Encrypting and decrypting data on an electronic device
First Claim
1. A method of encrypting data, the method comprising:
- generating, by a primary data service application on an electronic device, a first primary secret key based on a primary ephemeral key pair and a primary master public key;
generating, by the primary data service application, a first primary ciphertext by encrypting a first portion of the data using the first primary secret key;
generating a second primary secret key based on the first primary secret key;
deleting the first primary secret key;
sending the first primary ciphertext from the primary data service application to a secondary data service application;
receiving, by the primary data service application, a first encrypted text from the secondary data service application, wherein the first encrypted text is generated by encrypting the first primary ciphertext;
generating, by the primary data service application, a second primary ciphertext by encrypting a second portion of the data using the second primary secret key;
deleting the second primary secret key;
sending the second primary ciphertext from the primary data service application to the secondary data service application; and
receiving, by the primary data service application, a second encrypted text from the secondary data service application, wherein the second encrypted text is generated by encrypting the second primary ciphertext.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software can be used to encrypt and decrypt data. In some aspects, a first primary secret key based on a primary ephemeral key pair and a primary master public key is generated by a primary data service application on an electronic device. A first primary ciphertext is generated by encrypting a first portion of the data using the first primary secret key. A second primary secret key is generated based on the first primary secret key. The first primary secret key is deleted. The first primary ciphertext is sent from the primary data service application to a secondary data service application. A first encrypted text is received from the secondary data service application. The first encrypted text is generated by encrypting the first primary ciphertext.
34 Citations
20 Claims
-
1. A method of encrypting data, the method comprising:
-
generating, by a primary data service application on an electronic device, a first primary secret key based on a primary ephemeral key pair and a primary master public key; generating, by the primary data service application, a first primary ciphertext by encrypting a first portion of the data using the first primary secret key; generating a second primary secret key based on the first primary secret key; deleting the first primary secret key; sending the first primary ciphertext from the primary data service application to a secondary data service application; receiving, by the primary data service application, a first encrypted text from the secondary data service application, wherein the first encrypted text is generated by encrypting the first primary ciphertext; generating, by the primary data service application, a second primary ciphertext by encrypting a second portion of the data using the second primary secret key; deleting the second primary secret key; sending the second primary ciphertext from the primary data service application to the secondary data service application; and receiving, by the primary data service application, a second encrypted text from the secondary data service application, wherein the second encrypted text is generated by encrypting the second primary ciphertext. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic device, comprising:
-
a memory; and at least one hardware processor communicatively coupled with the memory and configured to; generate, by a primary data service application on the electronic device, a first primary secret key based on a primary ephemeral key pair and a primary master public key; generate, by the primary data service application, a first primary ciphertext by encrypting a first portion of data using the first primary secret key; generate a second primary secret key based on the first primary secret key; delete the first primary secret key; send the first primary ciphertext from the primary data service application to a secondary data service application; receive, by the primary data service application, a first encrypted text from the secondary data service application, wherein the first encrypted text is generated by encrypting the first primary ciphertext; generate, by the primary data service application, a second primary ciphertext by encrypting a second portion of the data using the second primary secret key; delete the second primary secret key; send the second primary ciphertext from the primary data service application to the secondary data service application; and receive, by the primary data service application, a second encrypted text from the secondary data service application, wherein the second encrypted text is generated by encrypting the second primary ciphertext. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing instructions which, when executed, cause an electronic device to perform operations comprising:
-
generating, by a primary data service application on the electronic device, a first primary secret key based on a primary ephemeral key pair and a primary master public key; generating, by the primary data service application, a first primary ciphertext by encrypting a first portion of data using the first primary secret key; generating a second primary secret key based on the first primary secret key; deleting the first primary secret key; sending the first primary ciphertext from the primary data service application to a secondary data service application; receiving, by the primary data service application, a first encrypted text from the secondary data service application, wherein the first encrypted text is generated by encrypting the first primary ciphertext; generating, by the primary data service application, a second primary ciphertext by encrypting a second portion of the data using the second primary secret key; deleting the second primary secret key; sending the second primary ciphertext from the primary data service application to the secondary data service application; and receiving, by the primary data service application, a second encrypted text from the secondary data service application, wherein the second encrypted text is generated by encrypting the second primary ciphertext. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification