Method, system, program product and state machine...

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S046000

Reexamination Certificate

active

07151830

ABSTRACT:
Under the present invention, a state machine representation is used to encrypt/decrypt a message of data values. The state machine representation includes a plurality of nodes, wherein each of the data values are assigned to at least one of the plurality of nodes, wherein each of the plurality of nodes includes one or more transition vectors that each have a unique value, and wherein each of the one or more transition vectors starts from one of the plurality of nodes and leads to another one of the plurality of nodes. To encrypt the message, a sequence of transition vectors is traversed from a start node. As the transitional vectors are traversed, the corresponding unique values are recorded in sequence. When one of the data values is encountered at a node, a random number is generated and recorded in the sequence. Once all data values have been encountered, a string of the recorded unique values and the random values is outputted to a recipient.

REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5737607 (1998-04-01), Hamilton et al.
patent: 5841872 (1998-11-01), Colvin, Sr.
patent: 5987572 (1999-11-01), Weidner et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 1 098 248 (2001-05-01), None
patent: WO 01/47177 (2001-06-01), None
Development Practical Ideas for Improving Productivity and Quality, “Testing vs. Cleanroom: The Software Methods Controversy”, By Nicholas Zvegintzov, Apr. 1996, pp. 4-6.
IBM Research Disclosure 41992, “Password Protection Using DES Security”, Mar. 1999, p. 393.
Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Oakland, California, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, “Formal Verification of a Secure Network with End-To-End Encryption”, By Dianne E. Britton, pp. 154-166.
“Mercy: A Fast Large Block Cipher for Disk Sector Encryption”, By Paul Crowley, Date: Apr. 2000, http://www.ciphergoth.org/crypto/mercy/html/.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, pp. V-653-656, 1992.
“A Hybrid Pipelined Path-Searching Architecture for Multiple Communications Applications”, By Horng-Dar Lin and David G. Messerschmitt, IEEE Transactions on Communications, vol. 44, No. 12, Dec. 1996, pp. 1640-1642.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system, program product and state machine... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system, program product and state machine..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, program product and state machine... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3672887

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.