Secure data transmission using undiscoverable or black data
First Claim
1. A method of encrypting data, the method comprising:
- establishing first data including first discoverable data and first undiscoverable data;
establishing a first key and a second key, the second key being substantially underivable from the first key;
encrypting the first discoverable data with the first key; and
encrypting the first undiscoverable data with the second key
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems of encrypting data. One method includes establishing data that includes discoverable or “white” data and undiscoverable or “black” data. Black data is generally unrecognizable. For example, it may be random data. White data generally has recognizable content or is transmitted in a recognizable format. A first key and a second key are created or established, such that the second key is substantially underivable from the first key. The discoverable or white data is encrypted with the first key and the undiscoverable or black data is encrypted with the second key. In subsequent communications or transactions, at least one of the first key and the second key is mutated.
152 Citations
53 Claims
-
1. A method of encrypting data, the method comprising:
-
establishing first data including first discoverable data and first undiscoverable data;
establishing a first key and a second key, the second key being substantially underivable from the first key;
encrypting the first discoverable data with the first key; and
encrypting the first undiscoverable data with the second key - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for encrypting data including discoverable data and undiscoverable data, the system comprising:
a sender having a first key and a second key, the second key being substantially underivable from the first key, the sender configured to encrypt the discoverable data with the first key, to encrypt the undiscoverable data with the second key, and to receive at least one of a mutated first key and a mutated second key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
- 30. A storage device for storing data, the device configured to encrypt discoverable data with a first set of keys and undiscoverable data with a second set of keys, the second set of keys being substantially underivable from the first set of keys.
-
34. A method of transmitting messages between an entity and an authenticator comprising:
-
establishing an identifier associated with the entity;
establishing a first key to encrypt only undiscoverable data, the first key known only to the entity and the authenticator;
establishing a second key to encrypt only discoverable data, the second key known only to the entity and the authenticator;
encrypting request parameters with the second key to create an encrypted request;
generating a hash of the request parameters;
encrypting the hash of the request parameters with the first key to create an encrypted request hash;
the entity sending the encrypted request and the encrypted request hash to the authenticator; and
mutating at least one of the first key and the second key. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
Specification