OA19283A - Applications in connection with secure encryption. - Google Patents

Applications in connection with secure encryption. Download PDF

Info

Publication number
OA19283A
OA19283A OA1201800538 OA19283A OA 19283 A OA19283 A OA 19283A OA 1201800538 OA1201800538 OA 1201800538 OA 19283 A OA19283 A OA 19283A
Authority
OA
OAPI
Prior art keywords
encryption
stream
box device
clipboard
encrypted
Prior art date
Application number
OA1201800538
Inventor
Pak Kay YUEU
Original Assignee
Permanent Privacy Ltd.
Filing date
Publication date
Application filed by Permanent Privacy Ltd. filed Critical Permanent Privacy Ltd.
Publication of OA19283A publication Critical patent/OA19283A/en

Links

Abstract

An encryption box device has a memory and a processor coupled to the memory. A first clipboard runs on the processor and downloads a plaintext stream. An encryption engine runs on the processor and receives the plaintext stream and encrypts the plaintext stream to produce an encrypted stream. A digitizer runs on the processor and digitizes the encrypted stream to produce a digitized encrypted stream. A second clipboard runs on the processor and uploads the digitized encrypted stream. The encryption engine may also decrypt the encrypted stream to produce the plaintext stream and upload the plaintext stream to the first clipboard.

Description

A first embodiment of an encryption box device 100 is shown in Fig. 1. A first clipboard Module 122, a second Clipboard Module 140, and a Digitizer/De-digitizer 128 were added to the Encryption Engine to overcome the deficiency of the Encryption Engine and make it compatible and available for ail different memories, cloud platforms, operating Systems, and communicate amongst other products.
In orderto travel, or be compatible, among ail different memories, operating Systems etc, a spécial memory (hardware memory) structure of Clipboard is used. Clipboard (or Clipboard cache) is a spécial memory in ail devices including computers, mobile phones, and tablets. Clipboard alone cannot handle ail incompatibility problems; a Digitizer/De-digitizer Module is also needed.
In the encryption box device 100 shown in Fig. 1, a first clipboard 122 runs on a processor and downloads a plaintext stream 116 using download clipboard 126.
An encryption engine runs on the processor and receives the plaintext stream 116 and encrypts the plaintext stream 116 to produce a cipher text or encrypted stream 110. The encryption engine may also decrypt the encrypted stream 110 to produce the plaintext stream 116 and upload the plaintext stream 116 to the first clipboard 122 using upload clipboard 124.
A digitizer/de-digitizer 128 runs on the processor and digitizes the encrypted stream 110 to produce a digitized encrypted stream 138. The digitizer/de-digitizer 128 digitizes the encrypted stream 110 according to a mode 132 such as no digitization, Base 64 digitization, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a userdefined mode, or save as a file (flag).
A second clipboard 140 runs on the processor and uploads the digitized encrypted stream 138 using upload clipboard 134.
The digitizer/de-digitizer 128 running on the processor may also download the digitized encryption stream 138 from the second clipboard 140 using the download clipboard 142 and de-digitize the digitized encryption stream 138 to produce the encrypted stream 110. The digitizer/de-digitizer 128 may then provide the encrypted stream 110 to the encryption engine.
The digitizer/de-digitizer 128 de-digitizes the digitized encryption stream 138 according to a mode 132 such as no de-digitization, Base 64, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode, or save as a file (flag).
The encryption box device 100 may be a dongle that can be plugged into a computer such as a Personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 100 may be a USB device that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 100 may include wireless communication such as Wi-Fi or Bluetooth.
The encryption box device 100 may be a Mobile Phone, an isdn phone, skype, viber, Whatsapp, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a téléphoné exchange, a tablet, a computer, a radio, or the cloud.
The encryption box device 100 may include proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box. Use of the encryption box device 100 may be limited to a user of one of the wireless adapters.
The encryption box device 100 may be simulated by a hardware emulator, such as an emulator running on a computer.
A first cipher stream generator 103 generates and synchronizes a first cipher stream using the plaintext information 116 and a first key 118. A second cipher stream generator 101 generates and synchronizes a second cipher stream using a second key 106 and a randomizing function 104 to randomize and then synchronize a controllable plaintext stream 102. An exclusive disjunction operator 120 operating on the first and second synchronized cipher streams obtains the cipher text stream 110.
The first cipher stream generator 103 includes a block cipher encryption unit 114 that generates and synchronizes the first synchronized cipher stream upon input of plaintext information 116 and a first key 118. A block cipher encryption device 114 generates the first cipher stream and a first synchronization unit 112 synchronizes the first cipher stream.
The second cipher stream generator includes a random function generator that randomize is, and then synchronizes, the controllable plaintext stream 102 upon input of a second key 106 and the controllable plaintext stream 102, and outputs a second synchronized cipher stream. The random function generator includes a random function generator device 104 to randomize the controllable plaintext stream and a second synchronization unit 108 to synchronize the randomized second cipher stream.
A second embodiment of an encryption box device 200 is shown in Fig. 2.
In the encryption box device 200 shown in Fig. 2, a first clipboard 222 runs on a processor and downloads a plaintext stream 216 using download clipboard 226.
An encryption engine runs on the processor and receives the plaintext stream 216 and encrypts the plaintext stream 216 to produce a cipher text or encrypted stream 210. The encryption engine may also decrypt the encrypted stream 210 to produce the plaintext stream 216 and upload the plaintext stream 216 to the first clipboard 222 using upload clipboard 224.
A digitizer/de-digitizer 228 runs on the processor and digitizes the encrypted stream 210 to produce a digitized encrypted stream 238. The digitizer/de-digitizer 228 digitizes the encrypted stream 210 according to a mode 232 such as no digitization, Base 64 digitization, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a userdefined mode, or save as a file (flag).
A second clipboard 240 runs on the processor and uploads the digitized encrypted stream 238 using upload clipboard 234.
The digitizer/de-digitizer 228 running on the processor may also download the digitized encryption stream 238 from the second clipboard 240 using the download clipboard 242 and de-digitize the digitized encryption stream 238 to produce the encrypted stream 210. The digitizer/de-digitizer 228 may then provide the encrypted stream 210 to the encryption engine.
The digitizer/de-digitizer 228 de-digitizes the digitized encryption stream 238 according to a mode 232 such as no de-digitization, Base 64, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode, or save as a file (flag).
The encryption box device 200 may be a dongle that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 200 may be a USB device that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 200 may include wireless communication such as Wi-Fi or Bluetooth.
The encryption box device 200 may be a Mobile Phone, an isdn phone, Skype, Viber, Whatsapp, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a téléphoné exchange, a tablet, a computer, a radio, or the cloud.
The encryption box device 200 may include proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box. Use of the encryption box device 200 may be limited to a user of one of the wireless adapters.
The encryption box device 200 may be simulated by a hardware emulator, such as an emulator running on a computer.
A second cipher stream 208 is generated. A controllable plaintext 202 that matches the controllable plaintext 102 shown in Fig. 14, a random function 200 for that matches the random function 104, and a second key 206 that matches the second key may be used. The controllable plaintext 202 and the random function 104 are typically transmitted separately from the transmitting agent to the receiving agent, and the second key 106 is generally already known to the receiving agent.
In Fig. 3 is shown a single encryption box dongle and USB device 310 for use with an embodiment. The single encryption box dongle and USB device 310 is called an Encryption-Box and may be used with PCs, Laptops, Smart Phones, (iPhones & Android Phones) and Smart Tablets such as iPads.
The encryption-box will contain the Encryption Engine with Digitizer/De-digitizer and Clipboard described above.
The single encryption box dongle and USB device 310 can be plugged into a PC 302, a Laptop 308, or a Smart Phone and/or Tablet 304 and 306 and provide direct encryption/decryption for one user.
In Fig. 4 is shown a Wireless (WiFi or Bluetooth) Encryption-Box 410 for use with an embodiment. In orderfor more people to use the Encryption-Box, the wireless encryption box 410 will contain the Encryption Engine, Digitizer/De-digitizer, and Clipboard Modules together with Wireless (WiFi or Bluetooth) Modules. This device will allow multiple people to use the encryption-box at the same time. The wireless encryption box 410 may be used with a PC 402, a Laptop 408, or a Smart Phone and/or Tablet 404 and 406.
In Fig. 5 is shown a Wireless Encryption-Hub with Multiple Wireless Adapters 512 for use with an embodiment. In orderfor more people to use the Encryption-Box, the wireless encryption hub 512 will contain the Encryption Engine, Digitizer/De-digitizer, Clipboard Modules together with Wireless (WiFi or Bluetooth) Modules. This device will allow multiple people to use the encryption-box at the same time. The wireless encryption hub 512 may be used with a PC 502, a Laptop 508, or a Smart Phone and/or Tablet 504 and 506.
A Wireless USB Adapter 510 contains the wireless transmission corresponding to the wireless encryption hub 512, and allows multiple people to use the wireless encryption hub
512 at the same time. The Wireless USB Adapter 510 contains Wireless Proprietary Modules corresponding to the Encryption-Hub 512.
Users can buy one Wireless Encryption-Hub 512 and multiple Wireless Adapters 510. Each adapter 510 can be plugged into a PC 502, a Laptop 508, or a Smart Phone and/or Tablet 504 and 506 directly. Only the adapter 510 users can use encryption/decryption provided by the wireless encryption-hub 512.
In Fig. 6 is shown an encryption box 610 plugged into a device such as a PC 602. Once the encryption box 610 is plugged into a device such as a PC 602, a number of applications can be downloaded and installed automatically or manually.
In one embodiment, ppExcel, which intégrâtes Microsoft Excel and the encryption box 610, is fully embedded inside MS Excel to provide encryption/decryption on MS Excel cells regardless of cells' type.
It is well known that the complications of cells format of MS Excel such as number cells, text cells, and formula cells forming a major difficulty for any encryption engine to provide security encryption successfully. These different cell types are not compatible each other, but are inter-related. When changing one type of cells such as formula cells with encryption, ail other dépendent cells such as number cells will changed to difficult status immediately. Forthis reason, it is believed that no traditional encryption engine can provide encryption successfully on Excel cells regardless of its types. With a digitizer and clipboard module, the encryption box 610 can provide a solution to this problem.
Once the encryption box 610 is plugged into a device such as a PC 602, the encryption box 610 will install a clickable tag 702 called ppExcel30, as shown in Fig. 7. When this ppExcel30 tag is clicked, a sériés of functional buttons 704 will appear onto the MS Excel software.
The functional buttons 704 provided by ppExcel can be used for encryption and decryption on selected cells, entire sheet, and the whole workbook of Excel regardless of the cell types. It is believed that ppExcel is the first encrypter to provide cells encryption for MS Excel successfully in this style.
The following process describes the basic encryption of ppExcel on MS Excel cells:
1. Highlight the selected original cells in Excel that you want to encrypt,
2. Press the Enc/Dec Selected Cells button,
3. ppExcel will copy ail selected cells and send them to the Encryption-Box one-by-one,
4. After the encryption by the Encryption-Box, the cell contents will be sent to clipboard,
5. ppExcel will then paste the encrypted cell contents on clipboard back to its former cell location.
The following process describes the basic decryption of ppExcel on MS Excel cells with respect to Fig. 7:
1. Highlight the selected encrypted cells in MS Excel that you want to decrypt,
2. Press the Enc/Dec Selected Cells button,
3. ppExcel will copy ail selected encrypted cells and send them to the Encryption-Box oneby- one. Since they are ppExcel encrypted (in Digitized Cipher text Stream format), Encryption- Box will perform decryption automatically,
4. After the decryption by the Encryption-Box, the original cell will be sent to clipboard,
5. ppExcel will then paste the cell on clipboard back to its former cell location.
A process of encrypting the MS Excel cells with ppExcel is shown in Figs. 8 and 9.
1. First mark (or highlight) the cells that you want to encrypt 802 from MS Excel,
2. Click the Enc/Dec Selected Cells button 904,
3. The selected original cells of MS Excel 802 will be replaced by the encrypted cells 902.
By using the similar construction, the following associated prototypes are also established:
1. ppOutlook, which intégrâtes MS Outlook and the Encryption-Box.
2. ppWord , which intégrâtes MS Word and the Encryption-Box.
3. ppPowerPoint, which intégrâtes MS PowerPoint and the Encryption-Box.
In anotherembodiment, shown in Figs. 10 and 11, PPM, which is a Universal Text Encrypter using the encryption box 1004, can use the encryption box 1004 for any text encryption/decryption from any other programs.
Due to the complications of ail different programs in different platforms (or operating Systems) that produce texts, it is not easy for traditional encryption engines to construct a universal encrypter that can encrypt/decrypt texts for ail of them. With the digitizer and clipboard modules, the encryption-box 1004 establishes a universal encrypter called PPM (Professional Protection for Messages) to encrypt/decrypt any text from any other programs.
Once the encryption box 1004 is plugged into a machine 1002, as shown in Fig. 10, the encryption box 1004 will download and install a program called “PPM” 1102, which is shown in Fig. 11. PPM 1102 is a universal text encrypter for any text related program. Any text change in the Original Message window will trigger automatic encryption and the encryption results will appear in the Encrypted Message window. Any text change on the Encrypted Message window will trigger auto- decryption and the decryption results will appear on the Original Message window.
The buttons provided by PPM can be used for encryption and decryption on any text from any program. When you type a piece of text into the Original Message window, it will be encrypted automatically and the encrypted message will appear in the Encrypted Message window.
Among the buttons may be:
Msg Copy - Copy the text in the Original Message window onto the Clipboard,
Msg Paste- Download the text from the Clipboard into the Original Message window. (AutoEncrypt) This will trigger auto-encryption and decryption results appear in the Encrypted Message window (digitizing mode = 3 is used),
Enc Copy - Copy the encrypted text from the Encrypted Message window onto the Clipboard
Enc Paste - Download the encrypted text from the Clipboard into the EncryptedMessage window. The encrypted text will be decrypted automatically and appear in the Original Message window. This may also be referred to as Auto-Decrypt.
The encryption process of PPM will be described with respect to Figs. 12 and 13:
1. Hightlight and press the Control-C key on selected text 1202 such as This is my secret from any text related program (This will send the selected textto Clipboard)
2. Press the Msg Paste button of PPM (The PPM will copy the text from the Clipboard and paste to the Original Message window) 3. The text in the Original Message window 1302 will be encrypted automatically and immediately
4. The encrypted text will appear in the Encrypted Message window 1304 as f3 Oe c2 ab e2 ef 71 4a e1 70 67 81 53 95 28 02 12 e1 5a cf 5a 3b 27 cf 73 90 93 68 df 3a 74 f5 5cf4ff c2 6c 14dcfd paired hexadécimal numbers with space (or digitizing mode=3).
The decryption of PPM will be described with respect to Figs. 14 and 15:
1. Hightlight and press the Control-C key on any PPM encrypted text 1402, this will send the selected text to the clipboard,
2. Press the Enc Paste button of PPM, the PPM will paste text from Clipboard to the Encrypted Message window 1504,
3. The text in the Encrypted Message window 1504 will also be decrypted automatically,
4. The decrypted text will appear in the Original Message window 1502.
Sending an Encrypted Message to a Live Chat Program called LINE will be described with respect to Figs. 16 and 17.
Suppose you want to perform secure live chatting with someone called Buckingham using a popular chat software called LINE installed on a machine. The machine also has an Encryption-Box attached. The secure live chat can be performed by the following procedures:
1. Suppose you hâve the PPM and the popular chat software LINE on your machine .
2. Type a message in the Original Message window 1602 such as Meet Me At 2pm Tomorrow on PPM.
3. While you are typing message in the Original Message window 1602, the corresponding encrypted message
1b67f2de 0a 86 41 3f52 9b c6 8f2a 70 6c 0b 6c bO ac d1 35 65 01 8d 1e dO 6b 31 50 d6 87 41 f6 22 70 cb 3e 1f fb will appear on the Encrypted Message window 1604 at the same time.
4. Press the Enc Copy button to send the encrypted message onto the Clipboard.
5. Paste the encrypted message on the Clipboard onto the typing area 1702 of LINE and press the return key to send the encrypted message to the chat area of LINE.
6. You will see the encrypted message appear in the chat area of LINE.
Decrypting an encrypted message from a live chat program called line will be described with respect to Figs. 18 and 19.
Suppose you hâve received a PPM encrypted message ff ad d6 f5 ee 4c 65 14 1d 73 0b b9 e5 db 9f 27 bf 4b 11 a1 33 39 20 ab 34 18 72 a2 dO dO b3 ef c2 e3 fa fb 7b e9 81 from LINE. The following procedure can be used to decrypt it:
1. Highlight the encrypted message from the chat area 1802 of LINE.
2. Press the Control-C key to send the encrypted message to the Clipboard.
3. Press the Enc Paste button from PPM.
4. The encrypted message will be copied from the Clipboard to the Encrypted Message window 1904 of PPM. Also the encrypted message will be decrypted by PPM automatically at the same time.
5. The decryption results such as
OK. At the spot-772 as usual will be displayed in the Original Message window 1902 of PPM. You can read the original message and do whatever you like.
In a third embodiment, shown in Fig. 20, an encryption box device 2000 includes a memory 2002 and a processor 2004 coupled to the memory 2002.
In a fourth embodiment, shown in Fig. 21, a method of secure encryption using an encryption box device includes a first operation 2102 of plugging the encryption box device into a computer. The method of secure encryption then performs a second operation 2104 of running an application on the computer. The method of secure encryption then performs a third operation 2106 of downloading a plaintext stream from the application to a first clipboard. The method of secure encryption then performs a fourth operation 2108 of encrypting the plaintext stream to produce an encrypted stream. The method of secure encryption then performs a fifth operation 2110 of digitizing the encrypted stream to produce a digitized encrypted stream. The method of secure encryption then performs a sixth operation 2112 of uploading the digitized encrypted stream to a second clipboard.
The application may be a spreadsheet, a text window, an email, a word processor, a chat room, or a présentation.
The method of secure encryption may further include a seventh operation of digitizing the encrypted stream according to a mode such as no digitization, Base 64 digitization, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a userdefined mode, or save as a file (flag).
The method of secure encryption may further include an eighth operation of downloading the digitized encryption stream from the second clipboard. The method of secure encryption may further include a ninth operation of de-digitizing the digitized encryption stream to produce the encrypted stream and providing the encrypted stream to the encryption engine. The method of secure encryption may further include a 10th operation of decrypting the encrypted stream to produce the plaintext stream and uploading the plaintext stream to the first clipboard.
The method of secure encryption may further include an 11th operation of de-digitizing the digitized encryption stream according to a mode such as no de-digitization, Base 64,hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode, or save as a file (flag).
The method of secure encryption may further include a 12th operation of simulating the encryption box device using a hardware emulator.
The embodiments can be implemented in computing hardware (computing apparatus) and/or software, such as (in a non-limiting example) any computer that can store, retrieve, process and/or output data and/or communicate with other computers. The results produced can be displayed on a display ofthe computing hardware. A program/software implementing the embodiments may be recorded on computer-readable media comprising computer-readable recording media. The program/software implementing the embodiments may also be transmitted over transmission communication media. Examples of the computer-readable recording media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or a semiconductor memory (for example, RAM, ROM, etc.). Examples ofthe magnetic recording apparatus include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT). Examples of the optical disk include a DVD (Digital Versatile Disc), a DVD-RAM, a CD-ROM (Compact Disc - Read Only Memory), and a CD-R (Recordable)/RW. An example of communication media includes a carrier-wave signal.
Further, according to an aspect of the embodiments, any combinations of the described features, functions and/or operations can be provided.
The many features and advantages of the embodiments are apparent from the detailed spécification and, thus, it is intended by the appended claims to cover ail such features and 5 advantages of the embodiments that fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the inventive embodiments to the exact construction and operation illustrated and described, and accordingly ail suitable modifications and équivalents may be resorted to, falling within the scope thereof.
The foregoing has described the principles, embodiments, and modes of operation of the présent invention. However, the invention should not be construed as being limited to the particular embodiments described above, as they should be regarded as being illustrative and not restrictive. It should be appreciated that variations may be made in those embodiments by those skilled in the art without departing from the scope of the présent invention.

Claims (17)

1. An encryption box device (100) comprising:
a memory; and a processor coupled to the memory;
a first clipboard (122) running on the processor and compatible with any
5 application or operating system, the first clipboard configured to download a plaintext stream (116) from an application in any format;
characterized in that:
an encryption engine runs on the processor and is configured to receive the plaintext stream (116) and encrypt the plaintext stream (116) to produce an encrypted θ stream (110);
a digitizer (128) runs on the processor and is configured to digitize the encrypted stream (110) to produce a digitized encrypted stream (110); and a second clipboard (140) runs on the processor and is configured to upload the digitized encrypted stream (110); and the digitized encrypted stream (110) is compatible with a plurality of different memories, cloud platforms, operating Systems, and communications with other devices.
2. The encryption box device (100) of claim 1, wherein the digitizer (128) digitizes the encrypted stream (110) according to a mode selected from the group consisting of:
20 no digitization,
Base 64 digitization, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode, and save as a file (flag).
3. The encryption box device (100) of claim 1, further comprising:
a de-digitizer (128) running on the processor and configured to download the digitized encryption stream (138) from the second clipboard (140) and de-digitize the digitized encryption stream (138) to produce the encrypted stream (110) and provide the encrypted stream (110) to
JO the encryption engine; and the encryption engine is further configured to decrypt the encrypted stream (110) to produce the plaintext stream (116) and upload the plaintext stream (116) to the first clipboard (122).
4. The encryption box device (100) of claim 3, wherein the de-digitizer (128) dedigitizes the digitized encryption stream (138) according to a mode 132 selected from the group consisting of:
no de-digitization,
Base 64, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode 132, and save as a file (flag).
5. The encryption box device (100) of claim 1, wherein the encryption box device (100) comprises a dongle that can be plugged into a computer selected from the group consisting of:
a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box.
6. The encryption box device (100) of claim 1, wherein the encryption box device (100) comprises a USB device that can be plugged into a computer selected from the group consisting of:
a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box.
7. The encryption box device (100) of claim 1, further comprising wireless communication selected from the group consisting of Wi-Fi and Bluetooth.
8. The encryption box device (100) of claim 1, further comprising proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer 5 selected from the group consisting of:
a personal computer, a laptop, a smart phone, a tablet, i0 a smart TV, an intelligent network drive, a central storage, and a set-top box.
9. The encryption box device (100) of claim 8, wherein use of the encryption box device (100) is limited to a user of one of the wireless adapters.
10. The encryption box device (100) of claim 1, wherein use of the encryption box device (100) is simulated by a hardware emulator.
11. The encryption box device (100) of claim 1, wherein the encryption box device (100) comprises a Mobile Phone, an isdn phone, skype, viber, Whatsapp, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a téléphoné exchange, a tablet, a computer, a radio, or the cloud.
12. A method of secure encryption using an encryption box device (100) comprising: plugging the encryption box device (100) into a computer;
running an application in any format on the computer;
downloading a plaintext stream (116) from the application in any format to a first clipboard (122) compatible with any application or operating system;
• encrypting the plaintext stream (116) to produce an encrypted stream (110);
digitizing the encrypted stream (110) to produce a digitized encrypted stream (110); and uploading the digitized encrypted stream (110) to a second clipboard (140) compatible with a plurality of different memories, cloud platforms, operating Systems, and communications with other devices.
13. The method of secure encryption of claim 12, wherein the application is selected from the group consisting of:
a spreadsheet, a text window, an email, a word processor, a chat room, and a présentation.
14. The method of secure encryption of claim 12, wherein the digitizing is according to a mode 132 selected from the group consisting of:
no digitization,
Base 64 digitization, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode 132, and save as a file (flag).
15. The method of secure encryption of claim 12, further comprising:
downloading the digitized encryption stream (138) from the second clipboard (140) and de-digitizing the digitized encryption stream (138) to produce the encrypted stream (110) and providing the encrypted stream (110) to the encryption engine; and decrypting the encrypted stream (110) to produce the plaintext stream (116) and uploading the plaintext stream (116) to the first clipboard (122).
16. The method of secure encryption of claim 12, wherein the de-digitizing is according to a mode 132 selected from the group consisting of:
no de-digitization,
Base 64, hexadécimal numbers without spacing, paired hexadécimal numbers with spacing, a user-defined mode 132, and save as a file (flag).
17. The method of secure encryption of claim 12, further comprising simulating the encryption box device (100) using a hardware emulator.
OA1201800538 2016-07-29 Applications in connection with secure encryption. OA19283A (en)

Publications (1)

Publication Number Publication Date
OA19283A true OA19283A (en) 2020-06-05

Family

ID=

Similar Documents

Publication Publication Date Title
US11403237B2 (en) Electronic tool and methods with audio for meetings
US10230697B2 (en) User terminals, and methods and computer-readable recording mediums storing computer programs for transmitting and receiving messages
US11115393B2 (en) Message server, method for operating message server and computer-readable recording medium
US11250143B2 (en) Method and system for implementing an encryption SDK
CN105208028A (en) Data transmission method and related device and equipment
JP2018526666A (en) Personal search index with enhanced confidentiality
EP4030802A1 (en) Method and apparatus for managing subscription data
CN101346970A (en) Method for cipher key conversion in wireless communication
JP6058514B2 (en) Cryptographic processing method, cryptographic system, and server
KR100931986B1 (en) Terminal and method for transmitting message and receiving message
OA19283A (en) Applications in connection with secure encryption.
EP3491772B1 (en) Applications in connection with secure encryption
EA043334B1 (en) ENCRYPTION DEVICE AND ENCRYPTION METHOD
US9154471B2 (en) Method and apparatus for unified encrypted messaging
US20160072777A1 (en) Hardware crypto module and system for communicating with an external environment
CN103501316A (en) Audio and video synchronization method, system and device between webpage game client terminals
CN107210992B (en) Uploading and downloading data between a secure data system and an external data system
US20150215391A1 (en) Communication system and communication method thereof
KR20210014554A (en) Techniques for transmitting and receiving messages through secret chat
JP2019530270A5 (en)
CN104219324A (en) Business card releasing method of mobile terminal
CN104518863B (en) Method and system for realizing communication content synchronization based on DLNA network
JP4998290B2 (en) Data authentication synchronization system and method between portable terminal and personal computer
KR20140139393A (en) User apparatus, server, contents providing system and method for decryption encrypted contents thereof
CN103824034A (en) Method for processing data