Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.

 
Web www.patentalert.com

< Controlling operation of flash memories

> Apparatus, system, and method for displaying a complementary high-level graphical representation of an enterprise information technology system

~ 00478