DETECTING POTENTIAL LEGAL DECRYPTION OF HISTORICAL DATA
First Claim
1. A computer-implemented method for detecting potential legal decryption of previously transmitted data, the method comprising:
- receiving, at a client device, a response code from a server indicating that a resource is unavailable for legal reasons during a current connection with the server;
responsive to receiving the response code from the server, checking a log to determine if the client device has previously communicated with the server;
identifying, from the log, a previous connection with the server using a cipher without forward secrecy; and
presenting a message indicating that data from the previous connection could be subject to legal decryption.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods provide for detecting the potential legal decryption of transmitted data. When a device connects to a server over a network, such as the Internet, the device determines whether a cipher without forward secrecy is used. If so, information regarding the connection is stored in a log. When the device subsequently connects to the server and receives a response code indicating that a resource is not available for legal reasons, the device checks the log to determine if the device has previously communicated with the server using a cipher without forward secrecy. Based on the check, the previous connection with the server is identified from the log. A message is presented indicating that data from the previous connection could be subject to legal decryption.
-
Citations
20 Claims
-
1. A computer-implemented method for detecting potential legal decryption of previously transmitted data, the method comprising:
-
receiving, at a client device, a response code from a server indicating that a resource is unavailable for legal reasons during a current connection with the server; responsive to receiving the response code from the server, checking a log to determine if the client device has previously communicated with the server; identifying, from the log, a previous connection with the server using a cipher without forward secrecy; and presenting a message indicating that data from the previous connection could be subject to legal decryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11)
-
-
9. One or more computer storage media storing computer-useable instructions that, when executed by a computing device, causes the computing device to perform operations, the operations comprising:
-
determining a first connection with a server uses a cipher without forward secrecy; responsive to determining the first connection uses the cipher without forward secrecy, logging information regarding the first connection with the server; during a subsequent connection with the server, receiving a response code from the server indicating that a resource is unavailable for legal reasons; responsive to receiving the response code from the server, retrieving at least a portion of the information regarding the first connection with the server; and presenting a message providing the at least a portion of the information regarding the first connection.
-
- 10. The one or more computer storage media of claim 10, wherein the message indicates that data transmitted during the first connection could be subject to legal decryption.
-
15. A computer system comprising:
-
one or more processors; and one or more computer storage media storing computer useable instructions to cause the one or more processors to; determine a first connection with a server uses a cipher without forward secrecy; responsive to determining the first connection uses the cipher without forward secrecy, log information regarding the first connection with the server; during a subsequent connection with the server, receive a response code from the server indicating that a resource is unavailable for legal reasons; responsive to receiving the response code from the server, check a log to determine if the client device has previously communicated with the server; identify, from the log, information regarding the first connection with the server; and present a message indicating that data from the first connection could be subject to legal decryption. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification