Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data Transmission Security Improvements

a data transmission and security improvement technology, applied in the field of secure data transmission, can solve the problem that the eavesdropper cannot accurately distinguish between extraneous information and communication information, and achieve the effects of convenient, effective and relatively simple, and relatively quick recovery at the receiving terminal

Inactive Publication Date: 2013-06-27
OMARCO NETWORK SOLUTIONS
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a method for safely transmitting large volumes of information while keeping it secure. The method allows for the communication information to be concealed within extraneous information and securely transferred within a data signal. This is done by using a simple and cost-effective method that does not require special hardware. The concealed communication can be quickly recovered at the receiving terminal. The method is particularly effective against intercept-resend type attacks such as eavesdropping. In some embodiments, the first terminal carries out a coordinate transform function to further reduce the processing requirements of the receiving terminal. The identification variable value is a unique identifier for each receiving terminal and helps in easily identifying and extracting the communication information from the received data signal. The identifier simplifies the process of identifying and extracting the communication information.

Problems solved by technology

Provided that this information is maintained confidential, an eavesdropper cannot accurately distinguish between extraneous information and communication information (i.e. the information that the sending terminal wishes to securely transmit to the receiving terminal).

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data Transmission Security Improvements
  • Data Transmission Security Improvements
  • Data Transmission Security Improvements

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]A more detailed description of specific embodiments of the present invention is set out below with reference to the above-described figures.

[0033]FIG. 1 is a schematic overview of a system 1 for transmitting a secure data signal comprising confidential communication information combined with extraneous information—the communication information is effectively concealed within the extraneous information. The data signal is transmitted from a sender to one or more recipient's in accordance with an embodiment of the present invention. The system 1 comprises a sender terminal 3 and one or more receiver terminals 5, 7, 9, 11. The sender terminal 3 (also referred to as terminal A in the ensuing description) may further comprise a signal generator 13, arranged to generate a carrier signal; a signal modulation module 15 for modulating a selected signal; and a data store 17. The data store 17 comprises a plurality of data 19 associated with communication information and extraneous infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This disclosure provides for a method of securely transmitting communication information from a first terminal operating in a first coordinate measurement domain to a second remotely-located terminal operating in a second coordinate measurement domain. The method includes combining the communication information with extraneous information to create a data signal, determining a value of an identification variable expressed with respect to the first coordinate measurement domain, where the identification variable value enables the location of the communication information concealed within the data signal to be determined, using a coordinate transform function to calculate a value of the received identification variable expressed with respect to the second coordinate measurement domain, and extracting the information from the received data signal using the calculated identification variable value to distinguish the communication information from the extraneous information.

Description

TECHNICAL FIELD[0001]The present invention relates to the field of secure data transmission and in particular to an improved steganographic method of securely transmitting data between remotely located parties.BACKGROUND OF THE INVENTION[0002]The ability to securely transfer data between remotely located terminals is a necessary requirement for many present day applications, in particular where the data being transferred is confidential, such as in electronic transactions of financial and / or other confidential data between remotely located terminals.[0003]Cryptography is one known way of securely transmitting information. Conventionally, a signal comprising the confidential information is encrypted at a sending device using an encryption key, which encrypts the information in accordance with a selected algorithm. The encrypted signal comprising the encrypted information is subsequently transmitted to a receiving device. To recover the encrypted information a decryption key is used a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/08
CPCH04L9/083H04L67/02H04L63/1441H04L63/0442H04L63/0428
Inventor OMAR, RALPH MAHMOUD
Owner OMARCO NETWORK SOLUTIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products