US Patent Application 18445066. Encryption communication system, encryption communication apparatus, and encryption communication method simplified abstract

From WikiPatents
Jump to navigation Jump to search

Encryption communication system, encryption communication apparatus, and encryption communication method

Organization Name

KABUSHIKI KAISHA TOSHIBA

Inventor(s)

Kazuhisa Kaino of Tama Tokyo (JP)

Masakatsu Matsuo of Chiyoda Tokyo (JP)

Koki Ando of Chiyoda Tokyo (JP)

Manabu Kobayashi of Chiyoda Tokyo (JP)

Encryption communication system, encryption communication apparatus, and encryption communication method - A simplified explanation of the abstract

This abstract first appeared for US patent application 18445066 titled 'Encryption communication system, encryption communication apparatus, and encryption communication method

Simplified Explanation

The patent application describes an encryption communication system that configures a network with multiple nodes.

  • The system shares an encryption key between a first node and a second node.
  • The first node creates multiple paths to the second node over the network.
  • The first node generates multiple pieces of data and distributes them across the paths.
  • The first node transmits the data pieces to the second node.
  • The encryption key is generated by combining the multiple pieces of data.
  • The second node receives the data pieces from the first node via the paths.
  • The second node generates the encryption key by combining the received data pieces.


Original Abstract Submitted

According to one embodiment, an encryption communication system configures a network with a plurality of nodes, and shares the encryption key between a first node that delivers the encryption key to a first user and a second node that delivers the encryption key to a second user. The first node forms n (n>1) systems of paths to the second node over the network, generates n pieces of first data, distributes the n pieces of first data to the n systems of paths and transmits the n pieces of first data to the second node, and generates the encryption key by superimposing the n pieces of first data. The second node receives the n pieces of first data from the first node via the n systems of paths, and generates the encryption key by superimposing the n pieces of first data.