Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

ABSTRACTION LAYER FOR DEFAULT ENCRYPTION WITH ORTHOGONAL ENCRYPTION LOGIC SESSION OBJECT; AND AUTOMATED AUTHENTICATION, WITH A METHOD FOR ONLINE LITIGATION

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Publication Date:
    October 9, 2014
  • معلومة اضافية
    • Document Number:
      20140304505
    • Appl. No:
      13/841763
    • Application Filed:
      March 15, 2013
    • نبذة مختصرة :
      Embodiments herein provide methods, apparatus, computer program products, software and means for (1) an abstraction layer for default encryption, (2) with orthogonal encryption logic session object, and (3) automated authentication, (4) with a method for online litigation. In some cases subject matter disclosed herein relates to default data encryption; use a user's registration data to generate an encryption logic and related executable code, including servers and client applications; encryption as an automatic background task occurring through variable encryption logic, with authentication; embodiments are also described for conducting online litigation through pleadings formed as meta-files that trigger litigation related algorithms in order to automate and coordinate litigation.
    • Claim:
      1. A computer encryption method comprising: encrypting bytes of plain-text to be sent from a first computer to a second computer during a session, using a common encryption algorithm generated from a first Encryption Logic Descriptor (ELD), wherein the ELD includes a text file used in a Java class loading process or a similar process using another programming language, and encrypting includes the first computer parsing the ELD and auto-encrypting the unencrypted bytes of the plain-text by means of the encryption algorithm which the ELD describes, the encrypted bytes being included in a meta-file that is transmitted to the second computer, the encrypted plain-text contained in the meta-file including a message and an attachment and a streaming media file; encrypting the first ELD using a second and different ELD, again using the class loading process, and adding the encrypted ELD to the meta-file; sending the meta-file from the first computer to the second computer; and the second computer receiving the meta-file and parsing the encrypted, first ELD contained in the meta-file and decrypting it by using the Second ELD in the class loading process, and parsing the encrypted bytes of plain-text in the meta-file and auto-decrypting the encrypted bytes using the decrypted first ELD, again using the class loading process, and presenting the auto-decrypted bytes to the user; the second ELD not being included in the meta-file, the Second ELD having previously been furnished to the two computers.
    • Claim:
      2. The method of claim 1, the first and second computer each including a data structure comprising a URL, a matrix, a set of peers, or a Trust DMBS, wherein the data structure is used by the first computer in the session prior to sending the meta-file to look up automatically and execute the second ELD to encrypt the first ELD as a background task, and in the next session of communication the same second ELD being used, but the Second ELD encrypting a new first ELD being used to auto encrypt and auto decrypt the plain-text.
    • Claim:
      3. The method of claim 1, further comprising the first computer receiving, saving, installing the second ELD into the encryption application on the first computer and the second computer doing the same toward the end of auto encrypting and auto decrypting the first ELD, the applications automatically encrypting and decrypting the data sent back and forth using the first ELD and class loading and auto encrypting and auto decrypting the first ELD using the second ELD, the second ELD being installed automatically as a background task when the first computer and the second computers using the applications begin to communicate for the first time.
    • Claim:
      4. The method of claim 1, further comprising the second ELD, or the data from which it is generated, being provided to the first and second computers by satellite, radio, and non terrestrial data transmission means.
    • Claim:
      5. The method of claim 1, further comprising encrypting using new logic for each communication session between two computers, the logic being generated on a commonly connected Encryption Switch containing a logic engine, and the logic being provided to the computers via a network; or a virtual Encryption Switch and logic engine locally incorporated into the encryption application, the applications being in a peer-to-peer architecture.
    • Claim:
      6. The method of claim 1, further comprising an automated, secure online method for litigation using applications with a computer-to-computer communications capability and connected through a network, and the applications being capable of search, the applications processing meta-files that employ class loading and name-value pairs to execute litigation-related procedures.
    • Claim:
      7. The method of claim 6 further comprising providing Proof of service for documents of legal significance, the fact of the transmission of the document being recorded on both computers, as well as the fact of the actual receipt of the document in a form identical to that of the transmitted document.
    • Claim:
      8. The method of claim 6 further comprising providing for each lawyer the automatic supplying to his computer of the new pleadings in the litigated case, each lawyer thereby keeping his set of pleadings current through a process operating as a background task executing each time one of the lawyers transmits a pleading to another lawyer, every lawyer thus being furnished automatically with the current global set of all pleadings in the case.
    • Claim:
      9. The method of claim 6 wherein a request from a first lawyer to a second lawyer to admit the authenticity of a document occurs online, through a wizard conforming to the rules of practice in a jurisdiction.
    • Claim:
      10. The method of claim 6, wherein and a matter value and a jurisdiction value are assigned a data structure for each case when the case is commenced, the data set being installed and processed on the application of each computer, the data then being expressed in pleadings meta-files searched and processed according to the values; the meta-files being available to the computers in either a peer-to-peer topology and through the cloud or through a central server; the values being processed in the applications per algorithms that automate the first appearance of the new lawyers entering the case and carry out jurisdiction dependent legal processes.
    • Claim:
      11. The method of claim 2, further comprising the second ELD auto encrypting and auto decrypting, in addition to the first ELD, a digital image of a signature file inserted into the meta-file upon transmission and decrypted upon receipt so as to appear in the written document that the meta-file expresses; the signature image file being associated with the person who, by enrolling on the encrypted network, authorizing its automatic decryption and use as his signature in the documents which he has authored, encrypted, and transmitted to the other computer.
    • Claim:
      12. The method of claim 1, further comprising an extension to the Java dynamic class loader using an XML text file, instantiated as an XmlBeans Object, as a configuration file that is parsed to load a Java class, or a comparable functionality in another programming language.
    • Claim:
      13. The method of claim 12, the Java class modifying digital television data at the point of reception by the viewer, by means of altering the audio and video streams via procedures controlled by the viewer or, by using a network, a third party acting on the viewer's behalf.
    • Claim:
      14. The method of claim 12 further comprising online litigation, which is effectuated by loading classes that carry out procedures pertaining to the litigation process, such as determining the authenticity of digital documents; the automatic updating on all of the computers in the litigation of the pleadings on file so that each computer enjoys the full, current set; matters control so that common matters are searched and grouped together; the virtual filing of legal documents; automatic proof of service; the generation of a rule set and table of authorities pertaining to the case based on its jurisdiction.
    • Claim:
      15. A method comprising: using satellite data transmission to send a common data stream to multiple computers (or smart phones), the data stream processed on the computers as a shared randomness input into a dynamic routine of encryption logic generation resulting in mirrored executable encryption logic on the computers, so that they automatically authenticate one another and auto encrypt the messages upon transmission and auto decrypt them upon receipt.
    • Claim:
      16. The claim of claim 15 wherein and the randomness is achieved by selecting or generating one or more ELD's from the common data stream.
    • Claim:
      17. The claim of claim 15 wherein two or more real or fictitious satellite data streams are compared on each computer via a bytes matching algorithm, yielding on each computer a mirrored stream of matching bytes, either captured by buffering and processed off line or processed in real time by a DSP, the stream operating the input into encryption logic engines that define the mirrored encryption logic for the session that each computer executes.
    • Claim:
      18. The claim of claim 15 wherein and the encryption logic so generated is a Secondary ELD which, uniquely as between two computers, auto encrypts upon transmission and auto decrypts upon receipt a first ELD which, in its unencrypted state, is used to auto encrypt and auto decrypt the plain-text of the messages sent back and forth between the computers.
    • Claim:
      19. The claim of claim 18 wherein a particular Secondary ELD is selected from a string of them which is received by the computers, or generated in situ on them, the identification of the selected secondary ELD by the second computer being effectuated by a test file included in the application of the first computer and the first computer encrypting it with the particular secondary descriptor it randomly has selected from stream of them contained in, or generated by, the satellite data, and then, including that encrypted test file in the encryption meta-file transmitted to the second computer; the second computer then testing each of the stream of secondary ELD's by attempting to use each to decrypt the encrypted test file parsed from the encryption meta-file and using checksum to compare the as-decrypted test files with the unencrypted test file included in the applications of both computers and encrypted by the first computer; and by this means identifying the particular secondary ELD that the first computer randomly selected from the ELD stream, thereafter saving it for future communication between the computers.
    • Claim:
      20. A method of encryption comprising: in respect of the encryption application provided to and installed by each user, the enrollment of the user on a secure network that auto-generates in whole or in part the executable code in a manner assuring that each application is logically individuated from the those of the other users, thereby providing orthogonality and mitigating the monoculture problem, toward the end that the hacking of one individual instance of the application is less likely to enable the hacking of the others.
    • Current U.S. Class:
      713/165
    • Current International Class:
      06
    • الرقم المعرف:
      edspap.20140304505