×

Secure network method and apparatus

  • US 5,369,707 A
  • Filed: 01/27/1993
  • Issued: 11/29/1994
  • Est. Priority Date: 01/27/1993
  • Status: Expired due to Term
First Claim
Patent Images

1. A system for the secure routing of encrypted data within a communications network, comprising:

  • A) first digital logic means and second digital logic means, the first digital logic means being electronically linked for communication with the second digital logic means;

    B) the first digital logic means comprising;

    1) a first system memory for storing data;

    2) a first access control subsystem, comprising logic for limiting system access to authorized users, the first access control subsystem being electronically connected to the first system memory for accessing data stored in the first system memory;

    3) an encryption algorithm module, comprising logic for converting plain text messages into encrypted text messages, the encryption algorithm module being electronically connected to the first system memory for accessing data stored in the first system memory and the encryption algorithm module being further electronically connected to the first access control subsystem to accept inputs from the first access control subsystem;

    4) a message header labelling subsystem, comprising logic for limiting system access, subject to label conditions, the message header labelling subsystem being electronically connected to the first system memory for accessing data stored in the first system memory and the message header labelling subsystem being further electronically connected to the encryption algorithm module to accept inputs from the encryption algorithm module; and

    5) message transmission means for transmitting data to the second digit logic means;

    C) the second digital logic means comprising;

    1) a second system memory for storing data;

    2) a second access control subsystem, comprising logic for limiting system access to authorized users, the second access control subsystem being electronically connected to the second system memory for accessing data stored in the second system memory;

    3) a decryption algorithm module, comprising logic for converting encrypted text messages into plain text messages, the decryption algorithm module being electronically connected to the second system memory for accessing data stored in the second system memory and the decryption algorithm module being further electronically connected to the second access control subsystem to accept inputs from the second access control subsystem;

    4) a message header identification subsystem, comprising logic for limiting system access, subject to label conditions, the message header identification subsystem being electronically connected to the second system memory for accessing data stored in the second system memory and the message header identification subsystem being further electronically connected to the decryption algorithm module to accept inputs from the decryption algorithm module; and

    5) receiver means for receiving data transmitted by the first digital logic means;

    D) the encryption algorithm module working in conjunction with the message header labelling subsystem to create an outgoing message transmitted from the transmission means of the first digital logic means to the receiver means of the second digital logic means;

    E) the message header identification subsystem limiting access to an incoming message prior to conversion of a received encrypted text message into a plain text message by the decryption algorithm module by providing a cryptographic key to the encryption algorithm module;

    F) the first access control subsystem and the second access control subsystem being adapted to manipulate passphrase information entered by users to generate a passkey;

    G) the first access control subsystem further comprising a check key which is compared to the passkey;

    H) the passkey being an input to the encryption algorithm module which allows editions of cryptographic information stored within the first system memory to be inputs to the encryption algorithm module only if the passkey exactly matches the check key;

    I) the second access control subsystem further comprising a check key which is compared to the passkey;

    J) the passkey being an input to the decryption algorithm module which allows editions of cryptographic information stored within the second system memory to be inputs to the decryption algorithm module only if the passkey exactly matches the check key;

    K) the passkey inputs to the encryption algorithm module allowing the encryption algorithm module to convert a plain text message to an encrypted text message;

    L) the passkey inputs to the decryption algorithm module allowing the decryption algorithm module to convert an encrypted text message to a plain text message;

    M) the first digital logic means being adapted to exclusive OR all possible pairings of the editions of cryptographic information and an organizational account number to generate scrambled editions of cryptographic information;

    N) the first digital logic means being further adapted to exclusive OR the scrambled editions of cryptographic information with label conditions to generate scrambled label conditions; and

    O) the first digital logic means being further adapted to manipulate the scrambled label conditions and the editions of cryptographic data to generate an encryption key for allowing the encryption algorithm module to convert a plain text message to an encrypted text message.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×