Executable coded cipher keys
First Claim
1. Two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) received from or both encrypt transmission(s) transmitted to and decrypt transmission(s) received from said two or more devices comprising;
- at least one executable coded cipher key(s), where said at least one executable coded cipher key(s) contains executable code that performs a portion or all of an encryption or decryption sequence or both an encryption and decryption sequence, with said encryption and decryption sequences performed by encryption and decryption functions also contained within said at least one executable coded cipher key(s), in which said decryption function is a matching inverse function to that of said encryption function, and decryption bits obtained from said at least one executable coded cipher key(s) are utilized in a reverse order to that of encryption bits obtained from said at least one executable coded cipher key(s), andat least one executable coded encryption key (ECEK) device that encrypts transmission(s) by utilization of said at least one executable coded cipher key(s), andat least one executable coded decryption key (ECDK) device that decrypts transmission(s) by utilization of said at least one executable coded cipher key(s),at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus where said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and said computer memory,and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s),where transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted,and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter where encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one executable coded cipher key(s), at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and that also uses at least one executable coded cipher key(s), such that transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted. When encryption/decryption is completed, the transmission(s) is sent to at least one transmitter such that encryption/decryption of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve encryption/decryption completion.
40 Citations
29 Claims
-
1. Two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) received from or both encrypt transmission(s) transmitted to and decrypt transmission(s) received from said two or more devices comprising;
-
at least one executable coded cipher key(s), where said at least one executable coded cipher key(s) contains executable code that performs a portion or all of an encryption or decryption sequence or both an encryption and decryption sequence, with said encryption and decryption sequences performed by encryption and decryption functions also contained within said at least one executable coded cipher key(s), in which said decryption function is a matching inverse function to that of said encryption function, and decryption bits obtained from said at least one executable coded cipher key(s) are utilized in a reverse order to that of encryption bits obtained from said at least one executable coded cipher key(s), and at least one executable coded encryption key (ECEK) device that encrypts transmission(s) by utilization of said at least one executable coded cipher key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) by utilization of said at least one executable coded cipher key(s), at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus where said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and said computer memory, and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s), where transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted, and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter where encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system with
two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) received from or both encrypt transmission(s) transmitted to and decrypt transmission(s) received from said two or more devices comprising; -
at least one executable coded cipher key(s), where said at least one executable coded cipher key(s) contains executable code that performs a portion or all of an encryption or decryption sequence or both an encryption and decryption sequence, with said encryption and decryption sequences performed by encryption and decryption functions also contained within said at least one executable coded cipher key(s), in which said decryption function is a matching inverse function to that of said encryption function, and decryption bits obtained from said at least one executable coded cipher key(s) are utilized in a reverse order to that of encryption bits obtained from said at least one executable coded cipher key(s), and at least one executable coded encryption key (ECEK) device that encrypts transmission(s) by utilization of said at least one executable coded cipher key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) by utilization of said at least one executable coded cipher key(s), at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus where said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and said computer memory, and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s), where transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted, and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter where encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion. - View Dependent Claims (29)
-
Specification