ENCRYPTION/DECRYPTION OF DIGITAL DATA USING RELATED, BUT INDEPENDENT KEYS
First Claim
1. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
- creating at least two keys during the encoding that are necessary to decoding the encoded original data; and
storing separately the two keys.
16 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus involve two keys to decode data that are generated during original encoding of the data. The keys are stored on computing devices separate from one another, and the encrypted data, which maintains security until such time as the original data requires decoding. Because the keys can be relatively large, its stored form may have padding bits to align with the file form of the encoded data. Representative keys include a dictionary corresponding to symbols representing the data and a weighted path decoder that correlates the symbols of the dictionary to underlying original bits. A “fast approximation” of compression of current data involves using information obtained from an earlier compression of similar data. Creating the two keys for the original data can also include creating a master key for decoding a plurality of later-encoded files. A second key also works in conjunction with the master key during decoding.
104 Citations
20 Claims
-
1. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
-
creating at least two keys during the encoding that are necessary to decoding the encoded original data; and storing separately the two keys. - View Dependent Claims (2, 3, 4, 5)
-
- 6. The method of 1, wherein the creating the two keys further includes creating one of the two keys for the original data as a master key for decoding a plurality of later-encoded files having current data similar to the original data.
-
8. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
storing separately from the encoded original data on a second or more computing devices a dictionary corresponding to the plurality of symbols and a weighted path decoder that correlates the symbols of the dictionary to underlying original bits of data. - View Dependent Claims (9, 10, 11)
-
12. In a computing system environment, a method of securing original data, the original data being arranged as a plurality of symbols, comprising:
-
encoding the original data; creating at least two keys during the encoding that are necessary to decoding the encoded original data; and storing separately the two keys. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
- 19. The method of 12, wherein the creating the two keys further includes creating one of the two keys for the original data as a master key for decoding a plurality of later-encoded files having current data similar to the original data.
Specification