Technologies for enhancing computer security
First Claim
1. A method for enhancing security of a local computer on a network, comprising the steps of:
- receiving a message having multiple characters and originating from a first computer on the network;
transforming the message into an encrypted bit stream using a predetermined variable A, a predetermined variable B, and a predetermined variable C, wherein variable A and variable B are different from each other and are both less than variable C, and a lookup table having characters and corresponding decimal digits, and an A/B switch that automatically flips back-and-forth between a first and a second mode, the transforming including;
converting the message into a stream of decimal digits by sequentially looking up the characters in the message within the look-up table and retrieving corresponding decimal digits for each character;
creating an initial bit stream by converting the stream of decimal digits into binary;
parsing the initial bit stream into subsequences that alternate between being of bit length specified by variable A, and of bit length specified by variable B, said alternating controlled by the A/B switch and a first clock and occurring according to a frequency of the first clock;
inserting a quantity of preselected binary bits to each subsequence until they are each of a bit length indicated by variable C; and
creating a final bit stream comprising the encrypted bit stream by combining the sub sequences; and
transmitting the final bit stream to a second device of the network over a communication path, the second device having access to the frequency of the first clock.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.
-
Citations
4 Claims
-
1. A method for enhancing security of a local computer on a network, comprising the steps of:
-
receiving a message having multiple characters and originating from a first computer on the network; transforming the message into an encrypted bit stream using a predetermined variable A, a predetermined variable B, and a predetermined variable C, wherein variable A and variable B are different from each other and are both less than variable C, and a lookup table having characters and corresponding decimal digits, and an A/B switch that automatically flips back-and-forth between a first and a second mode, the transforming including; converting the message into a stream of decimal digits by sequentially looking up the characters in the message within the look-up table and retrieving corresponding decimal digits for each character; creating an initial bit stream by converting the stream of decimal digits into binary; parsing the initial bit stream into subsequences that alternate between being of bit length specified by variable A, and of bit length specified by variable B, said alternating controlled by the A/B switch and a first clock and occurring according to a frequency of the first clock; inserting a quantity of preselected binary bits to each subsequence until they are each of a bit length indicated by variable C; and creating a final bit stream comprising the encrypted bit stream by combining the sub sequences; and transmitting the final bit stream to a second device of the network over a communication path, the second device having access to the frequency of the first clock. - View Dependent Claims (2)
-
-
3. A method of enhancing computer security by encoding at a first computer and decoding at a second computer, comprising the steps of:
-
receiving a message having multiple characters from the first computer; transforming the message into an encrypted bit stream using a first clock having a predetermined frequency, further using a predetermined variable A, a predetermined variable B, and a predetermined variable C, wherein variable A and variable B are different from each other and are both less than variable C, and an A/B switch that automatically flips back-and-forth between a first and a second mode, the transforming including; converting the message into a stream of decimal digits by sequentially looking up the characters in the message within the look-up table and retrieving corresponding decimal digits for each character; creating an initial bit stream by converting the stream of decimal digits into binary; parsing the initial bit stream into subsequences that alternate between being of bit length specified by variable A, and of bit length specified by variable B, said alternating controlled by the A/B switch and the first clock and occurring according to the first clock frequency; padding the subsequences by inserting a quantity of preselected binary bits to the subsequences until they are each of bit length indicated by variable C; and creating a final bit stream comprising the encrypted bit stream by combining the subsequences; transmitting the final bit stream to the second computer; receiving the final bit stream at the second computer as a received bit stream and authenticating and controlling access to the second computer by; dividing the received bit stream into words of bit length determined by variable C, removing the padding from the words by removing the quantity of preselected binary bits by alternatively removing added binary bits from a word until the word is of bit length determined by variable A, and then removing binary bits from a next word until said next word is a bit length determined by variable B, said alternating occurring under the control of a second clock operating at the predetermined frequency of the first clock, combining the words with removed padding into an interim bit stream, dividing the interim bit stream into a stream of bytes, converting the stream of bytes into a stream of decimal digits, and converting the stream of decimal digits into an output message using the look-up table. - View Dependent Claims (4)
-
Specification