Hiding ciphertext using a linguistics algorithm with dictionaries
First Claim
Patent Images
1. A method for providing security in an electronic messaging system comprising:
- receiving a message input;
using a processor, encoding said message input to provide ciphertext;
with said processor, further transforming said ciphertext to disguise the ciphertext and make it appear to be similar to or indistinguishable from, at least by certain automated processes, a natural language short message; and
transmitting said further-transformed ciphertext as a short message over an electronic network using a short-messaging protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications.
-
Citations
20 Claims
-
1. A method for providing security in an electronic messaging system comprising:
-
receiving a message input; using a processor, encoding said message input to provide ciphertext; with said processor, further transforming said ciphertext to disguise the ciphertext and make it appear to be similar to or indistinguishable from, at least by certain automated processes, a natural language short message; and transmitting said further-transformed ciphertext as a short message over an electronic network using a short-messaging protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing security in electronic messaging comprising:
-
an input device that receives a message input; a processor configured to encode said message input to provide ciphertext, to further transform said ciphertext to disguise the ciphertext and make it appear to be similar to or indistinguishable from, at least by certain automated processes, a natural language short message; and a message transmitter that transmits said further-transformed ciphertext as a short message over an electronic network using a short-messaging protocol. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory storage device storing instructions which when executed by a processor improves security of an electronic messaging system, the instructions comprising:
-
First instructions for receiving a message input; Second instructions for encoding said message input to provide ciphertext; Third instructions for further transforming said ciphertext to disguise the ciphertext and make it appear to be similar to or indistinguishable from, at least by certain automated processes, from a natural language short message; and Fourth instructions for transmitting said further-transformed ciphertext as a short message over an electronic network using a short-messaging protocol. - View Dependent Claims (18, 19, 20)
-
Specification