发明名称 Self-encryption process
摘要 This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue.
申请公布号 US8788803(B2) 申请公布日期 2014.07.22
申请号 US201213362384 申请日期 2012.01.31
申请人 Maidsafe Foundation 发明人 Irvine David
分类号 G06F21/00 主分类号 G06F21/00
代理机构 Gardner Groff Greenwald & Villanueva, PC 代理人 Gardner Groff Greenwald & Villanueva, PC
主权项 1. A method of protecting data in a peer-to-peer network of a plurality of nodes, comprising: splitting the data into a plurality of data chunks of one or more sizes, wherein the one or more sizes are randomly calculated based on the data; obfuscating first, second and third data chunks of the plurality of data chunks by swapping a first byte of the first data chunk with a first byte of the second data chunk, a second byte of the second data chunk with a first byte of the third data chunk, and a second byte of the third chunk with the second byte of the first chunk till all bytes of the first, second and third data chunks are swapped, and repeating the swapping by same number of times as there are chunks, wherein obfuscating the data chunks leads to mixing UP of content of the data chunks, thereby ensuring that the data is rendered useless without presence of all the data chunks; and encrypting the plurality of obfuscated data chunks, wherein a hash value of a given data chunk of the plurality of obfuscated data chunks is used as an input to an encryption algorithm to encrypt a next given data chunk of the plurality of obfuscated data chunks; and naming the plurality of encrypted obfuscated data chunks using corresponding hash values of the data chunks.
地址 Ayrshire GB