System and method for protecting secrets file
First Claim
Patent Images
1. A method for encrypting communication, comprising:
- receiving a request to communicate with a group;
obtaining a group agreed connect name corresponding to the group;
obtaining a username and password of a user of a member connecting to the group;
generating a first message digest using the group agreed connect name, the username, the password, and an n-bit generator;
extracting a secrets file name from the first message digest;
obtaining an encrypted secrets file from a secrets directory;
decrypting the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest;
generating a second message digest using the n-bit generator and a first secret and a second secret from the secrets file;
extracting algorithm selector bits from the second message digest;
selecting, from a plurality of encryption algorithms, an encryption algorithm corresponding to the algorithm selector bits; and
encrypting communication between the member and the group using an encryption key obtained, at least in part, from the second message digest,wherein the communication is encrypted using the encryption algorithm.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.
56 Citations
15 Claims
-
1. A method for encrypting communication, comprising:
-
receiving a request to communicate with a group; obtaining a group agreed connect name corresponding to the group; obtaining a username and password of a user of a member connecting to the group; generating a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extracting a secrets file name from the first message digest; obtaining an encrypted secrets file from a secrets directory; decrypting the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generating a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; extracting algorithm selector bits from the second message digest; selecting, from a plurality of encryption algorithms, an encryption algorithm corresponding to the algorithm selector bits; and encrypting communication between the member and the group using an encryption key obtained, at least in part, from the second message digest, wherein the communication is encrypted using the encryption algorithm. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device for encrypting communication, comprising:
-
a processor; a memory; and software instructions stored in memory for causing the computing device to; receive a request to communicate with a group; obtain a group agreed connect name corresponding to the group; obtain a username and password of a user of a member of the group; generate a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extract a secrets file name from the first message digest; obtain an encrypted secrets file from a secrets directory; decrypt the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generate a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; extract algorithm selector bits from the second message digest;
select, from a plurality of encryption algorithms, an encryption algorithm corresponding to the algorithm selector bits; andencrypt communication between the member and the group using an encryption key obtained, at least in part, from the second message digest, wherein the communication is encrypted using the encryption algorithm. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium comprising computer readable program code embodied therein for causing a computer system to perform a method for encrypting communication, the method comprising:
-
receiving a request to communicate with a group; obtaining a group agreed connect name corresponding to the group; obtaining a username and password of a user of a member of the group; generating a first message digest using the group agreed connect name, the username, the password, and an n-bit generator; extracting a secrets file name from the first message digest; obtaining an encrypted secrets file from a secrets directory; decrypting the encrypted secrets file to obtain a secrets file using a secrets file encryption key obtained from the first message digest; generating a second message digest using the n-bit generator and a first secret and a second secret from the secrets file; extracting algorithm selector bits from the second message digest; selecting, from a plurality of encryption algorithms, an encryption algorithm corresponding to the algorithm selector bits; and encrypting communication between the member and the group using an encryption key obtained, at least in part, from the second message digest, wherein the communication is encrypted using the encryption algorithm. - View Dependent Claims (12, 13, 14, 15)
-
Specification