Methods and apparatus for multi-level dynamic security system
First Claim
Patent Images
1. A method, comprising:
- converting original data into a plurality of sub-bands using wavelet decomposition;
encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and
transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for converting original data into a plurality of sub-bands using wavelet decomposition; encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.
-
Citations
26 Claims
-
1. A method, comprising:
-
converting original data into a plurality of sub-bands using wavelet decomposition;
encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and
transmitting the encrypted sub-band data to a recipient separately from the other sub-bands. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
permitting a source entity to make a protocol selection concerning (i) parameters of a wavelet decomposition process to which original data are to be subject to convert the original data into a plurality of sub-bands, and (ii) parameters of an encryption process to which at least one of the sub-bands is to be subject to produce respective encrypted sub-band data; and
permitting the source entity to select a respective security level to be associated with the respective encrypted sub-band data;
comparing at least one of the protocol selection and selected security level(s) with a database containing data concerning at least one of (i) a probability that the encrypted sub-band data may be broken given the protocol selection, (ii) an association between security levels and protocol selections; and
advising the source entity to select at least one of a different security level and a different protocol when a result of the comparison indicates a relatively high probability that the encrypted sub-band data may be broken. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. An apparatus including a processor operating under the instructions of a software program, the software program causing the apparatus to perform actions, comprising:
-
converting original data into a plurality of sub-bands using wavelet decomposition;
encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and
transmitting the encrypted sub-band data to a recipient separately from the other sub-bands. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. An apparatus including a processor operating under the instructions of a software program, the software program causing the apparatus to perform actions, comprising:
-
permitting a source entity to make a protocol selection concerning (i) parameters of a wavelet decomposition process to which original data are to be subject to convert the original data into a plurality of sub-bands, and (ii) parameters of an encryption process to which at least one of the sub-bands is to be subject to produce respective encrypted sub-band data; and
permitting the source entity to select a respective security level to be associated with the respective encrypted sub-band data;
comparing at least one of the protocol selection and selected security level(s) with a database containing data concerning at least one of (i) a probability that the encrypted sub-band data may be broken given the protocol selection, (ii) an association between security levels and protocol selections; and
advising the source entity to select at least one of a different security level and a different protocol when a result of the comparison indicates a relatively high probability that the encrypted sub-band data may be broken. - View Dependent Claims (21, 22, 23)
-
-
24. A system, comprising:
-
a source entity operable to;
(i) convert original data into a plurality of sub-bands using a wavelet decomposition process, (ii) encrypt at least one of the sub-bands to produce encrypted sub-band data, and (iii) transmit one of more packets of the encrypted sub-band data to a recipient over a packet-switched network separately from the other sub-bands; and
a plurality of trusted nodes within the packet-switched network, each trusted node having a node security level for comparison with a security level associated with the encrypted sub-band data, wherein each packet may only be routed through a trusted node having a node security level equal to or higher than the security level associated with the encrypted sub-band data. - View Dependent Claims (25, 26)
-
Specification