Method of generating secret identification numbers
First Claim
1. A method of generating a secret identification number from a random digital data stream, the method comprising the steps of:
- selecting a first group of bytes from the random digital data stream, said first group of bytes having a first numerical value;
looking up a first maximal length LFSR feedback term from a list in response to said first numerical value;
generating a cyclic redundancy code feedback term in response to filtering out predetermined values from a third group of bytes selected from said random digital data stream; and
forming the secret identification number from said first maximal length LFSR feedback term, said cyclic redundancy code feedback term, and a fourth group of bytes from said random digital data stream.
11 Assignments
0 Petitions
Accused Products
Abstract
The present invention teaches a method of generating a secret identification number from a random digital data stream. The method comprises the step of initially selecting a first and a second group of bytes from the random digital data stream, wherein the first and second groups of bytes have a first and second numerical value. Subsequently, a first maximal length LFSR feedback term is looked up from a list in response to said first numerical value, while a second maximal length LFSR feedback term is looked up from the list in response to said second numerical value. The method additionally comprises the step of generating a cyclic redundancy code feedback term in response to executing a cyclic redundancy code check on a third group of bytes selected from the random digital data stream. Moreover, the method comprises the step of forming the secret identification number from the first and second maximal length LFSR feedback terms, the cyclic redundancy code feedback term, and a fourth group of bytes from the random digital data stream.
266 Citations
30 Claims
-
1. A method of generating a secret identification number from a random digital data stream, the method comprising the steps of:
-
selecting a first group of bytes from the random digital data stream, said first group of bytes having a first numerical value; looking up a first maximal length LFSR feedback term from a list in response to said first numerical value; generating a cyclic redundancy code feedback term in response to filtering out predetermined values from a third group of bytes selected from said random digital data stream; and forming the secret identification number from said first maximal length LFSR feedback term, said cyclic redundancy code feedback term, and a fourth group of bytes from said random digital data stream. - View Dependent Claims (2, 3, 4)
-
-
5. A method for generating a multiplicity of random numbers, the method comprising the steps of:
-
generating chaotic noise; sampling said chaotic noise such that a plurality of samples are created; converting said plurality of samples into a random digital data stream; and forming the multiplicity of random numbers from said random digital data stream. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A process for generating a multipicity of secure random numbers, the process comprising:
-
generating chaotic noise from turbulent air flow; sampling said chaotic noise such that a plurality of samples are created; converting said plurality of samples into a random digital data stream; shuffling said plurality of converted samples to obscure correlations between the multiplicity of random numbers; compressing said shuffled plurality of converted samples such that each random number of the mulitplicity has an equal probability of being generated; and one way encrypting said compressed plurality of shuffled and converted samples such that the plurality of secure random numbers are created. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification