Unlock instant, AI-driven research and patent intelligence for your innovation.

Collaborative agent encryption and decryption

An intelligent agent, encryption function technology, applied in electronic digital data processing, key distribution

Active Publication Date: 2012-05-23
IBM CORP
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, two weaknesses of the traditional "encrypt data, send data, receive and decrypt data" paradigm are that (1) the data is sent as a whole, and (2) typically only one encryption / decryption key is used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative agent encryption and decryption
  • Collaborative agent encryption and decryption
  • Collaborative agent encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The preferred embodiment of the present invention utilizes inter-agent cooperative encryption and decryption, requiring all fragments to reach their destination before they can be decrypted and reconstructed into their original full data form, providing data security by means of multiple encrypted fragments transmitted via different routes send. This provides additional protection in the event data is sent over an insecure or untrusted channel, and allows multiple encryption keys to be randomly generated and not passed on to any other party.

[0022] The present invention utilizes multiple keys and cooperating agents to decompose source data into individual fragments, each fragment being encrypted by the same or different algorithm using a different key. Eavesdropping and cracking of any fragment still does not provide the attacker with access to the entire data. This provides additional protection in case data is sent over insecure or untrusted channels. Advantageous...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for securely transmitting data from a sender computer system to a receiver computer system comprises receiving a cleartext message by a first intelligent agent environment; splitting said message into a plurality of message fragments; creating an intelligent agent for each message fragment; generating a key for each message fragment; encrypting each said message fragment to produce a respective encrypted message fragment; and transmitting each intelligent agent with said respective encrypted message fragment as a data payload. The method may further comprise receiving each intelligent agent with its respective encrypted message fragment as a data payload by a second intelligent agent environment at the receiver computer system; locating each of a set of agents; decrypting each encrypted respective message fragment to produce a respective cleartext message fragment; and collaborating by the set of agents to recombine cleartext message fragments to form a cleartext message.

Description

technical field [0001] The present invention relates to securely communicating data, and more particularly to improved protection against breaches of security even when data is sent over a channel that has been tapped. Background technique [0002] The protection of data during transmission has been a concern throughout human history, and secure communication has been an essential part of commerce since ancient times. [0003] More recently, especially since computing power and technical means for data transmission have become generally available, sophisticated means of securing data transmitted over telecommunication channels and equally sophisticated technical means of decrypting messages have become increasingly common among those wishing to protect messages and those wishing to "crack" A rapidly accelerating race gradually unfolded among the people of the news. [0004] There is a constant search for new technical means of protecting data during transmission by raising ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L29/06
CPCH04L63/061G06F2221/2107H04L63/0428H04L63/06G06F21/62H04L9/08
Inventor N·R·贝利M·A·贝伊农P·斯特雷顿
Owner IBM CORP