Enhancing obfuscation of digital content through use of linear error correction codes

DWPI Title: Computing system for enhancing security of digital content through use of linear error correction codes (LECCs), has processing circuitry that transmits obfuscated digital content to receiver computing system
Abstract: Technologies related to enhancing security of digital content are described. Linear error correction codes (LECCs) are employed for dual purposes: 1) to obfuscate digital content; and 2) to verify integrity of the digital content. A transmitter computing system obfuscates digital content based upon an obfuscation protocol, wherein the obfuscated digital content includes an LECC. A receiver computing system deobfuscates the digital content by performing the inverse of the obfuscation protocol.
Use: Computing system for enhancing security of digital content to be transmitted from transmitter computing system to receiver computing system. Uses include but are not limited to desktop computing device, laptop computing device, mobile telephone, wearable computing device, server computing device e.g. in data center, programmable logic controller (PLC), network interface card (NIC), application-specific integrated circuit (ASIC) sensor systems, and field programmable gate array (FPGA).
Advantage: The method enables leveraging linear error correction codes (LECCs) to enhance security of digital content while employing the LECCs for intended purpose to validate integrity of the digital content. The method allows a receiver computing system to understand or have knowledge of where extraneous data and/or bit alterations are added or bits are altered, thus reconstructing digital content and validating integrity of a digital content in an efficient manner.
Novelty: The system has a processing circuitry that utilizes an obfuscation protocol with respect to a digital content (108) to generate an obfuscated digital content (116). The digital content is partitioned into several blocks of data, where the blocks of data include a first block of data and a second block of data. The first generator polynomial is utilized to generate a first LECC (118) for the first block of data. The second generator polynomial is utilized to generate a second LECC (132) for the second block of data, where the obfuscated digital content comprises the first LECC and the second LECC. The obfuscated digital content is transmitted to a receiver computing system (104). The system is configured to reconstruct the digital content from the obfuscated digital content based upon the obfuscation protocol. The system is configured to ascertain that the first LECC and the second LECC that are included in the obfuscated data indicates that the digital content is free of errors.
Filed: 11/5/2020
Application Number: US17090304A
Tech ID: SD 15475.0
This invention was made with Government support under Contract No. DE-NA0003525 awarded by the United States Department of Energy/National Nuclear Security Administration. The Government has certain rights in the invention.
Data from Derwent World Patents Index, provided by Clarivate
All rights reserved. Republication or redistribution of Clarivate content, including by framing or similar means, is prohibited without the prior written consent of Clarivate. Clarivate and its logo, as well as all other trademarks used herein are trademarks of their respective owners and used under license.