SYSTEM AND METHOD FOR PROTECTING SECRETS FILE
First Claim
Patent Images
1. A method for protecting a first secrets file, comprising:
- generating, by an n-bit generator, a first secrets file name for the first secrets file, wherein the first secrets file comprises a first secret;
generating, by the n-bit generator, a first plurality of decoy file names for a first plurality of decoy files, wherein each of the first plurality of decoy files comprises first decoy file contents, wherein each of the first plurality of decoy files are a same size as the first secrets file, and wherein each of the first plurality of decoy files is associated with a modification time within a range of modification times, wherein a modification time of the first secrets file is within the range of modification times; and
storing the first secrets file and the first plurality of decoy files in a secrets directory.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.
-
Citations
40 Claims
-
1. A method for protecting a first secrets file, comprising:
-
generating, by an n-bit generator, a first secrets file name for the first secrets file, wherein the first secrets file comprises a first secret; generating, by the n-bit generator, a first plurality of decoy file names for a first plurality of decoy files, wherein each of the first plurality of decoy files comprises first decoy file contents, wherein each of the first plurality of decoy files are a same size as the first secrets file, and wherein each of the first plurality of decoy files is associated with a modification time within a range of modification times, wherein a modification time of the first secrets file is within the range of modification times; and storing the first secrets file and the first plurality of decoy files in a secrets directory. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for encrypting communication, comprising:
-
receiving a request to communicate with a group; obtaining a group agreed connect name corresponding to the group; obtaining a username and password of a user of a member connecting to the group; generating a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extracting a secrets file name from the first message digest; obtaining an encrypted secrets file from a secrets directory; decrypting the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generating a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; and encrypting communication between the member and the group using an encryption key obtained, at least in part, from the second message digest. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing device for protecting a secrets file comprising:
-
a processor; a memory; and software instructions stored in memory for causing the computing device to; generate, by an n-bit generator, a first secrets file name for the first secrets file, wherein the first secrets file comprises a first secret; generate, by the n-bit generator, a first plurality of decoy file names for a first plurality of decoy files, wherein each of the first plurality of decoy files comprises first decoy file contents, wherein each of the first plurality of decoy files are a same size as the first secrets file, and wherein each of the first plurality of decoy files is associated with a modification time within a range of modification times, wherein a modification time of the first secrets file is within the range of modification times; and store the first secrets file and the first plurality of decoy files in a secrets directory. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A computing device for encrypting communication, comprising:
-
a processor; a memory; and software instructions stored in memory for causing the computing device to; receive a request to communicate with a group; obtain a group agreed connect name corresponding to the group; obtain a username and password of a user of a member of the group; generate a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extract a secrets file name from the first message digest; obtain an encrypted secrets file from a secrets directory; decrypt the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generate a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; and encrypt communication between the member and the group using an encryption key obtained, at least in part, from the second message digest. - View Dependent Claims (26, 27)
-
- 23. The computing device of claim 23, wherein the secrets directory comprises a plurality of decoy files.
-
28. A computer readable medium comprising computer readable program code embodied therein for causing a computer system to perform a method for protecting a first secrets file, the method comprising:
-
generating, by an n-bit generator, a first secrets file name for the first secrets file, wherein the first secrets file comprises a first secret; generating, by the n-bit generator, a first plurality of decoy file names for a first plurality of decoy files, wherein each of the first plurality of decoy files comprises first decoy file contents, wherein each of the first plurality of decoy files are a same size as the first secrets file, and wherein each of the first plurality of decoy files is associated with a modification time within a range of modification times, wherein a modification time of the first secrets file is within the range of modification times; and storing the first secrets file and the first plurality of decoy files in a secrets directory. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A computer readable medium comprising computer readable program code embodied therein for causing a computer system to perform a method for encrypting communication, the method comprising:
-
receiving a request to communicate with a group; obtaining a group agreed connect name corresponding to the group; obtaining a username and password of a user of a member of the group; generating a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extracting a secrets file name from the first message digest; obtaining an encrypted secrets file from a secrets directory; decrypting the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generating a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; and encrypting communication between the member and the group using an encryption key obtained, at least in part, from the second message digest. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification