Search International and National Patent Collections
Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (WO2007011679) SYSTEMS AND METHODS OF AMBIGUITY ENVELOPE ENCRYPTION SCHEME AND APPLICATIONS
Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

CLAIMS

What is claimed is:

1. In a system of encryption for communication security that uses an encryption algorithm and a pre-placed encryption key, the system comprising:
a security function that generates a sequence of random-variant-keys one at a time in temporary memory of an encryption device from the pre-placed key at the time of encryption and uses these random-variants-keys for encryption instead of the pre-placed key and immediately thereafter discards the random-variant-keys.

2. The system as in claim 1 , the security function comprising:
a. an ambiguity envelope function that creates an envelope, from which y-axis offsets can be derived from x-axis values;
b. a jitter function that using the y-axis offsets creates random-variant-keys.

3. The claim as in 2, the ambiguity envelope function comprising:
a. a randomly derived set of numbers using a bounded random number generator;
b. the random numbers in the set are randomly paired and assigned to different wave types and their properties such as, cycle times and amplitudes.

4. The claim as in 3, the ambiguity envelope function comprising:
a. additively combining a set of waves from a group of type of, triangle, sinusoid, and square, conceived from the randomly derived set of numbers;
b. an envelope resulting from such combination of wave types, with an x-axis that corresponds to time or packet sequence number and y-axis that corresponds to an envelope offset, where the envelope offset is used in the jitter function to create random-variant-keys.

5. The claim as in 2, the jitter function comprising:
a. transforming the y-axis offset of the envelope into a series of numbers;
b. the series of numbers are used to alter the pre-placed key to arrive at a random-variant-key, where each y-axis offset yields a new random-variant-key.

6. The claim as in 5, the jitter function comprising:
one of a technique of (i) the pre-placed key is altered by performing an operation such as bit reversal corresponding to the series of numbers, (ii) the pre-placed key is altered by adding or subtracting the offset from the pre-placed key.

7. The claim as in 5, the jitter function comprising:
creating a random-variant-key1 using a technique of where the pre-placed key is altered by performing an operation such as bit reversal corresponding to the series of numbers, creating a random-variant-key2 using a technique where the pre-placed key is altered by adding or subtracting the offset from the pre-placed key, and then using these keys in two different layers of encryption.

8. A system of security in a nationwide wireless network using wireless access points (WAP) to a global network, the system comprising:
a. a call screening function that receives cellular calls with caller id and geographic cell data and screens permitted calls based on a pre-stored list of caller id; b. a call mapping function that maps the call to a WAP in the area identified by the geographic location of the cell;
c. a call routing function that routes the call to a telephone number assigned to a WAP in the geographic location of the cell and the WAP is adapted with a telephone interface.

9. The system of security as in claim 8, comprising:
a. the WAP adapted with, a random number function that generates a set of bounded random numbers, and assigns a port number and delivers to the caller;
b. a computer with an adapted wireless network interface card adapted to being input the set of bounded random numbers via a display screen, wherein the WAP and the wireless card use the set of bounded numbers to create random-variant-keys to encrypt the communication between the wireless card and the WAP.

10. A system of security in a nationwide wireless network using wireless access points (WAP), the WAP comprising:
a wireless router adapted with a (i) telephone interface with the ability to receive telephone calls, generate a set of bounded random numbers and deliver to a caller.

11. The system of security as in claim 10, the router adaptation further comprising: a. a function that converts the set of bounded random numbers to an envelope, with x-axis identifying packet numbers and y-axis identifying envelope amplitude as an offset; and
b. a function using the envelope offset as a parameter to generate random-variant-keys and uses the random-variant-keys as the encryption key in place of the pre-placed key for encryption from and to the WAP.

12. The system as in claim 10, further comprising:
a function that (i) assigns a port number and delivers as part of the set of bounded random numbers, (ii) create a record with the caller id used as a reference for the set of numbers, (iii) delete the record at the end of the communication session or a twenty four hour period which ever occurs first.

13. A system of security in a nationwide wireless network using wireless access points (WAP) for communication to wireless computing devices, a wireless interface card of the computer device, comprising:
the wireless interface card adapted with (i) a function to input a series of random numbers and a port number of a WAP, (ii) a function that converts the numbers to an envelope, with x-axis packet number and y-axes identifying envelope amplitude as an offset, and (iii) a function that using the offset as a parameter generates random-variant-keys and uses the random-variant-keys for encryption in place of the pre-placed key for communication to and from the wireless interface card.

14. A system of security against eavesdrop between two handheld wireless devices such as cell phone communication, the device/cell phone, comprising:
a. a cell phone A and a cell phone B, each adapted with a function that generates a set of bounded random numbers;
b. a sharing mechanism to share that set of bounded random numbers with cell phone A to B and from B to A, each phone stores the set with reference to the caller id of each of cell phones;

c. cell phone A and B each equipped with an ambiguity envelope function that converts each of the set of bounded random numbers at each end into an ambiguity envelope, with an x-axis and a y-axis;
d. cell phone A and B each equipped with a jitter function that using the offset from the envelope creates a packet number dependent sequence of random-variant-keys from the pre-placed key and uses such keys for encryption.

15. The system of security as in claim 14, comprising:
on communication from cell phone A to cell phone B, cell phone A encrypts the communication using random-variant-keys, cell phone B finds the set of bounded random numbers corresponding to the caller id of cell phone A and decrypts the communication by using the same random-variant-keys, and on communication from cell phone B to cell phone A, cell phone B encrypts the communication using random-variant-keys, cell phone A finds the set of bounded random numbers corresponding to the cell phone B and decrypts the communication by using the same random-variant-keys.

16. The system of security as in claim 14, comprising: the sharing mechanism may include manual, optical, and radio frequency.

17. The system of security as in claim 14, comprising: a function in each phone that can selectively enable and disable the security for each communication by setting a flag that is under the control of the user.

18. The system of security as in claim 14, comprising: the wireless device may be blue-tooth equipped device, where the communication is between the cell phone and a blue tooth extension of the device and a wireless device that communicates with a base station.

19. An integrated circuit chip that embeds a security function that comprises:
a. an interface for inputting a series of bounded random numbers;
b. a logic that converts the numbers to an envelope, with x-axis
corresponding to a packet number and y-axis corresponding to an envelope amplitude offset for a packet number.

20. The claim as in 19, the integrated circuit chip further comprising:
a logic that uses the envelope offset for a packet number and a static encryption key as inputs and generates random-variant-keys, enabling the use of the random-variant-keys for encryption and decryption of data packets in place of the static key.