Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2000-04-17
2004-11-16
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S152000, C713S152000
Reexamination Certificate
active
06820198
ABSTRACT:
This invention is part of an existing unpublished new Computer Program Bakthi Encrypt V 1.00 independently created by the applicant and inventor Peter William ROSS on his own behalf during July 1997 to August 1998.
TECHNICAL FIELD
The technical field of this invention is general purpose Encryption/Decryption Computer Programs.
BACKGROUND ART
The unpublished Computer Program mentioned in the introduction, the best mode for carrying out the invention, contains much which is commonplace in Encryption/Decryption Computer Program art. Such things as the manipulation of ANSI codes for characters, Pseudo-Random Number Generator use, and mathematical translations are commonplace in this art. The novel methods described later in the Disclosure of Invention and Claims, however, are not commonplace and, to the best knowledge of this applicant/inventor, nor are they the prior invention of someone else. These novel methods were thought of by this applicant/inventor completely independently. No Encryption literature was read, and no advice was sought from others during the creation of the above-mentioned unpublished Computer Program. These novel methods are simple, but not obvious. Many good novel ideas are simple, and seem obvious after reading about them, but are by no means obvious beforehand.
DISCLOSURE OF INVENTION
Novel methods applied to a large data file forming part of an Encryption/Decryption Computer Program constitute the invention. These novel methods are:
(1) Allowing users to safely edit the large data file thus enabling enable the creation, by each user, of a uniquely customised version of the original Program, effectively allowing each user to create his or her own unique, private, secret Custom Encryption/Decryption Program.
(2) The use of a continuously changing unpredictable but reproducible number (ultimately derived from a Key) to select a particular “page” of data from the large data file and the subsequent use of one of the random number values on that “page”, to further encrypt or decrypt the character currently being manipulated, thus creating a character “rotation” which is variable.
(3) In the context of a graphical user interface displaying “pages” of data from the large data file, the provision of the means whereby the data may be safely edited by the user, especially the method of temporarily allowing duplicate values on a “page” of data at one stage but in the following stage identifying the duplicate values by colouring them and also adding a list of the values missing from the set of number values, both actions facilitating the further editing of the page to make it correct.
(4) In the same context as (3) above, the division of the set of possible number values forming each “page” into sub-sets each displayed in a different colour so that the state of randomness of the values in each “page” can be seen at a glance.
The Computer Program discussed in the Introduction comes complete with two files in Help File format and one file in Text File format. The purpose of these three files is to explain to the future retail licence holder how to use the Computer Program and how the Computer Program works. The best way to disclose the invention and place it in context is to include Excerpts of relevant topics from these three files and drawings of the visible Graphical User Interfaces used in the two electronic forms (Standard Operations Form and Advanced Operations Form) used by the Computer Program. Continual reference to the drawings while reading will greatly aid the understanding of the invention.
Pages 3 to 10 contain an Excerpt from BEHp%%!!.hlp, the main Help File of the Program itself.
Pages 10 to 12 contain an Excerpt from BEInstallUninstall.txt, a Text File for the Program users.
Pages 12 to 23 contain an Excerpt from a Decrypted BEAK%%!!.hlp, the latter forming the Bakthi Analyst Kit, which explains HOW the Computer Program works by describing its Encryption/Decryption algorithms in great detail, including explanations with relevant source code.
Page 1/5 contains illustrations of the Standard Operations Form.
Pages 2/5 to 5/5 are illustrations of the Advanced Operations Form.
Amongst the descriptive Pages 1 to 24, and the drawings, Pages 1/5 to 5/5, the 24 pages that are most relevant to the five Claims (Pages 25, 26) of this Application for a Standard Patent are Pages: 1, 2, 3, 5, 6, 7, 8, 9, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24; 2/5, 3/5, 4/5, 5/5
Note that on Pages 4, 5, 7, 8, 9, 11, 12, 14, 16, 23, 24 the large user-editable file is variously identified as the Bakthi Encrypt Data File, the BED File, the BED File, and MALA%%!!.BED. All these terms refer to the same entity. The BED File is also described as being in either a Factory Default State or a Custom State. Note also that the large user-editable data file and the Encryption Key are distinct entities.
Description Pages 4, 10, 11, 12 are less important, serving mainly to place the invention in context.
EXCERPT FROM BEHp%%!!.hlp
BEGINNER'S GUIDE
Bakthi Encrypt is a 32 bit Windows application designed to Encrypt, Decrypt, or Destroy local files of any type individually one after the other. It is composed of two forms:
The Standard Operations Form becomes visible when the application opens. Encryption which is very probably unbreakable can be achieved using this form alone.
The Advanced Operations Form, accessible only by selecting Bakthi Advanced . . . from the Choices menu of the Standard Operations Form, can be used to create a uniquely customised version of Bakthi Encrypt, in effect creating a private, secret Custom Program.
Encryption which is almost certainly unbreakable can be achieved by making use of both the forms.
(Definition of unbreakable: “Unbreakable encryption, in the practical sense, means cryptanalysts utilising enormous resources, for example, supercomputers with millions of fast parallel processors. and having a full knowledge of the encryption/decryption algorithm, will not be able to discover the plaintext of a practical document from the ciphertext alone, without knowledge of the secret Key. Both the present art and this author consider the well-known Vernam One Time Pad Cipher to be the only theoretically unbreakable cipher.”)
Basic manipulation of the Standard Operations Form is described below.
To Encrypt a file quickly: Click Auto Key. Then click Edit Key. Then change some of the digits in the 90 digit panel. It is not compulsory to change some of the digits, but it is wise to do so as it ensures the Key is not entirely computer-generated. Click Accept Key. Then either manually write down the 90 digit Key, or click Print Key to print the 90 digit Key. Click Hide Key if you are worried about prying eyes. Click Select File, then select the file to encrypt. Click Encrypt File, then close the message box. Then click Copy FileName. This should nearly always be clicked because not only does it add the file name to a list destined for the Clipboard, it also enables Edit Key again whilst retaining the 90 digit Key so that the cycle of clicking Command Buttons can be restarted to process another file. Note that if Bakthi Encrypt has written to the Clipboard, then when Bakthi Encrypt is closed the Clipboard will be completely cleared for security reasons.
To Decrypt a file previously encrypted by Bakthi Encrypt: Click Edit Key. Then type the 90 digits of the Key used to encrypt the file. Click Accept Key. Click Hide Key. Click Select File, then select file to decrypt. Click Decrypt File, then close the message box. Then click Copy FileName (see above).
To Destroy a file completely: First press F5. Then click Select File, then use the dialog box to select the file to destroy. Click Destroy File, then close the message box. Click Copy FileName to add the name of the destroyed file to a list destined for the Clipboard (see above) and to re-enable Select File so that the cycle of clicking Buttons can be restarted to destroy another file. To return to encrypt mode, press F5 again.
STANDARD MENUS
Choices Menu
New F2: Makes the Standard
LandOfFree
Encryption via user-editable multi-page file does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption via user-editable multi-page file, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption via user-editable multi-page file will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3312816