‘Virtual’ encryption scheme combining different encryption operators into compound-encryption mechanism
First Claim
Patent Images
1. A method for controllably encrypting data to be transmitted over a communication path between a data source and a data recipient, comprising the steps of:
- (a) providing at least three sequentially different data encryption operators to encrypt said data into an unintelligible form for transmission over said communication path;
(b) passing said data to be transported over said communication path through a first of said sequentially different encryption operators that are arranged in a cascaded sequence to thereby produce a first encrypted data stream; and
(c) successively passing said first encrypted data stream through the cascaded sequence of said sequentially different data encryption operators and successively accessing the at least three different sequentially different encryption operators and successively wrapping previously encrypted data with the next respective encryption operator until the last access code in an encryption control sequence is processed to thereby produce a multiple-encrypted output data stream that is an encryption of said first encrypted data stream.
0 Assignments
0 Petitions
Accused Products
Abstract
A method controllably encrypts data to be transmitted over a communication path between a data source and data receipt by passing data to be transported over the communication path through a first of respectively different encryption operators to produce a first encrypted data stream. This is then passed through a second selected one of respectively different data encryption operators to produce a compound encrypted output data stream that is an encryption of the first encrypted data stream.
-
Citations
11 Claims
-
1. A method for controllably encrypting data to be transmitted over a communication path between a data source and a data recipient, comprising the steps of:
-
(a) providing at least three sequentially different data encryption operators to encrypt said data into an unintelligible form for transmission over said communication path;
(b) passing said data to be transported over said communication path through a first of said sequentially different encryption operators that are arranged in a cascaded sequence to thereby produce a first encrypted data stream; and
(c) successively passing said first encrypted data stream through the cascaded sequence of said sequentially different data encryption operators and successively accessing the at least three different sequentially different encryption operators and successively wrapping previously encrypted data with the next respective encryption operator until the last access code in an encryption control sequence is processed to thereby produce a multiple-encrypted output data stream that is an encryption of said first encrypted data stream. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for controllably encrypting data to be transmitted over a communication path between a data source and a data recipient, comprising the steps of:
-
(a) providing at least three sequentially different data encryption operators;
(b) successively passing data to be transported over said communication path through a cascaded sequence of said sequentially different data encryption operators and successively accessing the at least three different sequentially different encryption operators and successively wrapping previously encrypted data with the next respective encryption operator until the last access code in an encryption control sequence is processed to thereby produce a multiple-encrypted data stream. - View Dependent Claims (7)
-
-
8. A method for controllably encrypting data to be transmitted over a communication path between a data source and a data recipient, comprising the steps of:
-
(a) storing at least three sequentially different data encryption operators in a data encryption operator database;
(b) retrieving from said database and assembling selected ones of said sequentially different data encryption operators into a cascaded sequence of data encryption operators, wherein immediately successive ones of said data encryption operations of said sequence are different from one another; and
(c) successively passing data to be transported over said communication path through said cascaded sequence of data encryption operators generated in step (b), and successively accessing the at least three different sequentially different encryption operators and successively wrapping previously encrypted data with the next respective encryption operator until the last access code in an encryption control sequence is processed so as to produce a multiple-encrypted data stream. - View Dependent Claims (9)
-
-
10. A method for controllably encrypting data to be transmitted over a communication path between a data source and a data recipient, comprising the steps of:
-
(a) providing at least three sequentially different data encryption operators;
(b) generating a cascaded sequence of data encryption operators comprised of plural ones of said sequentially different data encryption operators provided in step (a); and
(c) successively passing data to be transported over said communication path through said cascaded sequence of data encryption operators generated in step (b), and successively accessing the at least three different sequentially different encryption operators and successively wrapping previously encrypted data with the next respective encryption operator until the last access code in an encryption control sequence is processed so as to produce a multiple-encrypted output data stream. - View Dependent Claims (11)
-
Specification