination point. To encrypt the set of data values, a start node is identified and any path of transitional vectors is be traversed from node to node. As each transitional vector is traversed, its corresponding unique value will be recorded in sequence. When a node is reached that has an output value that matches one of the set of data values, an invalid unique value is designated and recorded in sequence with the unique values.

REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5737607 (1998-04-01), Hamilton et al.
patent: 5841872 (1998-11-01), Colvin, Sr.
patent: 5987572 (1999-11-01), Weidner et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 1 098 248 (2001-05-01), None
patent: WO 01/47177 (2001-06-01), None
Randy Katz, Contemporary Logic Design, 1994, The Benjamin/Cummings Publishing Company, p. 387.
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.
Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Oakland, California, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, “Formal Verification of a Secure Network with End-To-End Encryption”, By Dianne E. Britton, pp. 154-166.
“Mercy: A Fast Large Block Cipher for Disk Sector Encryption”, By Paul Crowley, Date: Apr. 2000, http://www.ciphergoth.org/crypto/marcy/html/.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, pp. V-653-656, 1992.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, IEEE Transactions on Communications, vol. 44, No. 12, Dec. 1996, pp. 1640-1642.
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

State machine representation for encrypting and decrypting a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with State machine representation for encrypting and decrypting a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and State machine representation for encrypting and decrypting a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3875997

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.