20240022396. SYSTEM AND METHOD FOR EVOLVING CRYPTOGRAPHY WITH A PRIVATE TIME BASE simplified abstract (WI-LAN RESEARCH INC.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR EVOLVING CRYPTOGRAPHY WITH A PRIVATE TIME BASE

Organization Name

WI-LAN RESEARCH INC.

Inventor(s)

Muddassar Farooq of Islamabad (PK)

Muhammad Rashad Ramzan of Islamabad (PK)

Kenneth Stanwood of Vista CA (US)

Uzma Maroof of Sydney (AU)

SYSTEM AND METHOD FOR EVOLVING CRYPTOGRAPHY WITH A PRIVATE TIME BASE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240022396 titled 'SYSTEM AND METHOD FOR EVOLVING CRYPTOGRAPHY WITH A PRIVATE TIME BASE

Simplified Explanation

The abstract describes an evolving encryptor system that allows users to generate a customized encryption block. The system includes an encryptor requirements agent, an encryptor algorithm engine, and an evolving encryptor processor.

  • The encryptor requirements agent receives encryption block design parameters from the user and generates a set of encryption block design requirements based on these parameters.
  • The encryptor algorithm engine provides different encryption module design templates based on the current set of requirements.
  • The evolving encryptor processor generates a set of encryption block templates based on the encryption module design templates. It assigns a cryptographic fitness measure to each template and determines if the current iteration count is below a threshold value.
  • If the conditions are met, the evolving encryptor processor conducts the next iteration by generating a new set of encryption block templates. This process continues until both conditions are met, and the next set of encryption block templates is saved into an encryption block template database as elite encryption block templates.

Potential applications of this technology:

  • Secure communication: The evolving encryptor system can be used to generate customized encryption blocks for secure communication channels, ensuring the confidentiality and integrity of transmitted data.
  • Data protection: The system can be applied to encrypt sensitive data stored in databases or on storage devices, providing an additional layer of security.
  • Network security: By generating customized encryption blocks, the system can enhance the security of network infrastructure and protect against unauthorized access or data breaches.

Problems solved by this technology:

  • Customization: The system allows users to define their own encryption block design parameters, enabling them to create encryption blocks tailored to their specific needs.
  • Evolutionary design: The evolving encryptor processor iteratively generates encryption block templates, continually improving their cryptographic fitness. This approach helps to create more secure encryption blocks over time.
  • Efficiency: The system automates the process of generating encryption block templates, saving time and effort compared to manual design methods.

Benefits of this technology:

  • Enhanced security: The customized encryption blocks generated by the system can provide stronger protection against unauthorized access and data breaches.
  • Adaptability: The evolving nature of the system allows it to continuously improve the encryption block templates, adapting to new threats and vulnerabilities.
  • Flexibility: Users have the freedom to define their own encryption block design parameters, allowing them to meet specific security requirements and preferences.


Original Abstract Submitted

an evolving encryptor system for generating a customized user-defined encryption block comprising an encryptor requirements agent that receives a plurality of encryption block design parameters and generates a current set of encryption block design requirements based thereon, an encryptor algorithm engine provides a plurality of different encryption module design templates based on the current set of requirements, and an evolving encryptor processor generates a current plurality of encryption block templates based on the plurality of different encryption module design templates, assigns a cryptographic fitness measure to each of the templates, and determines whether a current iteration count is below a threshold value and, if so, conducts a next iteration by generating a next plurality of encryption block templates until both determined conditions are met, in which case the next plurality of encryption block templates is saved into an encryption block template database as a plurality of elite encryption block templates.