Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2007-08-21
2007-08-21
Barron, Gilberto (Department: 2132)
Cryptography
Particular algorithmic function encoding
C380S045000
Reexamination Certificate
active
10644446
ABSTRACT:
A state machine representation is provided that includes a plurality of nodes that are assigned a unique node identifier and an output value, and that are grouped into color segments. The nodes are interconnected by transitional vectors, with each transitional vector being assigned a unique value. Further, at least one of the nodes has a termination vector that leads to a termination point. To encrypt the set of data values, a start node is identified and any path of transitional vectors is be traversed from node to node. As each transitional vector is traversed, its corresponding unique value will be recorded in sequence. When a node is reached that has an output value that matches one of the set of data values, an invalid unique value is designated and recorded in sequence with the unique values.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5737607 (1998-04-01), Hamilton et al.
patent: 5841872 (1998-11-01), Colvin, Sr.
patent: 5987572 (1999-11-01), Weidner et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 1 098 248 (2001-05-01), None
patent: WO 01/47177 (2001-06-01), None
Randy Katz, Contemporary Logic Design, 1994, The Benjamin/Cummings Publishing Company, p. 387.
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.
Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Oakland, California, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, “Formal Verification of a Secure Network with End-To-End Encryption”, By Dianne E. Britton, pp. 154-166.
“Mercy: A Fast Large Block Cipher for Disk Sector Encryption”, By Paul Crowley, Date: Apr. 2000, http://www.ciphergoth.org/crypto/marcy/html/.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, pp. V-653-656, 1992.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, IEEE Transactions on Communications, vol. 44, No. 12, Dec. 1996, pp. 1640-1642.
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.
Barron Gilberto
Hoffman Warnick & D'Alessandro LLC
International Business Machines - Corporation
Lanier Benjamin E.
Schiesser William E.
LandOfFree
State machine representation for encrypting and decrypting a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with State machine representation for encrypting and decrypting a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and State machine representation for encrypting and decrypting a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3875997