Encryption via user-editable multi-page file
First Claim
1. A novel method of making use of a large user-editable data file in an Encryption/Decryption Computer Program to enable the creation, by each user, of a uniquely customised version of the original Program, effectively allowing each user to create his or her own unique, private, secret Custom Encryption/Decryption Program which differs from the publicly distributed original Program and the Custom Encryption/Decryption Programs of all other users, such large user-editable data file being additional to, and distinct from, a normal encryption Key, and such large user-editable data file being used in such a manner that, within any given round of encryption manipulation, the difference between the ANSI codes of the input character at each particular position in the target file being manipulated and the output character at that particular position (such difference being referred to as the ‘
- character “
rotation”
’
), is very variable and dependant on not only the Key and the Particular Position in the target file, but also (and these are the important points) on the Input Character itself and the user-controlled Custom Contents of the large user-editable data file.
0 Assignments
0 Petitions
Accused Products
Abstract
A large user-editable data file (“BED” file) allows customizing of an encryption/decryption computer program and strengthens encryption by making the difference between the input character code at a particular target file position and the corresponding output character code very variable and dependant on, importantly, the input character itself and the user-controlled BED file, in addition to the key and particular target file position. A pseudo-random number, ultimately dependant on the key and target file position, selects a specific BED file page and also is added to the input character code, the sum becoming a positional index into that page, and the value at that index yielding the output character code. A graphical user interface allows editing of each BED file page and temporarily lists missing values and highlights illegal duplicates in color. Colored number value sub-sets allow the state of randomness of each page to be easily seen.
-
Citations
4 Claims
-
1. A novel method of making use of a large user-editable data file in an Encryption/Decryption Computer Program to enable the creation, by each user, of a uniquely customised version of the original Program, effectively allowing each user to create his or her own unique, private, secret Custom Encryption/Decryption Program which differs from the publicly distributed original Program and the Custom Encryption/Decryption Programs of all other users, such large user-editable data file being additional to, and distinct from, a normal encryption Key, and such large user-editable data file being used in such a manner that, within any given round of encryption manipulation, the difference between the ANSI codes of the input character at each particular position in the target file being manipulated and the output character at that particular position (such difference being referred to as the ‘
- character “
rotation”
’
), is very variable and dependant on not only the Key and the Particular Position in the target file, but also (and these are the important points) on the Input Character itself and the user-controlled Custom Contents of the large user-editable data file.
- character “
-
2. In the context of an Encryption/Decryption Computer Program, a novel method of creating a ‘
- character “
rotation”
’
, very variable and dependant on the Key, the Particular Position in the target file, the Input Character, and the Contents of the Program'"'"'s large data file, by using, for a particular round of encryption manipulation, a continuously changing unpredictable but reproducible number (ultimately derived from a Key) to select a particular electronic “
page”
of data from the Program'"'"'s large data file, where it is essential that the number of “
pages”
be substantial, that each “
page”
of data contains a definite set of number values which is the same for all “
pages”
, that the set of possible number values be of a substantial size, that there be no duplicate number values within each “
page”
, and that each “
page”
have a different and reasonably random ordering of its number values, then for each particular position in the target input file using an integer, calculated from BOTH the ANSI value of the input character at that particular position and a pseudo-random number generated from a normal encryption Key, to act as a positional index into the selected “
page”
, then using the value at that index as the output character.
- character “
-
3. In the context of a graphical user interface displaying “
- pages”
of data from the large data file of an Encryption/Decryption Computer Program, a novel method of providing the means where by the Program'"'"'s large data file may be safely edited by the user, especially the method of temporarily allowing duplicate values on a “
page”
of data at one stage but in the following stage identifying the duplicate values by colouring them a colour (for example yellow) that does not appear in a “
page”
which is completely correct and also adding to the form a long coloured bar within which are displayed in read-only form a list of the values missing from the set of number values, both actions facilitating the further editing of the page to make it completely correct, a completely correct page containing number values representing every member of the set with no duplicate values.
- pages”
-
4. In the context of a graphical user interface displaying “
- pages”
of data from the large data file of an Encryption/Decryption Computer Program, a novel method of dividing the set of possible number values forming each “
page”
of that large data file into sub-sets and displaying each sub-set in a different colour so that the state of randomness of the values in each “
page”
can be seen at a glance.
- pages”
Specification