Employing cyclic redundancy checks to provide data security
First Claim
Patent Images
1. A method of providing data security, said method comprising:
- transmitting data from a transmitter to a receiver, wherein the transmitting comprises;
providing data from a device of the transmitter to a generator of the transmitter, said data comprising a command to control a remote unit;
randomly selecting, by the generator, in response to receiving the data during transmitting, a plurality of cyclic redundancy check (CRC) polynomials from a set of CRC polynomials to be used to generate a plurality of CRCs, said set of CRC polynomials determined based on a determined degree of desired security for the transmission;
using the randomly selected plurality of CRC polynomials to generate the plurality of CRCs;
including the plurality of CRCs in the data being transmitted, wherein the plurality of CRCs determine the security of the data, the security of the data including whether the data being transmitted is being transmitted by an authorized user, wherein a failed CRC check indicates the data is not being transmitted by an authorized user.
1 Assignment
0 Petitions
Accused Products
Abstract
The security of data is enhanced by the use of cyclic redundancy checks. Data is encoded with one or more cyclic redundancy checks and then transmitted by a transmitter to a receiver. The receiver receives the encoded data and decodes it in order to use the one or more cyclic redundancy checks to determine whether the data was sent by an authorized user.
49 Citations
14 Claims
-
1. A method of providing data security, said method comprising:
transmitting data from a transmitter to a receiver, wherein the transmitting comprises; providing data from a device of the transmitter to a generator of the transmitter, said data comprising a command to control a remote unit; randomly selecting, by the generator, in response to receiving the data during transmitting, a plurality of cyclic redundancy check (CRC) polynomials from a set of CRC polynomials to be used to generate a plurality of CRCs, said set of CRC polynomials determined based on a determined degree of desired security for the transmission; using the randomly selected plurality of CRC polynomials to generate the plurality of CRCs; including the plurality of CRCs in the data being transmitted, wherein the plurality of CRCs determine the security of the data, the security of the data including whether the data being transmitted is being transmitted by an authorized user, wherein a failed CRC check indicates the data is not being transmitted by an authorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
Specification