Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2006-12-19
2006-12-19
Barron, Jr., Gilberto (Department: 2132)
Cryptography
Particular algorithmic function encoding
C380S046000
Reexamination Certificate
active
07151830
ABSTRACT:
Under the present invention, a state machine representation is used to encrypt/decrypt a message of data values. The state machine representation includes a plurality of nodes, wherein each of the data values are assigned to at least one of the plurality of nodes, wherein each of the plurality of nodes includes one or more transition vectors that each have a unique value, and wherein each of the one or more transition vectors starts from one of the plurality of nodes and leads to another one of the plurality of nodes. To encrypt the message, a sequence of transition vectors is traversed from a start node. As the transitional vectors are traversed, the corresponding unique values are recorded in sequence. When one of the data values is encountered at a node, a random number is generated and recorded in the sequence. Once all data values have been encountered, a string of the recorded unique values and the random values is outputted to a recipient.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5737607 (1998-04-01), Hamilton et al.
patent: 5841872 (1998-11-01), Colvin, Sr.
patent: 5987572 (1999-11-01), Weidner et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 1 098 248 (2001-05-01), None
patent: WO 01/47177 (2001-06-01), None
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.
Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Oakland, California, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, “Formal Verification of a Secure Network with End-To-End Encryption”, By Dianne E. Britton, pp. 154-166.
“Mercy: A Fast Large Block Cipher for Disk Sector Encryption”, By Paul Crowley, Date: Apr. 2000, http://www.ciphergoth.org/crypto/mercy/html/.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, pp. V-653-656, 1992.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, IEEE Transactions on Communications, vol. 44, No. 12, Dec. 1996, pp. 1640-1642.
Barron Jr. Gilberto
Hoffman Warnick & D'Alessandro LLC
International Business Machines - Corporation
Lanier Benjamin E.
Schiesser William E.
LandOfFree
Method, system, program product and state machine... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system, program product and state machine..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, program product and state machine... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3672887