Effective concealment of communication pattern (BitGrey, BitLoop)
First Claim
Patent Images
1. A method utilizing a combination of encrypted message data and additional randomized bits to both secure and conceal communications between communication stations, comprising;
- organizing a plurality of communication stations in a distributed configuration;
transmitting, by a communication station of the plurality of communication stations to another targeted communication station of the plurality of communication stations, an encrypted meaningful message, this transmitted encrypted meaningful message appearing as random bits to an outside observer or eavesdropper;
actively preventing an outside observer or eavesdropper from identifying the transmitting communication station of the encrypted meaningful message by preventing an outside observer or eavesdropper from distinguishing between this transmitted encrypted meaningful message appearing as random bits, and additional transmitted random bits that are transmitted in the same interval of time between the remaining communication stations out of the plurality of communication stations, by having all the remaining communication stations out of the plurality of communication stations transmit random bit strings to randomly selected communication stations out of the plurality of communication stations, these random bit string transmissions occurring at random points of time; and
actively preventing an outside observer or eavesdropper from identifying the targeted communication station of the plurality of communication stations that receives the encrypted meaningful message appearing as random bits to an outside observer or eavesdropper, by having the encrypted meaningful message appearing as random bits also transmitted to all the remaining communication stations out of the plurality of communication stations in addition to targeted communication stations, with the remaining communication stations out of the plurality of communication stations determining that the encrypted meaningful message is not intended for them based on content of the encrypted meaningful message, and additionally having all the communication stations out of the plurality of communication stations transmit random bit strings at the same interval of time to randomly selected communication stations out of the plurality of communication stations, these random bit string transmissions occurring at random points of time.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention establishes a protocol designed to mask the communication pattern that prevails within a group or a community, such that an outside observer has no knowledge as to who talks to whom within the protocol protected group, not how often, nor how much, or whether any communication takes place. Thereby an external observer is denied the intelligence borne in the very pattern of group communication.
15 Citations
13 Claims
-
1. A method utilizing a combination of encrypted message data and additional randomized bits to both secure and conceal communications between communication stations, comprising;
-
organizing a plurality of communication stations in a distributed configuration; transmitting, by a communication station of the plurality of communication stations to another targeted communication station of the plurality of communication stations, an encrypted meaningful message, this transmitted encrypted meaningful message appearing as random bits to an outside observer or eavesdropper; actively preventing an outside observer or eavesdropper from identifying the transmitting communication station of the encrypted meaningful message by preventing an outside observer or eavesdropper from distinguishing between this transmitted encrypted meaningful message appearing as random bits, and additional transmitted random bits that are transmitted in the same interval of time between the remaining communication stations out of the plurality of communication stations, by having all the remaining communication stations out of the plurality of communication stations transmit random bit strings to randomly selected communication stations out of the plurality of communication stations, these random bit string transmissions occurring at random points of time; and actively preventing an outside observer or eavesdropper from identifying the targeted communication station of the plurality of communication stations that receives the encrypted meaningful message appearing as random bits to an outside observer or eavesdropper, by having the encrypted meaningful message appearing as random bits also transmitted to all the remaining communication stations out of the plurality of communication stations in addition to targeted communication stations, with the remaining communication stations out of the plurality of communication stations determining that the encrypted meaningful message is not intended for them based on content of the encrypted meaningful message, and additionally having all the communication stations out of the plurality of communication stations transmit random bit strings at the same interval of time to randomly selected communication stations out of the plurality of communication stations, these random bit string transmissions occurring at random points of time. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A communications system configured to utilize a combination of encrypted message data and additional randomized bits to both secure and conceal communications between communication stations, comprising;
-
a plurality of s communication stations, each comprising a hardware processor and memory; wherein the plurality of s communication stations are organized in a fixed circular configuration of −
1,2,3, . . . s,1−
;each communication station configured to; transmit messages to the next communication station in the circular configuration, in a fixed order, at a fixed circular flow rate of a bit package of C bits per round around the circular configuration, comprised of R random bits per round plus M message bits per round around the circular configuration, the M message bits per round also appearing as random bits that are indistinguishable to an outside observer or eavesdropper from the R random bits per round; wherein each communication station'"'"'s transmitted M message bits per round are comprised of messages to any other of the plurality of communication stations; each communication station further configured to; actively prevent an outside observer or eavesdropper that sees the overall flow of the bit package of C bits per round, from being able to identify how many of these C bits per round are meaningless, randomized, or represent a meaningful message, by configuring the transmitted messages between communication stations, to comprise R random bits plus M message bits, where these M message bits also appear as random bits to an outside observer or eavesdropper, actively prevent an outside observer or eavesdropper that sees the overall flow of the bit package of C bits per round, from being able to identify a communication station that transmits data to another communication station, a communication station that receives data from another communication station, the frequency of when data is transmitted between communication stations, and/or the amount of data that is transmitted between communication stations, by configuring the transmitted messages between communication stations, to comprise R=C−
M random bits plus M message bits and to keep a fixed flow rate of C bits per round, where these M message bits also appear as random bits to an outside observer or eavesdropper; andpass each bit package to the next communication station in the circular order, until each bit package returns to the communication station that submitted the returned bit package for circulation, at which time the communication station that submitted the returned bit package for circulation, replaces the returned bit package with a replacement bit package comprised of a different combination of M bits and R bits; wherein each communication station is configured to detect any message intended for it, and to properly decrypt it. - View Dependent Claims (7)
-
-
8. A method utilizing a combination of encrypted message data and additional randomized bits to both secure and conceal communications between communication stations, comprising;
-
organizing a plurality of s communication stations in a fixed circular configuration of −
1,2,3, . . . s,1−
;transmitting messages from a communication station to the next communication station in the circular configuration, in a fixed order, at a fixed circular flow rate of a bit package of C bits per round around the circular configuration, comprised of R random bits per round plus M message bits per round around the circular configuration, the M message bits per round also appearing as random bits that are indistinguishable to an outside observer or eavesdropper from the R random bits per round; wherein each communication station'"'"'s transmitted M message bits per round are comprised of messages to any other of the plurality of communication stations; actively preventing an outside observer or eavesdropper that sees the overall flow of the bit package of C bits per round, from being able to identify how many of these C bits per round are meaningless, randomized, or represent a meaningful message, by transmitting messages between communication stations that comprise R random bits plus M message bits, these M message bits also appearing as random bits to an outside observer or eavesdropper, actively preventing an outside observer or eavesdropper that sees the overall flow of the bit package of C bits per round, from being able to identify a communication station that transmits data to another communication station, a communication station that receives data from another communication station, the frequency of when data is transmitted between communication stations, and/or the amount of data that is transmitted between communication stations, by transmitting messages between communication stations that comprise R=C−
M random bits plus M message bits and by keeping a fixed flow rate of C bits per round, these M message bits also appearing as random bits to an outside observer or eavesdropper; andpassing each bit package from a communication station to the next communication station in the circular order, until each bit package returns to the communication station that submitted the returned bit package for circulation, at which time the communication station that submitted the returned bit package for circulation, replaces the returned bit package with a replacement bit package comprised of a different combination of M bits and R bits; wherein each communication station detects any message intended for it, and properly decrypts it. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification