Claims
- 1. A data encryption method comprising:inputting a key code into a first processor, said first processor determining a first computed address and a control data length based upon said key code; retrieving a plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on a first memory system; determining a second address and an encryption data length based upon said control data; retrieving a plurality of encryption data bytes stored at said second address in said first memory system; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of data into said first processor; and utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of data to output a quantity of encrypted data.
- 2. A data encryption method as recited in claim 1, further comprising:inputting said key code into said first processor, said first processor determining said first computed address and said control data length based upon said key code; retrieving said plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on a first memory system; determining said second address and said encryption data length based upon said control data; retrieving said plurality of encryption data bytes stored at said second address in said first memory system; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of encrypted data into said first processor; and utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of encrypted data to output a quantity of decrypted data.
- 3. A data encryption method as recited in claim 2, wherein said first memory system includes a first electronically readable media accessible by said first processor, said first processor having said plurality of encryption/decryption algorithms stored within said first processor on a second electronically readable media.
- 4. A data encryption method as recited in claim 2, wherein said processor includes at least one of a first controller, a second controller, a first encryptor/decryptor and a second encryptor/decryptor.
- 5. A data encryption method as recited in claim 4, wherein said first controller is coupled to at least one of said second controller, said first encryptor/decryptor and said second encryptor/decryptor via an electronic network.
- 6. A data encryption method as recited in claim 5, further comprising:inputting a key code into said second controller, said second controller determining a first computed address and a control data length based upon said key code; retrieving a plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on a first memory system; determining a second address and an encryption data length based upon said control data; retrieving a plurality of encryption data bytes stored at said second address in said first memory system; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of data into said second controller; utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of data to output a quantity of encrypted data; and transmitting said encrypted data to said first controller, wherein said transmitting of encrypted data to said first controller is performed simultaneously with the output of encrypted data from said first controller.
- 7. A data encryption method as recited in claim 6, wherein said computer network supports at least one of Ethernet, Internet (IP) protocol, WAN protocol and LAN protocol.
- 8. A data encryption method as recited in claim 6, wherein said computer network includes at least one of cable, microwave, wireless, LASER and infra red (IR) connections.
- 9. A method to encrypt and decrypt video as recited in claim 8, wherein said reduced array includes a racetrack array.
- 10. A data encryption method as recited in claim 4, wherein said first controller is coupled to at least one of said second controller, said first encryptoridecryptor and said second encryptor/decryptor via a computer network.
- 11. A data encryption method as recited in claim 4, wherein said first controller is coupled to at least one of said second controller, said first encryptor/decryptor and said second encryptor/decryptor via a wireless telephone network.
- 12. A data encryption method as recited in claim 2, wherein said first memory system includes at least one of a CDROM, DVD, hard disk, magneto-optical storage media, optical storage media, magnetic media, website and a computer memory storage location on a remote computer.
- 13. A data encryption method as recited in claim 1, wherein said array of random data is a reduced array.
- 14. A data encryption method as recited in claim 13, wherein said reduced array is a racetrack array.
- 15. A data encryption method as recited in claim 13, wherein said first processor outputs said reduced array via an electronic network.
- 16. A data encryption method as recited in claim 1, wherein said key code includes at least one of a public key and a private key.
- 17. A data encryption method as recited in claim 1, wherein said data includes at least one of analog video, analog audio, digital video, digital audio, analog data and digital information.
- 18. A method to encrypt and decrypt video comprising:inputting a key code into a first processor, said first processor determining a first computed address and a control data length based upon said key code; retrieving a reduced array from an array of random data; retrieving a plurality of control data bytes stored at said first computed address in the reduced array; determining a second address and an encryption data length based upon said control data; retrieving a plurality of encryption data bytes stored at said second address in said reduced array; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of video data into said first processor; utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of data to output a quantity of encrypted video data; transmitting said reduced array, said control data bytes and said encrypted video data to a second processor; determining said second address and said encryption data length based upon said control data; retrieving said plurality of encryption data bytes stored at said second address in said reduced array; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of encrypted video data into said second processor; and utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of encrypted video data to output a quantity of decrypted video data.
- 19. A data encryption method comprising:inputting a key code into a first processor, said first processor determining a first computed address and a control data length based upon said key code; retrieving a plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on a first electronically readable media, wherein said first electronically readable media includes at least one of a CDROM, DVD, hard disk, magneto-optical storage media, optical storage media, magnetic media; determining a second address and an encryption data length based upon said control data; retrieving a plurality of encryption data bytes stored at said second address in said random array of data; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of data into said first processor; utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of data to output a quantity of encrypted data, said encrypted data transmitted via a computer network to a second processor; inputting said key code into said second processor, said second processor determining said first computed address and said control data length based upon said key code; retrieving said plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on a second electronically readable media, wherein said second electronically readable media includes at least one of a CDROM, DVD, hard disk, magneto-optical storage media, optical storage media, magnetic media; determining said second address and said encryption data length based upon said control data; retrieving said plurality of decryption data bytes stored at said second address in said array of random data; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; inputting a quantity of encrypted data into said first processor; and utilizing said decryption data and said identified encryption/decryption algorithm and said quantity of encrypted data to output a quantity of decrypted data.
- 20. A data encryption method comprising:inputting a key code into a first processor, said first processor determining a first computed address and a control data length based upon said key code; retrieving a plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on an electronically readable media, wherein said electronically readable media includes at least one of a website and a computer memory storage location on a remote computer, wherein said electronically readable media is coupled to said first processor via a computer network; determining a second address and an encryption data length based upon said control data; retrieving a plurality of encryption data bytes stored at said second address in said array of random data; identifying at least one of a plurality of encryption/decryption algorithms based upon the control data; retrieving said identified encryption/decryption algorithm from said electronically readable media; inputting a quantity of data into said first processor; utilizing said encryption data and said identified encryption/decryption algorithm and said quantity of data to output a quantity of encrypted data, said encrypted data transmitted via a computer network to a second processor; inputting said key code into said second processor, said second processor determining said first computed address and said control data length based upon said key code; retrieving said plurality of control data bytes stored at said first computed address in an array of random data, said array of random data stored on said electronically readable media; determining said second address and said encryption data length based upon said control data; retrieving said plurality of decryption data bytes stored at said second address in said array of random data; identifying at least one encryption/decryption algorithm based upon the control data; retrieving said identified encryption/decryption algorithm from said electronically eadable media; inputting a quantity of encrypted data into said second processor; and utilizing said decryption data and said identified encryption/decryption algorithm and said quantity of encrypted data to output a quantity of decrypted data.
CROSS REFERENCE TO RELATED APPLICATIONS
The present application is a continuation in part of prior application Ser. No. 09/359,857 filed Jul. 23, 1999 now U.S. Pat. No. 6,094,486 which represents the National Phase filing of International Application No. PCT/US98/12578 filed Jun. 15, 1998, which application claims priority of U.S. Provisional Application No. 60/050,176 filed Jun. 19, 1997, under 35 U.S.C. §119(e), the subject matter disclosed therein being incorporated herein by reference in its entirety.
US Referenced Citations (14)
Foreign Referenced Citations (2)
Number |
Date |
Country |
0797329 A1 |
Sep 1997 |
EP |
PCTUS9812578 |
Jun 1998 |
WO |
Provisional Applications (1)
|
Number |
Date |
Country |
|
60/050176 |
Jun 1997 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
09/359857 |
Jul 1999 |
US |
Child |
09/419337 |
|
US |
Parent |
PCT/US98/12578 |
Jun 1998 |
US |
Child |
09/359857 |
|
US |