The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 18, 2018

Filed:

Jun. 12, 2018
Applicant:

Daniel Maurice Lerner, Missouri City, TX (US);

Inventor:

Daniel Maurice Lerner, Missouri City, TX (US);

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 1/00 (2006.01); G06F 17/30 (2006.01); H04L 9/14 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0457 (2013.01); G06F 17/30581 (2013.01); H04L 1/0041 (2013.01); H04L 9/0861 (2013.01); H04L 9/14 (2013.01); H04L 63/0471 (2013.01); H04L 63/102 (2013.01); H04L 2209/08 (2013.01);
Abstract

Devices that conceal transmission(s) transmitted to and/or reveal transmission(s) received from these devices comprising at least one executable coded cipher key(s) at least one executable coded encryption key (ECEK) device that securitizes transmission(s) that uses executable coded key(s), and at least one executable coded decryption key (ECDK) device that reveals transmission(s) such that a combined device is a RDDS/ECDK device that transmits randomized data with data sub-channels and with ECEKs; and that also utilizes at least one executable coded cipher key(s), such that transmission(s) sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is concealed and/or revealed. When concealing/revealing operation(s) are completed the transmission(s) is sent to at least one transmitter such that the concealing/revealing operation of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve securitization completion.


Find Patent Forward Citations

Loading…