Cryptography method and system for securing data via electronic transmission
First Claim
Patent Images
1. A method for encrypting data utilizing a data encryption server, comprising the steps of:
- registering, with the server, a data originator;
creating, by the server, a data originator encryption key and a corresponding recipient encryption key, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored, wherein the randomly-generated key-pair set is utilized for a single data transmission between the data originator peripheral device and the recipient peripheral device and discarded after decryption of the transmitted data, wherein the data to be transmitted is a message and each character and/or space of the message is assigned a randomly-generated character, wherein the randomly-generated character is not repeated, further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted that further conceal the nature and size of the data to transmitted to the recipient peripheral device;
transmitting, by the server, the data originator encryption key to a data originator peripheral device and the recipient encryption key to a recipient peripheral device;
encrypting data to be transmitted by the data originator peripheral device with the data originator encryption key;
transmitting the encrypted data to the recipient peripheral device;
verifying that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and
when the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data received by the recipient peripheral device.
0 Assignments
0 Petitions
Accused Products
Abstract
Securing information is increasingly difficult. With technological advances and tools/information sharing between hackers it is becoming even more difficult to ensure that sensitive data remains secure. Disclosed are systems and methods for uniquely securing data for each communication. The disclosed systems and methods allow for transmitting data across multiple boundaries (national, linguistic, operating system, platform, brand, etc.), while maintaining the desired security of the originator'"'"'s data.
9 Citations
17 Claims
-
1. A method for encrypting data utilizing a data encryption server, comprising the steps of:
-
registering, with the server, a data originator; creating, by the server, a data originator encryption key and a corresponding recipient encryption key, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored, wherein the randomly-generated key-pair set is utilized for a single data transmission between the data originator peripheral device and the recipient peripheral device and discarded after decryption of the transmitted data, wherein the data to be transmitted is a message and each character and/or space of the message is assigned a randomly-generated character, wherein the randomly-generated character is not repeated, further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted that further conceal the nature and size of the data to transmitted to the recipient peripheral device; transmitting, by the server, the data originator encryption key to a data originator peripheral device and the recipient encryption key to a recipient peripheral device; encrypting data to be transmitted by the data originator peripheral device with the data originator encryption key; transmitting the encrypted data to the recipient peripheral device; verifying that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and when the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data received by the recipient peripheral device. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10, 11)
-
-
5. The method of 2, wherein the additional randomly-generated intermittently dispersed characters are numbers.
-
12. The method of 1, wherein the assigned randomly-generated character is a number.
-
13. A system for encrypting data, comprising:
-
(a) at least a first and second peripheral device; (b) a data encryption server; (c) and a network router allowing for communication between the first peripheral device, second peripheral device, and data encryption server;
wherein;the first peripheral device is a data originator and is configured to communicated with and register with the encryption server; the encryption server is configured to concurrently create a data originator encryption key and a corresponding recipient encryption key once the first peripheral device registers with the encryption server, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored, wherein the randomly-generated key-pair set is utilized for a single data transmission between the data originator peripheral device and the recipient peripheral device and discarded after decryption of the transmitted data, wherein the data to be transmitted is a message and each character and/or space of the message is assigned a randomly-generated character, wherein the randomly-generated character is not repeated, further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted that further conceal the nature and size of the data to transmitted to the recipient peripheral device; the encryption server is further configured to transmit the data originator encryption key to the first peripheral device and the recipient encryption key to the second peripheral device, which is a recipient peripheral device; the encryption server is configured to encrypt data to be transmitted by the data originator peripheral device with the data originator encryption key and transmit the encrypted data to the recipient peripheral device; at least one of the first peripheral device, the second peripheral device, and/or encryption server are configured to verify that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and
if the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data received by the recipient peripheral device. - View Dependent Claims (14, 15, 16, 17)
-
Specification