Systems and methods for ephemeral shared data set management and communication protection
First Claim
1. A method of protecting a communication between a first computing device and a second computing device, comprising:
- selecting by the first computing device elements from an ephemeral shared data set stored at the first computing device and the second computing device;
generating by the first computing device a rule set indicating locations of the selected elements in the ephemeral shared data set;
sending by the first computing device the generated rule set to the second computing device;
generating by the first computing device a result based on the selected elements;
encrypting by the first computing device a message using the generated result; and
sending the encrypted message to the second computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments provide methods and computing devices configured to implement the methods for dynamically changing an ephemeral shared data set. Various embodiments provide methods and computing devices configured to implement the methods for the dynamic generation of a value that may be used to protect a communication based on the dynamically changed ephemeral shared data set. Various embodiments incorporate the assumption that trusted systems ultimately are demonstrably insecure, because such systems are penetrable and vulnerable. Various embodiments provide a digital communication system that assumes no trust among various network elements, for at least the reason that the digital environment is inherently untrustworthy.
24 Citations
21 Claims
-
1. A method of protecting a communication between a first computing device and a second computing device, comprising:
-
selecting by the first computing device elements from an ephemeral shared data set stored at the first computing device and the second computing device; generating by the first computing device a rule set indicating locations of the selected elements in the ephemeral shared data set; sending by the first computing device the generated rule set to the second computing device; generating by the first computing device a result based on the selected elements; encrypting by the first computing device a message using the generated result; and sending the encrypted message to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device, comprising:
-
a memory; and a processor coupled to the memory and configured with processor-executable instructions to perform operations comprising; selecting elements from an ephemeral shared data set stored at the computing device and a second computing device; generating a rule set indicating locations of the selected elements in the ephemeral shared data set; sending the generated rule set to the second computing device; generating a result based on the selected elements; encrypting a message using the generated result; and sending the encrypted message to the second computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a first computing device to perform operations comprising:
-
selecting elements from an ephemeral shared data set stored at the first computing device and a second computing device; generating a rule set indicating locations of the selected elements in the ephemeral shared data set; sending the generated rule set to the second computing device; generating a result based on the selected elements; encrypting a message using the generated result; and sending the encrypted message to the second computing device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification