US 12,406,075 B1
System and method for scalable stream encryption and decryption
Gregory H Peatfield, Atkinson, NH (US); and Charles J Northrup, Bedford, NH (US)
Assigned to Neursciences LLC, Bedford, NH (US)
Filed by Neursciences LLC, Bedford, NH (US)
Filed on Feb. 25, 2022, as Appl. No. 17/681,483.
Claims priority of provisional application 63/153,707, filed on Feb. 25, 2021.
Int. Cl. G06F 21/60 (2013.01); G06F 9/30 (2018.01); G06F 9/448 (2018.01); G06F 21/64 (2013.01); G06F 21/73 (2013.01)
CPC G06F 21/606 (2013.01) [G06F 9/3016 (2013.01); G06F 9/4498 (2018.02); G06F 21/602 (2013.01); G06F 21/64 (2013.01); G06F 21/73 (2013.01); G06F 2221/2113 (2013.01); G06F 2221/2141 (2013.01)] 10 Claims
OG exemplary drawing
 
1. A method for a first machine to grant authority to a second machine, the method comprising:
a. providing a first keyspace managed by a first machine
b. performing machine code on said first machine to access a first identifier representative of a first keyspace;
c. cryptographically hashing digital data input to compute a first hash value;
d. acting upon the first hash value to cryptographically hash a representation of said first identifier to a second hash value;
e. encoding the second hash value as a key value that is cryptographically linked to a digital data output and said first identifier wherein the key value is an identifier representative of a second keyspace;
f. granting authority to manage the identifier as a cryptographically linked keyspace; and
g. communicating the grant of authority to a second machine.