News Column

Researchers Submit Patent Application, "Apparatus, Systems, and Methods for Encryption Key Distribution", for Approval

July 22, 2014



By a News Reporter-Staff News Editor at Information Technology Newsweekly -- From Washington, D.C., VerticalNews journalists report that a patent application by the inventor Movassaghi, Safa (Mission Viejo, CA), filed on December 30, 2013, was made available online on July 10, 2014.

The patent's assignee is Cloud Star Corporation.

News editors obtained the following quote from the background information supplied by the inventors: "With the development of the computer as both a business tool and a personal communication device, the number of secure transactions and communications that are performed between disparate computing devices has grown substantially. In order to maintain security in such transactions and communications, many different forms of cryptography are utilized to encrypt transmitted data. One such method, the one-time pad, offers a guarantee of security due to the randomness of the key but suffers from the drawback that the method may only maintain security when the pads are transmitted securely to the intended recipient of the messages that are to be encrypted using the one-time pad as a cipher.

"Public-key cryptography resolves this by allowing users to set up a public and private key pair; the public key can be used to encrypt documents intended for the eyes of the holder of the private key. This mechanism works well for most scenarios and provides an acceptable level of security for most tasks, but includes generation and security of keys and certificates which is often outside the comfort zone of users.

"The inventor herein has recognized these difficulties with the current encryption methods and, as described in more detail below, the inventor herein proposes an apparatus, systems, and methods for providing a one-time pad for one-to-one communication sessions which is discarded after use. In one example, a server system may perform a method for distributing an encryption key. The method may include pairing a first computing system with a second computing system, receiving a first request for a random number sequence, determining that the first request originated from the first computing system, and, in response, generating a pseudo-random sequence of bytes. The method may further include receiving a second request for a random number sequence, determining that the second request originated from the second computing system, and, in response, generating the pseudo-random sequence of bytes. The disclosed apparatus, systems, and methods further provide an encryption key that may be generated to any level of randomness and key length without any key maintenance by the end users.

BRIEF DESCRIPTION OF THE FIGURES

"The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which the like references indicate similar elements and in which:

"FIG. 1 shows an exemplary schematic illustration of an encryption key distribution system according to an embodiment of the present disclosure.

"FIGS. 2A-2D shows an exemplary illustration of an encryption key distribution method according to an embodiment of the present disclosure.

"FIG. 3 provides an example flow chart of an encryption key generation and distribution method according to an embodiment of the present disclosure.

"FIG. 4 provides an example flow chart of an encryption key generation and distribution method according to an embodiment of the present disclosure.

"FIG. 5 provides an example flow chart of an encryption key distribution and usage method according to an embodiment of the present disclosure."

As a supplement to the background information on this patent application, VerticalNews correspondents also obtained the inventor's summary information for this patent application: "With the development of the computer as both a business tool and a personal communication device, the number of secure transactions and communications that are performed between disparate computing devices has grown substantially. In order to maintain security in such transactions and communications, many different forms of cryptography are utilized to encrypt transmitted data. One such method, the one-time pad, offers a guarantee of security due to the randomness of the key but suffers from the drawback that the method may only maintain security when the pads are transmitted securely to the intended recipient of the messages that are to be encrypted using the one-time pad as a cipher.

"Public-key cryptography resolves this by allowing users to set up a public and private key pair; the public key can be used to encrypt documents intended for the eyes of the holder of the private key. This mechanism works well for most scenarios and provides an acceptable level of security for most tasks, but includes generation and security of keys and certificates which is often outside the comfort zone of users.

"The inventor herein has recognized these difficulties with the current encryption methods and, as described in more detail below, the inventor herein proposes an apparatus, systems, and methods for providing a one-time pad for one-to-one communication sessions which is discarded after use. In one example, a server system may perform a method for distributing an encryption key. The method may include pairing a first computing system with a second computing system, receiving a first request for a random number sequence, determining that the first request originated from the first computing system, and, in response, generating a pseudo-random sequence of bytes. The method may further include receiving a second request for a random number sequence, determining that the second request originated from the second computing system, and, in response, generating the pseudo-random sequence of bytes. The disclosed apparatus, systems, and methods further provide an encryption key that may be generated to any level of randomness and key length without any key maintenance by the end users.

BRIEF DESCRIPTION OF THE FIGURES

"The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which the like references indicate similar elements and in which:

"FIG. 1 shows an exemplary schematic illustration of an encryption key distribution system according to an embodiment of the present disclosure.

"FIGS. 2A-2D shows an exemplary illustration of an encryption key distribution method according to an embodiment of the present disclosure.

"FIG. 3 provides an example flow chart of an encryption key generation and distribution method according to an embodiment of the present disclosure.

"FIG. 4 provides an example flow chart of an encryption key generation and distribution method according to an embodiment of the present disclosure.

"FIG. 5 provides an example flow chart of an encryption key distribution and usage method according to an embodiment of the present disclosure."

For additional information on this patent application, see: Movassaghi, Safa. Apparatus, Systems, and Methods for Encryption Key Distribution. Filed December 30, 2013 and posted July 10, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=4114&p=83&f=G&l=50&d=PG01&S1=20140703.PD.&OS=PD/20140703&RS=PD/20140703

Keywords for this news article include: Cloud Star Corporation, Information Technology, Information and Data Encoding and Encryption.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Information Technology Newsweekly


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters