Encryption Method and System
First Claim
1. A circuit for generating a random bit string, comprising:
- a white noise source;
an analog circuit having an input coupled to an output of the white noise source, the analog circuit having an output that varies between a high value and a low value based upon a signal from the white noise source; and
a digital circuit coupled to the output of the analog circuit, the digital circuit sampling the output of the analog circuit to generate the random bit string.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for encrypting data are disclosed. A circuit uses a white noise generator to capture a random string of bits as an encryption key. The encryption key is generated at a central server and is provided to a subscriber on a physical memory device. The subscriber uses the encryption key to encrypt a source data file. The encrypted data file is sent to the central server, which uses the encryption key to decrypt the encrypted data file and to recover the source data file. The file name for the source data file may be encrypted into the encrypted data file and a new name assigned to the encrypted data file. A random number index may be used to identify the starting point of the encrypted file.
-
Citations
18 Claims
-
1. A circuit for generating a random bit string, comprising:
-
a white noise source; an analog circuit having an input coupled to an output of the white noise source, the analog circuit having an output that varies between a high value and a low value based upon a signal from the white noise source; and a digital circuit coupled to the output of the analog circuit, the digital circuit sampling the output of the analog circuit to generate the random bit string. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for encrypting data files using a random bit string encryption key, comprising:
-
connecting a memory device to a host device, the memory device storing the encryption key and a first verification code; receiving a second verification code from a remote device; accessing the encryption key only if the first verification code matches the second verification code; encrypting a data file stored on an external memory device using the encryption key; and sending the encrypted file to the remote device. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for decrypting data files using a random bit string encryption key, comprising:
-
receiving an encrypted data file at a host device; connecting a memory device to the host device, the memory device storing the encryption key and a first verification code; receiving a second verification code from a remote device; accessing the encryption key only if the first verification code matches the second verification code; and decrypting the encrypted data file using the encryption key and an embedded index. - View Dependent Claims (15, 16, 17, 18)
-
Specification