METHOD FOR KEYLESS PROTECTION OF DATA USING A LOCAL ARRAY OF DISKS
First Claim
1. A method for securing data in a network, the data including a data message, the data message having a first bit length, the method comprising:
- generating a random number;
transforming the random number to create a first pseudo random number;
mixing the first pseudo random number with the data message to create an encrypted message;
transforming the encrypted message into a second pseudo random number;
mixing the second pseudo random number with the random number to produce a key;
placing the encrypted message side-by-side with the key to produce an output message;
dispersing the output message to a plurality of fragments; and
storing the plurality of fragments in a plurality of data storage devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first pseudo random number. The first pseudo random number is mixed with the data message to create an encrypted message. The encrypted message is transformed into a second pseudo random number. The second pseudo random number is mixed with the random number to produce a key. The encrypted message is placed side-by-side with the key to produce an output message. The output message is dispersed into a plurality of fragments. The plurality of fragments is stored in a plurality of data storage devices
-
Citations
20 Claims
-
1. A method for securing data in a network, the data including a data message, the data message having a first bit length, the method comprising:
-
generating a random number; transforming the random number to create a first pseudo random number; mixing the first pseudo random number with the data message to create an encrypted message; transforming the encrypted message into a second pseudo random number; mixing the second pseudo random number with the random number to produce a key; placing the encrypted message side-by-side with the key to produce an output message; dispersing the output message to a plurality of fragments; and
storing the plurality of fragments in a plurality of data storage devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14)
-
-
13. A method for securing data in a network, the method comprising:
-
generating at least one random number, the at least one random number having a first bit length; dividing a data message into a plurality of data segments, the plurality of data segments having a total amount of data segments equal to k, each data segment having a bit length equal to the first bit length; dispersing the plurality of data segments and the at least one random number into a plurality of fragments, each fragment containing 1/k of the encrypted message such that any k fragments of the plurality of fragments can be used to recreate the encrypted message in its entirety; and storing the plurality of fragments in a plurality of data storage devices.
-
-
15. A data security system comprising:
-
a data encryptor operating to; generate a random number; transform the random number to create a first pseudo random number; mix the first pseudo random number with a data message to create an encrypted message; transform the encrypted message into a second pseudo random number; mix the second pseudo random number with the random number to produce a key; and place the encrypted message side-by-side with the key to produce an output message; and an information disperser communicatively coupled to the data encryptor, the information disperser operating to disperse the output message to a plurality of fragments. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification