Method of and system for encryption and authentication

a technology of electronic encryption and authentication, applied in the field of telecommunications, can solve the problems of introducing and providing an exponential increase in complexity and security of systemic authorization processes

Inactive Publication Date: 2015-05-14
DAVIES SR TRAVERSE A +1
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention introduces a method and system for electronic encryption, authentication, and security over networked systems. It is designed to increase complexity and security for systemic authorization processes, minimizing hacking and human error. The technology makes it challenging to intercept the entire set of transmitted encrypted values, resulting in a higher level of protection for the encryption process. Overall, the invention offers a more secure and effective means of secure communication over networked systems.

Problems solved by technology

This technology introduces and provides an exponential increase in complexity and security for systemic authorization processes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of and system for encryption and authentication
  • Method of and system for encryption and authentication
  • Method of and system for encryption and authentication

Examples

Experimental program
Comparison scheme
Effect test

example

Application to an Authorization Process in an Online Music Store Card

[0071]A User accesses an online music store to make a purchase. After selecting “checkout” in his online shopping cart, the User is prompted for a User name, password and card number (the User's music card was obtained via mail or at physical location. The User could also use credit or debit card for the transaction). The User then enters his User name, password and card number. The User name and password are encrypted using his card number as a seed value (further modified by the use of a time stamp), using, for example, public key based encryption such as PGP. The encrypted User name and password are joined into a single value, then split into byte-sized chunks. The algorithm used to do this is based on byte-generation via alternating bits, starting at each end of full value, the first bit being taken from the beginning of the string, the second bit is the last bit in the string, the third bit is the second in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based authentication and / or single stream based data transmission, the invention breaks apart information before if leaves the User's computer so that intercepting any single electronic message does not provide the hacker with sufficient information to gain access. The invention splits the values (i.e. password, User name, card number for authorization; encrypted text for encryption, etc.) at the point of sender / external authorization client. These split values are encrypted with different keys and transmitted to multiple external authorization servers. The invention can be applied to any secure transmission, storage or authentication of data over a data network.

Description

FIELD OF INVENTION[0001]The present invention relates generally to telecommunications, and more specifically, to a method of and system for electronic encryption, authentication and security over networked systems.BACKGROUND OF THE INVENTION[0002]Computer and telecommunications systems are almost pervasive in the industrialized world today. Many of these systems provide access to personal and / or commercial data, services and resources that must be kept secure, limiting access to those individuals and devices with proper authorization. This is a major challenge. Unauthorized access is known to occur on a regular basis to some of the most heavily guarded computer systems and local networks on the planet, including for example, servers in the Pentagon.[0003]Almost all existing authorization processes employ a model wherein Users communicate their access information in the form of single electronic messages to single servers. An exemplary block diagram of such a system is shown in FIG. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/02H04L63/08H04L63/18H04L9/3226H04L2209/56H04L2209/80H04L9/3215
Inventor DAVIES, SR., TRAVERSE A.MACLEOD, JORDAN BRUCE
Owner DAVIES SR TRAVERSE A
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products