Method for keyless protection of data using a local array of disks
First Claim
1. A method for securing data in a network using a data splitter device, the data including a data message, the data message having a first bit length, the method comprising:
- generating a random number using the data splitter device;
creating a hash value using the random number and the data message, the hash value having a bit length less than the first bit length;
passing the hash value through a pseudo random number generator to create, using the data splitter device, a first pseudo random number based at least in part on the random number and the first bit length of the data message, the first pseudo random number having a bit length equal to the first bit length;
mixing, using the data splitter device, the first pseudo random number with the data message to create an encrypted message;
transforming, using the data splitter device, the encrypted message into a second pseudo random number;
mixing, using the data splitter device, the second pseudo random number with the random number to produce a key;
placing, using the data splitter device, the encrypted message side-by-side with the key to produce an output message;
dispersing the output message to a plurality of fragments; and
storing the plurality of fragments in a plurality of data storage devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first pseudo random number. The first pseudo random number is mixed with the data message to create an encrypted message. The encrypted message is transformed into a second pseudo random number. The second pseudo random number is mixed with the random number to produce a key. The encrypted message is placed side-by-side with the key to produce an output message. The output message is dispersed into a plurality of fragments. The plurality of fragments is stored in a plurality of data storage devices.
-
Citations
16 Claims
-
1. A method for securing data in a network using a data splitter device, the data including a data message, the data message having a first bit length, the method comprising:
-
generating a random number using the data splitter device; creating a hash value using the random number and the data message, the hash value having a bit length less than the first bit length; passing the hash value through a pseudo random number generator to create, using the data splitter device, a first pseudo random number based at least in part on the random number and the first bit length of the data message, the first pseudo random number having a bit length equal to the first bit length; mixing, using the data splitter device, the first pseudo random number with the data message to create an encrypted message; transforming, using the data splitter device, the encrypted message into a second pseudo random number; mixing, using the data splitter device, the second pseudo random number with the random number to produce a key; placing, using the data splitter device, the encrypted message side-by-side with the key to produce an output message; dispersing the output message to a plurality of fragments; and storing the plurality of fragments in a plurality of data storage devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for securing data in a network using a data splitter device, the data including a data message, the method comprising:
-
generating, using the data splitter device, at least one random number, the at least one random number having a first bit length equal to a bit length of the data message; creating a hash value using the random number and the data message, the hash value having a bit length less than the first bit length; passing the hash value through a pseudo random number generator to create, using the data splitter device, a first pseudo random number based at least in part on the random number and the first bit length of the data message, the first pseudo random number having a bit length equal to the first bit length; mixing, using the data splitter device, the first pseudo random number with the data message to create an encrypted message; transforming, using the data splitter device, the encrypted message into a second pseudo random number; mixing, using the data splitter device, the second pseudo random number with the random number to produce a key; placing, using the data splitter device, the encrypted message side-by-side with the key to produce an output message; dividing the output message to a plurality of data segments using the data splitter device, the plurality of data segments having a total amount of data segments equal to k, each data segment having a bit length equal to the first bit length of the generated at least one random number; dispersing the plurality of data segments and the at least on random number into a plurality of fragments, each containing 1/k of the encrypted message such that any k fragments of the plurality of fragments can be used to recreate the encrypted message in its entirety; and storing the plurality of data segments in a plurality of data storage devices. - View Dependent Claims (12)
-
-
13. A data security system for securing a data message, the data security system comprising:
-
a pseudo random number generator; a data splitter device including; a data encryptor configured to; generate a random number; create a hash value using the random number and the data message, the hash value having a bit length less than a first bit length of the data message; pass the hashed value through the pseudo random number generated to create a first pseudo random number based at least in part on the random number and the first bit length of the data message, the first pseudo random number having a bit length equal to the first bit length; mix the first pseudo random number with the data message to create an encrypted message; transform the encrypted message into a second pseudo random number; mix the second pseudo random number with the random number to produce a key; and place the encrypted message side-by-side with the key to produce an output message; and an information disperser communicatively coupled to the data encryptor, the information disperser operating to disperse the output message to a plurality of fragments; and a plurality of data storage devices communicatively coupled to the information disperser, the plurality of data storage devices configured to store the plurality of fragments. - View Dependent Claims (14, 15, 16)
-
Specification