Secured embedded data encryption systems

Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets usi...

Full description

Saved in:
Bibliographic Details
Main Authors Livolsi Jonathan P, Livolsi Robert R
Format Patent
LanguageEnglish
Published 06.09.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Devices generate security vectors based on their own attributes. A device's security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting device's transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting device's MAC. The receiving device can permit or prevent further processing of the packet's data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby "evolving" the transformation matrices.
Bibliography:Application Number: US201414506320