SECURED EMBEDDED DATA ENCRYPTION SYSTEMS
First Claim
1. A method of securing communications among a plurality of devices comprising a group, wherein the method comprises:
- storing a set of security vectors for each of the plurality of devices, wherein the plurality of devices comprises a transmitting device and a receiving device;
storing a message authentication code for each of the plurality of devices;
encrypting, using a transformation matrix comprising a set of security vectors of the transmitting device, both data to be transmitted by the transmitting device and the message authentication code of the transmitting device to provide both encrypted data and an encrypted message authentication code;
transmitting the encrypted data from the transmitting device;
receiving the encrypted data by the receiving device;
decrypting the encrypted data using the transformation matrix comprising the set of security vectors of the transmitting device to provide both decrypted data and an extracted message authentication code;
comparing the stored message authentication code of the transmitting device with the extracted message authentication code; and
processing the decrypted data if the stored message authentication code of the transmitting device is equivalent to the extracted message authentication code.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices generate security vectors based on their own attributes. A device'"'"'s security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting device'"'"'s transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting device'"'"'s MAC. The receiving device can permit or prevent further processing of the packet'"'"'s data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby “evolving” the transformation matrices.
10 Citations
20 Claims
-
1. A method of securing communications among a plurality of devices comprising a group, wherein the method comprises:
-
storing a set of security vectors for each of the plurality of devices, wherein the plurality of devices comprises a transmitting device and a receiving device; storing a message authentication code for each of the plurality of devices; encrypting, using a transformation matrix comprising a set of security vectors of the transmitting device, both data to be transmitted by the transmitting device and the message authentication code of the transmitting device to provide both encrypted data and an encrypted message authentication code; transmitting the encrypted data from the transmitting device; receiving the encrypted data by the receiving device; decrypting the encrypted data using the transformation matrix comprising the set of security vectors of the transmitting device to provide both decrypted data and an extracted message authentication code; comparing the stored message authentication code of the transmitting device with the extracted message authentication code; and processing the decrypted data if the stored message authentication code of the transmitting device is equivalent to the extracted message authentication code. - View Dependent Claims (2, 3)
-
-
4. A method of securing communications among a plurality of devices comprising a group, wherein the method comprises:
-
establishing a group comprising a plurality of devices, wherein each of the plurality of devices is characterized by a set of security vectors; and
the plurality of devices comprises a transmitting device and a receiving device;storing the set of security vectors for each of the plurality of devices; storing a unique message authentication code for each of the plurality of devices; encrypting, using a transformation matrix comprising the set of security vectors associated with the transmitting device, both data to be transmitted by the transmitting device and a unique message authentication code of the transmitting device; transmitting the encrypted data from the transmitting device; receiving the encrypted data at the receiving device; decrypting the encrypted data using the transformation matrix comprising the set of security vectors of the transmitting device to provide both decrypted data and an extracted message authentication code; storing a copy of the decrypted data in a buffer; comparing the stored unique message authentication code of the transmitting device with the extracted message authentication code; and processing the decrypted data if the stored unique message authentication code of the transmitting device is equivalent to the extracted message authentication code. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. An encryption/decryption processor, comprising:
-
a storage unit for storing a set of security vectors and a message authentication code for each of a plurality of devices; an encryption unit for encrypting, using a transformation matrix based on a set of security vectors for a transmitting device, both data to be transmitted and a message authentication code of the transmitting device; a decryption unit for decrypting received data using a transformation matrix of a transmitting device to provide both decrypted data and an extracted message authentication code; a comparison unit for comparing the stored message authentication code of the transmitting device with the extracted message authentication code; and a processing unit for processing the decrypted data if the stored message authentication code of the transmitting device and the extracted message authentication code are equivalent. - View Dependent Claims (12, 13, 14)
-
-
15. A computer program product stored on a non-transitory computer-readable storage medium comprising computer-executable instructions for causing a processor to:
-
store a set of security vectors and a message authentication code for each of a plurality of devices; encrypt, using a transformation matrix comprising a set of security vectors of a transmitting device, both data to be transmitted by the transmitting device and a message authentication code of the transmitting device; decrypt received data using the transformation matrix of the transmitting device to provide both decrypted data and an extracted message authentication code; compare the stored message authentication code of the transmitting device with the extracted message authentication code; and process the decrypted data if the stored message authentication code of the transmitting device and the extracted message authentication code are equivalent. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification