US 11,924,339 B2
System and method for secure end-to-end electronic communication using a privately shared table of entropy
Douglass A. Hill, Marco Island, FL (US); and Henry R. Tumblin, Castine, ME (US)
Assigned to Real Random IP, LLC, St. Petersburg, FL (US)
Filed by Real Random IP, LLC, Tampa, FL (US)
Filed on Jul. 21, 2021, as Appl. No. 17/382,282.
Claims priority of provisional application 63/175,548, filed on Apr. 15, 2021.
Prior Publication US 2022/0337407 A1, Oct. 20, 2022
Int. Cl. H04L 9/08 (2006.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01)
CPC H04L 9/0869 (2013.01) [G06F 21/602 (2013.01); G06F 21/6245 (2013.01); H04L 9/0894 (2013.01); H04L 63/0428 (2013.01); H04L 63/0435 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method performed at a first electronic device, the method comprising:
storing a privacy table at the first electronic device, the privacy table comprising random numbers;
transmitting the privacy table to a second electronic device over an encrypted channel, wherein the second electronic device is distinct from the first electronic device;
receiving a first message for transmission to the second electronic device;
generating a map based on the privacy table, the map including instructions on how to use the privacy table to generate a primary key;
generating the primary key based on the map and the privacy table;
encrypting the first message using the primary key to form an encrypted first message;
transmitting the map and the encrypted first message to the second electronic device, enabling the second electronic device to decrypt the encrypted first message by:
recreating the primary key based on the map and the privacy table; and
decrypting the encrypted first message using the recreated primary key;
receiving a second message for transmission to the second electronic device;
generating a new map, which is distinct from the map;
generating a new primary key based on the new map and the privacy table, wherein the new primary key is distinct from the primary key;
encrypting the second message using the new primary key to form an encrypted second message; and
transmitting the new map and the encrypted second message to the second electronic device, enabling the second electronic device to decrypt the encrypted second message by:
recreating the new primary key based on the new map and the privacy table; and
decrypting the encrypted second message using the recreated new primary key.