EXECUTABLE CODED CIPHER KEYS
First Claim
1. Two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) or both transmit and decrypt transmission(s) received from said devices comprising;
- at least one executable coded cipher key(s), andat least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), andat least one executable coded decryption key (ECDK) device that decrypts transmission(s) that also uses said at least one executable coded cipher key(s),at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus such that said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and computer memory,and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s),such that transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted,and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter such that encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one executable coded cipher key(s), at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and that also uses at least one executable coded cipher key(s), such that transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted. When encryption/decryption is completed, the transmission(s) is sent to at least one transmitter such that encryption/decryption of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve encryption/decryption completion.
0 Citations
72 Claims
-
1. Two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) or both transmit and decrypt transmission(s) received from said devices comprising;
-
at least one executable coded cipher key(s), and at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) that also uses said at least one executable coded cipher key(s), at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus such that said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and computer memory, and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s), such that transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted, and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter such that encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion. - View Dependent Claims (2, 3, 4, 5, 6, 8, 10, 11, 12, 14, 15, 16, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
7. (canceled)
-
9. (canceled)
-
13. (canceled)
-
17. (canceled)
-
32. (canceled)
-
33. (canceled)
-
34. (canceled)
-
35. A system with two or more devices that encrypt transmission(s) transmitted to or decrypt transmission(s) or both transmissions(s) transmitted to and received from said system comprising;
-
at least one executable coded encryption key(s), and at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses at least one executable coded cipher key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) that also uses at least one executable coded encryption key(s), at least one computer processing unit (CPU) with computational capabilities that is connected to and controls a computer memory via an address bus and a data bus such that said address bus accesses a designated range of computer memories and range of memory bits and said data bus provides a flow of transmission(s) into and out of said CPU and computer memory, and wherein said computer memory contains encrypter/decrypter memory that possesses at least one encryption space location and at least one decryption space location for said executable coded cipher key(s), such that transmission(s) is sent to said encrypter/decrypter memory that stores said transmission(s) while said transmission(s) is encrypted and/or decrypted, and wherein, when encryption/decryption is completed said transmission(s) is sent to at least one transmitter such that encryption/decryption of said transmission(s) is controlled and manipulated by said executable coded cipher key(s), wherein said executable coded cipher key(s) remain in said computer memory in order to achieve encryption/decryption completion. - View Dependent Claims (72)
-
-
36. (canceled)
-
37. (canceled)
-
38. (canceled)
-
39. (canceled)
-
40. (canceled)
-
41. (canceled)
-
42. (canceled)
-
43. (canceled)
-
44. (canceled)
-
45. (canceled)
-
46. (canceled)
-
47. (canceled)
-
48. (canceled)
-
49. (canceled)
-
50. (canceled)
-
51. (canceled)
-
52. (canceled)
-
53. (canceled)
-
54. (canceled)
-
55. (canceled)
-
56. (canceled)
-
57. (canceled)
-
58. (canceled)
-
59. (canceled)
-
60. (canceled)
-
61. (canceled)
-
62. (canceled)
-
63. (canceled)
-
64. (canceled)
-
65. (canceled)
-
66. (canceled)
-
67. (canceled)
-
68. (canceled)
-
69. (canceled)
-
70. (canceled)
-
71. (canceled)
Specification