Multi-user secret decay
First Claim
1. A computer-implemented method of proactively modifying secret information in an electronic environment, comprising:
- determining secret information to be used for securing communications between a first device and a second device;
at each of a plurality of times, modifying, by the first device, at least one portion of the secret information according to one or more secret information modification parameters accessible to both of the first device and the second device to generate an updated version of the secret information, the secret information modification parameters specifying a permitted amount of deviation between (i) the secret information determined between the first device and the second device and (ii) the updated version of the secret information generated by the first device; and
sending at least one communication from the first device to the second device, the at least one communication based at least in part on the updated version of the secret information;
wherein the second device receiving the at least one communication is able to determine the updated version of the secret information based at least in part on the permitted amount of deviation specified by the secret information modification parameters accessible to the second device.
1 Assignment
0 Petitions
Accused Products
Abstract
Secret information, such as seeds, codes, and keys, can be automatically renegotiated between at least one sender and at least one recipient. Various mechanisms, such as counters, events, or challenges, can be used to trigger automatic renegotiations through various requests or communications. These changes can cause the current secret information to diverge from older copies of the secret information that might have been obtained by unintended third parties. In some embodiments, a secret can be configured to “decay” over time, or have small changes periodically introduced that can be determined to be valid by an authorized party, but can reduce the effectiveness of prior versions of the secret information.
34 Citations
24 Claims
-
1. A computer-implemented method of proactively modifying secret information in an electronic environment, comprising:
-
determining secret information to be used for securing communications between a first device and a second device; at each of a plurality of times, modifying, by the first device, at least one portion of the secret information according to one or more secret information modification parameters accessible to both of the first device and the second device to generate an updated version of the secret information, the secret information modification parameters specifying a permitted amount of deviation between (i) the secret information determined between the first device and the second device and (ii) the updated version of the secret information generated by the first device; and sending at least one communication from the first device to the second device, the at least one communication based at least in part on the updated version of the secret information; wherein the second device receiving the at least one communication is able to determine the updated version of the secret information based at least in part on the permitted amount of deviation specified by the secret information modification parameters accessible to the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device, comprising:
-
a processor; and a memory device including instructions that, when executed by the processor, cause the computing device to; determine secret information to be used for securing communications between the computing device and a second device; at each of a plurality of times, modify, by the computing device, at least one portion of the secret information according to one or more secret information modification parameters accessible to both of the computing device and the second device to generate an updated version of the secret information, the secret information modification parameters specifying a permitted amount of deviation between (i) the secret information determined between the computing device and the second device and (ii) the updated version of the secret information generated by the computing device; and send at least one communication from the first device to the second device, the at least one communication based at least in part on the updated version of the secret information; wherein the second device receiving the at least one communication is able to determine the updated version of the secret information based at least in part on the updated version of the secret information having a permitted amount of deviation from the determined secret information as specified by the secret information modification parameters accessible to the second device. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium including instructions that, when executed by at least one processor of a computing system, cause the computing system to:
-
determine secret information to be used for securing communications between a first device and a second device; at each of a plurality of times, modify, by the first device, at least one portion of the secret information according to one or more secret information modification parameters accessible to both of the computing device and the second device to generate an updated version of the secret information, the secret information modification parameters specifying a permitted amount of deviation between (i) the secret information determined between the first device and (ii) the second device and the updated version of the secret information generated by the first device; and send at least one communication from the first device to the second device, the at least one communication based at least in part on the updated version of the secret information; wherein the second device receiving the at least one communication is able to determine the updated version of the secret information based at least in part on the updated version of the secret information having a permitted amount of deviation from the determined secret information as specified by the secret information modification parameters accessible to the second device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification