US Patent Application 18445066. Encryption communication system, encryption communication apparatus, and encryption communication method simplified abstract
Encryption communication system, encryption communication apparatus, and encryption communication method
Organization Name
Inventor(s)
Kazuhisa Kaino of Tama Tokyo (JP)
Masakatsu Matsuo of Chiyoda Tokyo (JP)
Koki Ando of Chiyoda Tokyo (JP)
Manabu Kobayashi of Chiyoda Tokyo (JP)
Encryption communication system, encryption communication apparatus, and encryption communication method - A simplified explanation of the abstract
This abstract first appeared for US patent application 18445066 titled 'Encryption communication system, encryption communication apparatus, and encryption communication method
Simplified Explanation
The patent application describes an encryption communication system that configures a network with multiple nodes.
- The system shares an encryption key between a first node and a second node.
- The first node creates multiple paths to the second node over the network.
- The first node generates multiple pieces of data and distributes them across the paths.
- The first node transmits the data pieces to the second node.
- The encryption key is generated by combining the multiple pieces of data.
- The second node receives the data pieces from the first node via the paths.
- The second node generates the encryption key by combining the received data pieces.
Original Abstract Submitted
According to one embodiment, an encryption communication system configures a network with a plurality of nodes, and shares the encryption key between a first node that delivers the encryption key to a first user and a second node that delivers the encryption key to a second user. The first node forms n (n>1) systems of paths to the second node over the network, generates n pieces of first data, distributes the n pieces of first data to the n systems of paths and transmits the n pieces of first data to the second node, and generates the encryption key by superimposing the n pieces of first data. The second node receives the n pieces of first data from the first node via the n systems of paths, and generates the encryption key by superimposing the n pieces of first data.