
This is a bit-level loseless data compression, consisting of two key steps: tranforming the binary input file in a proprietary format that preserves the number of bits of the input file, and compressing the transformed file using one of various proprietary methods. Any file can be compressed, down to a file floor size, by employing multiple compression cycles, where the file transformed and/or compressed in the current cycle becomes the input file for the next compression cycle. The size of the file floor size depends on the chosen compression method. To achieve high compression rates, multiple cycles are required, implying a large processing power.
The data encryption applies proprietary encryption methods to the transformed file, with the encrypted file preserving the sie of the original file. Due to the common tranformation used for both encryption and compression, an input file can be both encrypted and compressed.
The spetacular lossless compression applications span from commercial (data communication, streaming, internet, social media, data storage, hi-fi telephony), to entertainment (including new raw TV brodcasting format), to military and exploration (such as underwater communication), to space communication. Encryption applications include secure communication without use of any identifiable means, concealed communication, remote access on a dedicated data channel.
To achieve the full potential and cover all applications, a specialized chip is required.An estimated 30% of aplications can be implemented in software. I am looking to work for such an established company, which includes me coordinating the deelopment team. A ifferent avenue is independent development, using venture capital.