The present invention relates to systems and methods to leverage blockchain based data tokenization to randomly tokenize data elements within a data set represented in a randomized 3-dimensional form.
Data security is of utmost importance to individuals, organizations and governments operating in a Web3 or other digital environment. To date, most digital security is based on maintaining security policies, privacy of usernames, and passwords. Should hackers breach username and password security measures, those hackers gain access to potentially all of the data files associated with that username account. Another approach, as set forth within the following disclosure, is to not only protect user identity and access, but also to provide for data security of the data sets by securing encrypted data files through randomized shapes of the data and tokenizing data elements such that any breach of the account does not result in capture of useful digital files.
The present invention provides systems and methods to leverage blockchain-based data tokenization to randomly tokenize encrypted and nonencrypted data elements within a data set which is then structured into a randomized 3-dimensional form. The tokens are distributed and reordered into the correct position using a key pair match and Verifiable Self Sovereign Identification (VSSI). Both the key pair and VSSI credential must be presented in order to distribute the tokenized data elements into the correct position within the data set. As an added layer of security, the key pair and VSSI control the positioning of all the data elements by defining the position of a random centroid in an x, y, z tetrahedral 3-dimensional shape. That defined centroid's position allows all the data elements to assume the proper position for the data to be reordered for decrypting and use in the application.
A contextual practical use of this method is intended for the highest levels of classification and security requiring high levels of encryption and security as it is mathematically taxing on current computing solutions. This method serves as a mitigating solution to potential quantum computing hacks of data. Additionally, quantum computing will enable widespread applications to use this process.
Other objects and advantages of the present invention will become apparent from the following description taken in connection with the accompanying drawings, wherein is set forth by way of illustration and example, embodiments of this invention.
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
The invention will further be described, by way of example, with reference to the accompanying drawings:
Referring to
The two layers of security ensure that if the data encryption is compromised, the data still cannot be reordered to reveal the intended encrypted data set in the correct order without the proper VSSI match. Thus, the hacker will only see random streams of 1s and 0s with no prescribed order revealing the digital asset or intended use of the data, whether that data is a coded message or a digital asset/part.
Turning now to
In one non-limiting aspect of the present invention, method 100 begins at step 110 with tokenizing three or more random data elements within the data set. At step 112, the tokenized data elements are reordered from a correct position within the data set to a random position within the data set. The reordered tokenized data elements are then represented in a random 3-dimensional (3D) form at step 114, followed by determining centroid coordinates of the 3D form within 3D space at step 116. Step 118 then links the reordered tokenized data elements and centroid coordinates with a unique token identification (ID) code assigned to the data set. A unique owner ID code is then linked with the unique token ID code to create a key pair. The unique owner ID code may be authenticated by Verifiable Self Sovereign Identification (VSSI) and the random 3D form is a tetrahedral 3D shape having a centroid defined by x, y, and z coordinate space.
In a further aspect of the present invention, method 100 may include the further steps of receiving a transfer request from a second party, wherein the second party has a second unique owner ID code (step 120); authenticating the second unique owner ID code with Verifiable Self Sovereign Identification (VSSI) (step 122); transferring the key pair including all of the encrypted and/or non-encrypted data set including the reordered tokenized data elements and centroid coordinates to the second party (step 124); and matching the key pair to the authenticated second unique owner ID code (step 126), wherein the reordered tokens are distributed and returned to the correct position to reform the data set only if there is a confirmed key pair match with VSSI credentials for the second party (step 128).
Although the invention has been described with reference to preferred embodiments thereof, it is understood that various modifications may be made thereto without departing from the full spirit and scope of the invention as defined by the claims which follow.
The present application claims the benefit of priority to U.S. Provisional Patent No. 63/175,840, filed on Apr. 16, 2021 and entitled Data Encryption Using Randomized 3-Axis Tokenized Data Placement Encryption Reordered With Verifiable Self Sovereign Identification And Key Pairs, the entirety of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4209781 | Puri | Jun 1980 | A |
11422805 | Kelly | Aug 2022 | B1 |
20140245129 | Sapul | Aug 2014 | A1 |
20150294581 | Kullok | Oct 2015 | A1 |
20180012329 | Dunham | Jan 2018 | A1 |
20190087813 | Wilson | Mar 2019 | A1 |
20210180126 | Kapanidis | Jun 2021 | A1 |
20220337415 | Regenor | Oct 2022 | A1 |
Number | Date | Country | |
---|---|---|---|
20220337415 A1 | Oct 2022 | US |
Number | Date | Country | |
---|---|---|---|
63175840 | Apr 2021 | US |