×

Data encryption cipher using rotating ports

  • US 9,584,488 B2
  • Filed: 04/22/2015
  • Issued: 02/28/2017
  • Est. Priority Date: 08/09/2013
  • Status: Active Grant
First Claim
Patent Images

1. A machine for securely communicating data across a data network comprising:

  • at least one sending computer connected to a network;

    at least one receiving computer connected to the network;

    the network providing at least one communication path for communicating information over the network from the sending computer to the receiving computer;

    the at least one sending computer being configured to send at least one message across the network to the receiving computer, the message including port and/or connection negotiation information;

    the at least one sending computer system being configured to generate a random, non-repeating One Time Pad (OTP) for use in encrypting the at least one message for sending across the network to the receiving computer;

    the at least one sending computer being configured to create multiple logical and/or physical ports for the message and/or data stream to traverse the network to provide multiple connections on different communications channels across the network path(s) between the sending computer and the receiving computer;

    the at least one sending computer and the receiving computer being configured to communicate over the network via a first communication channel on a first port, a second communication channel on a second port and a third communication channel on a third port;

    the at least one sending computer being configured to conceal a message with a first calculation using a first One Time Pad to produce a first encrypted stream, the sending computer sending the first encrypted stream to the receiving computer over the first communication channel;

    the at least one sending computer being configured to use a second calculation based on the first One Time Pad and a second One Time Pad to produce a second encrypted stream, the sending computer sending the second encrypted stream to the receiving computer over the second communication channel;

    the at least one sending computer being configured to encrypt the second One Time Pad to produce cipher text and sending the cipher text to the receiving computer over the third communication channel;

    the receiving computer being configured to (a) receive and decrypting the cipher text to recover the second One Time Pad, (b) receive the second encrypted stream, (c) use the recovered second One Time Pad and the received second encrypted stream to recover the first One Time Pad, (d) receive the first encrypted stream, and (e) use the recovered first One Time Pad on the received first encrypted stream to recover the message;

    the receiving computer being configured to use the recovered message specifying port and/or connection negotiation information to establish at least one further secure connection between the sending and receiving computers to conceal a data port for further secret messaging,wherein the recovered message is configured to cause the receiving computer to participate in establishing the at least one further secure connection by structuring a data/port channel, N OTP channels, and a control channel between the sending and receiving computers, the sending and receiving computers remapping said further connection into at least one standard or well known socket port.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×