Encryption/decryption of digital data using related, but independent keys
First Claim
1. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
- creating at least two keys during the encoding that are each necessary to decoding the encoded original data, the two keys being independent one from the other such that one key of the at least two keys is not used to create another of the at least two keys, wherein one key of the at least two keys provides a master key for decoding a plurality of later-encoded files having current data similar to the original data; and
storing separately the at least two keys.
16 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus involve two keys to decode data that are generated during original encoding of the data. The keys are stored on computing devices separate from one another, and the encrypted data, which maintains security until such time as the original data requires decoding. Because the keys can be relatively large, its stored form may have padding bits to align with the file form of the encoded data. Representative keys include a dictionary corresponding to symbols representing the data and a weighted path decoder that correlates the symbols of the dictionary to underlying original bits. A “fast approximation” of compression of current data involves using information obtained from an earlier compression of similar data. Creating the two keys for the original data can also include creating a master key for decoding a plurality of later-encoded files. A second key also works in conjunction with the master key during decoding.
117 Citations
17 Claims
-
1. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
-
creating at least two keys during the encoding that are each necessary to decoding the encoded original data, the two keys being independent one from the other such that one key of the at least two keys is not used to create another of the at least two keys, wherein one key of the at least two keys provides a master key for decoding a plurality of later-encoded files having current data similar to the original data; and storing separately the at least two keys. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. In a computing system environment, a method of securing original data having been encoded and stored on a computing device, the original data being arranged as a plurality of symbols, comprising:
storing separately from the encoded original data on a second or more computing devices a dictionary corresponding to the plurality of symbols and a separate weighted path decoder that correlates the symbols of the dictionary to underlying original bits of data wherein the dictionary and the separate weighted path decoder are independent such that one is not used to create the other, further wherein the dictionary for the original data provides a master key for decoding a plurality of later-encoded files having current data similar to the original data. - View Dependent Claims (8, 9)
-
10. In a computing system environment, a method of securing original data, the original data being arranged as a plurality of symbols, comprising:
-
encoding the original data; creating at least two keys during the encoding that are each necessary to decoding the encoded original data, the two keys being independent one from the other such that one key of the at least two keys is not used to create another of the at least two keys, wherein one key of the at least two keys provides a master key for decoding a plurality of later-encoded files having current data similar to the original data; and storing separately the at least two keys. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification