Home Up

 

KeyByte...

BRIEF DESCRIPTION OF THE DRAWINGS

Fig. 1 is a schematic block diagram of a plurality of interconnectable computer systems;

Fig. 2 is a very general schematic flow chart of the decryption process;

Fig. 3a and 3b are a chart of the structure and substructure of the trailer of a message assembled with the present invention;

Fig. 4 is a general schematic flow chart of the encryption process;

Fig. 5a and Fig. 5b are a general schematic flow-charts of the subroutine used to generate a key disk;

Fig. 6 is a schematic block diagram of a subroutine used for encrypting an initializing vector or for generating a random number;

Fig. 7a   Fig. 7b   Fig. 7c   Fig. 7d are general block diagrams which depict the interrelationships between some of the subroutines of the computer program modules;

Fig. 8a  Fig. 8b area more detailed schematic flow chart of an access control module or subroutine;

Fig. 9a  Fig. 9b are a detailed schematic flow chart of the module or subroutine that permits the user to select labels;

Fig. 10 is an schematic flow chart of an overview of the process used to create an encryped file key and message trailer;

Fig. 11 is an schematic flow chart of an overview of the process used to create the decryption file key;

Fig. 12 is a more detailed schematic flow chart of the label encryption module;

Fig. 13 is a schematic diagram detailing the label lookup process;

Fig. 14 is a detailed schematic flow chart of the module that decrypts the trailer of a message;

Fig. 15 is a general schematic flow chart of a module that uses the labels generated by the label selection and generation module of Fig. 9 and in turn generates label trailkeys;

Fig. 16 is a schematic flow chart of a subroutine used in Fig. 15.

Fig. 17 is a schematic flow chart of a subroutine used in Fig. 15 to generate a trailkey;

Fig. 18 is a schematic flow chart of a subroutine used in Fig. 16 to reduce in a reproducible way the number of digits in an alphanumeric string to one integer; and

Fig. 19 is a schematic flow chart of a subroutine used to reproducibly meld together two equal or unequal length strings and is used in Fig. 17;

Fig. 20 is a schematic flow chart of a subroutine used to reproducibly combine the trailkeys generated in Fig. 16 to produce a single file key that is used as a vector in the encryption algorithm;

Fig. 21 is a schematic flow chart of a subroutine used to automatically rekey the recipient of a message.

Fig. 22 is a schematic flow chart of an expert systems subroutine used to determine the weights of selected labels and whether the selected combination of labels are acceptable.

 

 

.

Copyright (c) 2001-2007 RDFollendoreIII All Rights Reserved