US20130034229A1 - System and method for wireless data protection - Google Patents

System and method for wireless data protection Download PDF

Info

Publication number
US20130034229A1
US20130034229A1 US13/204,171 US201113204171A US2013034229A1 US 20130034229 A1 US20130034229 A1 US 20130034229A1 US 201113204171 A US201113204171 A US 201113204171A US 2013034229 A1 US2013034229 A1 US 2013034229A1
Authority
US
United States
Prior art keywords
key
backup
file
keys
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/204,171
Inventor
Conrad Sauerwald
Vrajesh Rajesh Bhavsar
Kenneth Buffalo McNeil
Thomas Brogan Duffy, JR.
Michael Lambertus Hubertus Brouwer
Matthew John Byom
Mitchell David Adler
Eric Brandon Tamura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US13/204,171 priority Critical patent/US20130034229A1/en
Application filed by Apple Inc filed Critical Apple Inc
Assigned to APPLE INC. reassignment APPLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BYOM, Matthew John, MCNEIL, KENNETH BUFFALO, TAMURA, ERIC BRANDON, ADLER, MITCHELL DAVID, BHAVSAR, VRAJESH RAJESH, BROUWER, MICHAEL LAMBERTUS HUBERTUS, DUFFY, THOMAS BROGAN, JR., SAUERWALD, CONRAD
Priority to KR1020147004760A priority patent/KR101588541B1/en
Priority to JP2014524025A priority patent/JP6018200B2/en
Priority to CN201280038007.1A priority patent/CN103748827B/en
Priority to PCT/US2012/048944 priority patent/WO2013022647A2/en
Priority to EP12775334.1A priority patent/EP2730049B1/en
Priority to AU2012294770A priority patent/AU2012294770B2/en
Publication of US20130034229A1 publication Critical patent/US20130034229A1/en
Priority to US14/874,360 priority patent/US9401898B2/en
Priority to AU2016200941A priority patent/AU2016200941B2/en
Priority to US15/217,674 priority patent/US9813389B2/en
Priority to JP2016145458A priority patent/JP6227728B2/en
Priority to AU2018202051A priority patent/AU2018202051A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Definitions

  • the present disclosure relates to wireless data protection and more specifically to protecting cryptographic keys relating to a backup between devices.
  • Mobile communication devices such as phones, PDAs, laptops, and so forth, are a critical aspect of the day-to-day-operations for many users.
  • Mobile devices enable communication in the form of email, text messaging, live chat, voice and video. These devices often store valuable information, such as personal data and confidential corporate data. The amount of information that such devices can store is increasing, as is the importance of the information stored. When a mobile device is lost or destroyed, all of the information stored within the device is also lost.
  • An exemplary backup device manages cryptographic keys by receiving an encrypted file and an encrypted file key at a backup device from a primary device.
  • the system associates the encrypted file key with a set of backup keys and encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys.
  • the backup device stores the encrypted file, the encrypted file key and the set of encrypted backup keys on the backup device for use in restoration.
  • an exemplary system can restore encrypted file data from a backup device to a primary device.
  • a primary device such as a phone or laptop
  • the system can restore the data lost with the device from the backup device to the primary device or to a new device.
  • the approaches set forth herein can assume, when a device is destroyed or lost, that the passwords, keys, or other credentials associated with that device are compromised.
  • the system transmits encrypted file data, an encrypted file key and a set of encrypted backup keys, from the backup device to the primary device.
  • the system creates the set of encrypted backup keys by receiving an encrypted file and an encrypted file key at a backup device and associating the encrypted file key with a set of backup keys. Then the system encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys.
  • the system can backup encryption keys during a password change performed by a user.
  • the system assumes an old password has been compromised and generates an additional set of keys for protecting file keys.
  • the system associates new file encryption keys generated when new files are created with the additional set of backup keys. Then the system encrypts the second set of backup keys with a new password received from the user. In this way, the system backs up encryption keys during a password change.
  • FIG. 1 illustrates an example system embodiment
  • FIG. 2 illustrates asymmetric key cryptography
  • FIG. 3 illustrates symmetric key cryptography
  • FIG. 4 illustrates cipher-block chaining (CBC) mode encryption
  • FIG. 7 illustrates example file key protection utilizing classes
  • FIG. 8 illustrates an exemplary method embodiment for cryptographic key management on a backup device
  • FIG. 9 illustrates exemplary cryptographic key management on a primary device
  • FIG. 10 illustrates exemplary cryptographic key management on a backup device
  • FIG. 11 illustrates a block diagram of backup key set key protection
  • FIG. 12 illustrates an exemplary method embodiment for restoring backup data on a backup device
  • FIG. 13 illustrates an exemplary method embodiment for restoring backup data on a primary device
  • FIG. 14 illustrates an exemplary method embodiment for generating an initialization vector
  • FIG. 15 illustrates an exemplary logic flow for generating an initialization vector
  • FIG. 16 illustrates an exemplary method embodiment for backup key management during a password change
  • FIG. 18 illustrates an exemplary backup key generation process.
  • the present disclosure addresses the need in the art for wireless data protection.
  • a system, method and non-transitory computer-readable media are disclosed which protect wireless data by managing cryptographic keys on a primary device and a backup device, restoring file data from a backup device to a primary device, and generating initialization vectors for use in cryptographic operations and protecting file keys during a password change.
  • FIG. 1 A brief introductory description of a basic general purpose system or computing device in FIG. 1 which can be employed to practice the concepts is disclosed herein. A more detailed description of wireless data protection will then follow. The disclosure now turns to FIG. 1 .
  • an exemplary system 100 includes a general-purpose computing device 100 , including a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including the system memory 130 such as read only memory (ROM) 140 and random access memory (RAM) 150 to the processor 120 .
  • the system 100 can include a cache 122 of high speed memory connected directly with, in close proximity to, or integrated as part of the processor 120 .
  • the system 100 copies data from the memory 130 and/or the storage device 160 to the cache 122 for quick access by the processor 120 . In this way, the cache provides a performance boost that avoids processor 120 delays while waiting for data.
  • These and other modules can control or be configured to control the processor 120 to perform various actions.
  • Other system memory 130 may be available for use as well.
  • the memory 130 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 100 with more than one processor 120 or on a group or cluster of computing devices networked together to provide greater processing capability.
  • the processor 120 can include any general purpose processor and a hardware module or software module, such as module 1 162 , module 2 164 , and module 3 166 stored in storage device 160 , configured to control the processor 120 as well as a special-purpose processor where software instructions are incorporated into the actual processor design.
  • the processor 120 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc.
  • a multi-core processor may be symmetric or asymmetric.
  • the system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • a basic input/output (BIOS) stored in ROM 140 or the like may provide the basic routine that helps to transfer information between elements within the computing device 100 , such as during start-up.
  • the computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like.
  • the storage device 160 can include software modules 162 , 164 , 166 for controlling the processor 120 . Other hardware or software modules are contemplated.
  • the storage device 160 is connected to the system bus 110 by a drive interface.
  • the drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 100 .
  • a hardware module that performs a particular function includes the software component stored in a non-transitory computer-readable medium in connection with the necessary hardware components, such as the processor 120 , bus 110 , display 170 , and so forth, to carry out the function.
  • the basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.
  • Non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth.
  • An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art.
  • multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100 .
  • the communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
  • Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software performing the operations discussed below, and random access memory (RAM) 150 for storing results.
  • DSP digital signal processor
  • ROM read-only memory
  • RAM random access memory
  • VLSI Very large scale integration
  • the logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit, and/or (3) interconnected machine modules or program engines within the programmable circuits.
  • the system 100 shown in FIG. 1 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited non-transitory computer-readable storage media.
  • Such logical operations can be implemented as modules configured to control the processor 120 to perform particular functions according to the programming of the module. For example, FIG.
  • Mod 1 162 , Mod 2 164 and Mod 3 166 which are modules configured to control the processor 120 . These modules may be stored on the storage device 160 and loaded into RAM 150 or memory 130 at runtime or may be stored as would be known in the art in other computer-readable memory locations.
  • Cryptography encompasses both encryption and decryption and is used to hide information such that only the intended recipients of a message have access to the information.
  • Encryption is the process of changing intelligible information in such a way that it appears unintelligible, and decryption is the reverse process, changing unintelligible information back into intelligible information.
  • Encryption and decryption utilize a key that is kept secret to change the information between forms.
  • Two different types of cryptography exist, the traditional symmetric key cryptography and asymmetric (or public-key) cryptography.
  • Public-key cryptography is a cryptographic approach that utilizes asymmetric key algorithms in addition to or in place of traditional symmetric key algorithms.
  • FIG. 2 illustrates asymmetric key cryptography
  • FIG. 3 illustrates symmetric key cryptography.
  • Asymmetric key algorithms differ from symmetric key algorithms in that different keys are used for encryption 210 and decryption 220 .
  • Symmetric key algorithms use the same key for encryption 310 and decryption 320 and are based on the notion of a shared secret key between the sender and the receiver of a message. Because public-key cryptography utilizes different keys for encryption and decryption, no secure exchange of a secret key between the sender and the receiver is needed. Advantages of traditional symmetric key cryptography include speed, because more modern asymmetric key algorithms are slower.
  • a sender encrypts a message with the receiver's public key 210 and an encryption algorithm 230 , and the receiver of the message decrypts the message with the private key 220 and a corresponding encryption (or decryption) algorithm 240 . Only the receiver's private key can decrypt the message encrypted with the receiver's public key. For example, Alice desires to send Bob a message containing personal information and encrypts the message to protect that information.
  • Alice utilizes public key cryptography to send her message because she cannot securely share a cryptographic key with Bob. Alice encrypts the message to Bob with Bob's public key and sends the encrypted message to him. Bob receives the encrypted message and decrypts the message with the corresponding private key related to the asymmetric key pair. In this way, Alice sends Bob an encrypted message via public key cryptography without exchanging cryptographic keys.
  • a block cipher is a cryptographic algorithm that encrypts data block-by-block, in contrast to a stream cipher which encrypts data bit-by-bit.
  • the block cipher algorithm splits input data into blocks and operates on each block of data.
  • Block ciphers can operate in different modes such as electronic code book (ECB) or cipher block chaining (CBC).
  • EBC electronic code book
  • CBC cipher block chaining
  • FIG. 4 illustrates a cipher run in CBC mode.
  • An initialization vector (IV) 410 is combined with the first block of unencrypted bits b 1 420 and the result is encrypted.
  • An initialization vector randomizes unencrypted bits such that if the same block of plaintext is encrypted more than once with the same key, it does not appear as the same ciphertext. Encrypting the same block of plaintext more than once with the same key produces the same ciphertext.
  • Using an IV 410 prevents this undesired effect from occurring.
  • the IV 410 is used for the first block of data because no output from a previous round exists to combine with the first block of unencrypted bits.
  • the encryption algorithm outputs a block of cipher bits cb 1 430 and combines the cipher bits with the next block b 2 440 , which is then encrypted.
  • the system repeats this process until all blocks of data have been encrypted. For decryption, the process is reversed.
  • Each block of cipher bits is decrypted using the block cipher decryption algorithm, and then combined with the cipher bits of the previous block to produce plain (unencrypted) bits.
  • the cipher bits are decrypted and combined with the IV to produce unencrypted data.
  • FIG. 5 illustrates a cipher run in ECB mode.
  • ECB mode the input data is split into blocks of data, which are then encrypted. Unlike CBC mode, there is no combination with output from previous rounds of encryption.
  • the first block of unencrypted bits b 1 510 is used as input to the encryption algorithm, and the algorithm outputs cipher bits cb 1 520 .
  • One problem with ciphers run in ECB mode is that blocks of identical plain bits encrypt to blocks of identical cipher bits because the algorithm uses the same key to encrypt each block.
  • each exemplary method herein is discussed in terms of an exemplary system 100 as shown in FIG. 1 configured to practice the respective method.
  • the steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.
  • FIG. 6 illustrates wireless data protection by managing cryptographic keys on a primary device.
  • a primary device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, personal digital assistant or other stationary or mobile devices capable of storing data. Backup of a primary device is necessary because devices are subject to accidental data deletion, loss, destruction and theft. In the event of data loss, the system can restore data to the same device, a new device of the same type, and/or a device of another type. Protecting the cryptographic keys during a backup event can ensure a secure system.
  • a system practicing the method encrypts a file with a file key, resulting in an encrypted file ( 610 ).
  • the file can contain text, images, video, speech, multimedia, etc.
  • the file key is an encryption key and can be randomly generated.
  • the file key can be a 256-bit AES key or a cryptographic key of any other length for use in any encryption algorithm such as AES, DES, Blowfish, etc.
  • a backup device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, smartphone, personal digital assistant or other stationary or mobile devices capable of storing data.
  • the backup device can store one or more sets of backup keys for any number of devices. For example, a backup server can store five sets of backup keys for a cell phone and two sets of backup keys for a PDA.
  • the class encryption key is a cryptographic key used to encrypt keys of a particular protection class.
  • FIG. 7 illustrates a filesystem that protects file keys according to protection class.
  • the system assigns each respective file to one of a set of protection classes 710 , and assigns each protection class a class encryption key.
  • each class encryption key is unique.
  • the system encrypts each file encryption key with the corresponding class encryption key 720 .
  • File 1 and File 5 are part of protection Class A, but have unique file encryption keys.
  • File 1 is encrypted with Key 1
  • File 5 is encrypted with key 5 . Both key 1 and 5 are encrypted with key A.
  • the protection classes allow certain file behavior and access rights.
  • files labeled readable while locked can be protected by a class encryption key
  • files labeled readable after first unlock can be protected by a different class encryption key and all files created by a particular user can be encrypted by a different class encryption key.
  • Other file labels include writable while locked and readable while unlocked.
  • Files can be classified or labeled in different ways for different security purposes.
  • the classification system can be used to label files requiring different security.
  • class A files can be files that require the highest level of security and the class encryption key that protects the file keys for class A files can be a particularly strong encryption key
  • class B files can be files that require a moderate level of security.
  • the class encryption key that protects the file keys for class B files can be a moderately strong encryption key.
  • FIG. 8 illustrates an exemplary method embodiment for wireless data protection on a backup device.
  • the system manages cryptographic keys on a backup device by receiving an encrypted file and an encrypted file key at a backup device from a primary device ( 810 ).
  • the system associates the encrypted file key with a set of backup keys ( 820 ) and encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys ( 830 ).
  • the backup device stores the encrypted file, the encrypted file key and the set of encrypted backup keys on the backup device ( 840 ).
  • the backup device stores the same encrypted file data as the primary device. However the file key used to encrypt file data is encrypted differently.
  • the file key stored on the primary device is encrypted with a class encryption key, whereas the file key stored on the backup device is encrypted with a public key related to an asymmetric key pair.
  • the primary device 910 transmits the encrypted file data for each of the file 1 , file 2 and file 3 , and each of the respective encrypted file keys k 1 , k 2 and k 3 to the backup device, in this example, a desktop computer.
  • the public keys can be a mirror of the class keys in the system keybag on the device.
  • FIG. 10 illustrates wireless data protection on a backup device.
  • the system stores the corresponding private keys in one or more sets of backup keys 1010 on the backup device.
  • the system stores the set of backup keys 1010 on a desktop computer for safe-keeping.
  • the system then encrypts the set of backup keys 1010 with a backup key set key k b 1020 .
  • FIG. 11 illustrates an exemplary block diagram for backup key set key protection.
  • the system can receive a randomly generated secret from a primary device 1120 , the backup key set key k b 1110 , which the backup device escrows 1130 .
  • Key escrow is the process of providing a cryptographic key to a third party for safe-keeping.
  • the backup device protects the backup key set key with a user password 1140 .
  • the user password can be the same as a user account password already in use in the system.
  • a service provider can reset the user password without updating the encrypted set of keys.
  • a service provider can protect the backup key set key with the new user password so the user can access the set of backup keys by providing the new user password.
  • a backup device can encrypt the backup key set key in any way because it is escrowing the key.
  • the user can choose to protect the set of backup keys such that the backup key set key is unrecoverable by a service provider.
  • the user can provide a separate backup password 1150 that is used to generate the backup key set key 1160 . In this case, if a user forgets their password, the service provider cannot recover the backup key set key.
  • the device can generate a random backup key-bag secret and escrow that backup key-bag secret with the server.
  • the server protects this secret with the user's regular account password, but it is not encrypted with that password.
  • the server can encrypt the secret in any manner it chooses as part of escrowing the secret. Because the account password is recoverable, the backup key-bag secret is also recoverable.
  • a separate random backup key-bag secret allows the account password to change without the need to update the encrypted key-bag.
  • the user can specify a separate backup password.
  • the device generates a backup key-bag secret based on that password, but does not escrow that secret with the server. The user re-enters this separate backup password when restoring, and there is no way to recover this password, resulting in an unrecoverable password.
  • FIG. 12 illustrates an exemplary method embodiment for restoring encrypted file data from a backup device to a primary device.
  • a primary device can be the same device from which the backup was performed or a different device. For example, if a user accidentally deletes data from their phone, the user can restore the lost data up to the point of the last backup of the phone. Alternately, if a user's phone is stolen, a user can purchase a new phone and restore the lost data up to the point of the last backup from the user's original device on the new phone.
  • a system practicing the method transmits encrypted file data, an encrypted file key and a set of encrypted backup keys, from the backup device to the primary device ( 1200 ).
  • the set of encrypted backup keys are generated by the system or by another device or collection of devices which receive an encrypted file and an encrypted file key at a backup device ( 1210 ), associate the encrypted file key with a set of backup keys ( 1220 ) and encrypt the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys ( 1230 ).
  • FIG. 13 illustrates an exemplary method embodiment for restoring encrypted file data on a primary device.
  • a system practicing the method receives encrypted file data, an encrypted file key and a set of encrypted backup keys, at the primary device ( 1310 ). The system decrypts the set of encrypted backup keys with a backup key set key, resulting in a set of backup keys ( 1320 ). Once the set of backup keys is decrypted, the system decrypts the encrypted file key with a backup key from the set of backup keys, resulting in a file key ( 1330 ). The file key is used to decrypt the encrypted file data to yield file data ( 1340 ) and the system stores the decrypted file data on the primary device ( 1350 ).
  • the system can generate an initialization vector for use in cryptographic operations.
  • An initialization vector (IV) is used during the CBC mode of encryption to add variation to the data.
  • FIG. 14 illustrates an exemplary method embodiment for generating an initialization vector.
  • the system performs a cryptographic hash of a first encryption key, the file key, to produce a first intermediate result ( 1410 ).
  • the file key is an encryption key and can be randomly generated.
  • the file key can be a 256-bit AES key or a cryptographic key of any other length for use in any encryption algorithm such as AES, DES, Blowfish, etc.
  • the system truncates the first intermediate result to produce a second intermediate result ( 1420 ) and generates a third intermediate result utilizing a function of a block offset ( 1430 ).
  • the system truncates the first intermediate result, a hash of the file encryption key, to an encryption key size appropriate for a particular cryptographic algorithm such as 16 bytes, or any other size.
  • a function of a block offset can be a linear feedback shift register (LFSR) or any other function utilizing the block offset.
  • the block offset is an index into the data, indicating a block number.
  • the system encrypts the third intermediate result with the second intermediate result to yield an IV for use in encryption and decryption ( 1440 ).
  • the encryption algorithm used to encrypt the third intermediate result with the second intermediate result can be any encryption algorithm such as DES or other suitable symmetric encryption algorithm.
  • FIG. 15 illustrates an example logical flow for an iterative approach for generating an IV for use in cryptographic operations.
  • the system When encrypting file data, the system generates an IV for each block of data in the file. For instance, for a file with size 2 MB, the system can split the file into 500 blocks of size 4 KB. For each of the 500 blocks, the system generates an IV for use in encryption and decryption. First, the system checks if the current block is the last block in the file 1510 . If the current block is the last block, then the system exits the IV generation routine. If it is not the last block, the system continues with the IV generation routine.
  • the system generates the 20-byte k iv by performing a hash utilizing the SHA-1 encryption algorithm and the per file key, k f as input 1520 .
  • the intermediate result k iv is truncated to 16 bytes to produce the intermediate result k t 1530 .
  • the truncation size is an encryption key size and can be any size required by a specific encryption algorithm such 8, 12 or 16 bytes or any number of bytes.
  • the block offset into the file is used as input to a LFSR to produce a pseudorandom value rand 1540 .
  • a LFSR is a shift register whose feedback bit is a linear combination of preceding bits.
  • a shift register is a function that operates on data bit by bit, outputting one bit at a time. After the function outputs a bit, all of the bits are shifted one location in the register and a new bit is computed based on the preceding bits. The process repeats until the desired number of bits is output from the function.
  • the register has a finite number of states, and eventually enters a repeating cycle of output bits. Because of the repeating nature of LFSRs, they are not truly random. Software and/or hardware LFSRs can generate the pseudo-random numbers.
  • the variable rand is generated by applying a LFSR to the block offset 1540 . After the system generates rand, the system encrypts the output from the LFSR, rand 1550 with the intermediate result k t , and outputs the IV for the current block 1560 . The system returns to checking if the current block is the last block in the file 1510 . If it is the last block, the system exits after generating all the necessary IVs. If not, the system continues generating IVs for the remaining data blocks in the file.
  • the file key is used to generate the IV in such a way that if an attacker gains access to the IV, he cannot gain access to the file key.
  • One of the benefits of computing an IV in the disclosed manner is that the IV is not tied to the device it is stored on. Alternate methods of generating an IV exist that tie the IV to the device it was generated on. These methods are sufficient when data is restored to the original device, however they are not sufficient when backed up data is restored to a new device as is the case when a device is stolen or destroyed. The disclosed methods provide for data restoration to a different device.
  • FIG. 16 illustrates an exemplary method embodiment for changing a user password.
  • the system can assume that the old password has been compromised and is no longer trusted to protect a set of backup keys.
  • the change of passwords can be a mandatory event, such as when a device is lost or destroyed, or can be a voluntary, user-initiated event.
  • the system creates a second set of backup keys ( 1610 ) on the backup device.
  • the system associates new file encryption keys with the second set of backup keys on the backup device ( 1620 ).
  • the system generates new file encryption keys when a new file is created. After the user password change, any new file keys generated for newly created files are associated with the second set of backup keys.
  • the system encrypts the second set of backup keys ultimately with the new user password ( 1630 ).
  • the system can generate a random secret and protects the random secret with the new user password.
  • a backup system can contain any number of sets of backup keys.
  • the backup key-bag secret can be derived from the password case instead of being randomly generated.
  • the file keys can be stored in the key-sets, encrypted by the keys in the key-sets, and stored in the file metadata.
  • FIG. 17 illustrates an exemplary architecture for changing a user password.
  • the backup set of keys 1710 Prior to a password change, the backup set of keys 1710 is protected by a key bk 1 derived from a user password.
  • the set of backup keys protected in the first set of keys is k 1 , k 2 and k 3 . These keys encrypt the file keys for file 1 , file 2 and file 3 , respectively that are stored on a primary device, such as a cell phone.
  • the system creates a new set of backup keys on the backup device and stores newly created backup keys in the new set. For example, the system creates file 4 and file 5 and stores the newly generated encryption keys k 4 and k 5 that protect the file keys in the new set of backup keys.
  • the file keys for file 4 and file 5 are encrypted by the encryption keys k 4 and k 5 respectively and stored in the corresponding file metadata.
  • the system derives a new backup key set key bk 2 1720 from the new password to protect the new set of backup keys.
  • the system can generate any number of backup key sets for any number of password changes. Each time a user changes his password, the system creates an additional backup key set on the backup device and protects the new set with a key derived from the new user password. In this way, the system protects the set of backup keys stored on another device during a password change.
  • raw access of encrypted data is enabled by bypassing the buffer cache.
  • a cache stores data such that requests for data can be accomplished faster than fetching data from disk each time it is needed.
  • the buffer cache is bypassed so that the system can access encrypted data from the disk without decrypting the data.
  • the filesystem access layer can automatically decrypt the data.
  • FIG. 18 illustrates the backup key generation process.
  • a system can unlock a primary device and create a new class A file and a random per file encryption key ( 1810 ).
  • the system can encrypt the per file key with the device key ( 1820 ).
  • the system can generate an ephemeral public/private key pair ( 1830 ), which can be used more than once in a single session instead of generating a new public/private key pair for each file.
  • the system can generate a wrapping key to protect the per file key for the backup device ( 1840 ) using a key exchange between an ephemeral key and the backup keyset key.
  • the system encrypts the per file encryption key with the wrapping key ( 1850 ) for storage on the backup device.
  • the wrapping key and the ephemeral public/private key pair can be reused. This process avoids the expensive generation and key exchange to get a new ephemeral key pair and wrapping key for each file.
  • the disclosed method applies to file keys in the same class, in the provided example class A, for the duration of time the device is unlocked without the loss of security.
  • Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon.
  • Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above.
  • non-transitory computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design.
  • Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
  • Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments.
  • program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types.
  • Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
  • Embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.

Abstract

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.

Description

    BACKGROUND
  • 1. Technical Field
  • The present disclosure relates to wireless data protection and more specifically to protecting cryptographic keys relating to a backup between devices.
  • 2. Introduction
  • Mobile communication devices, such as phones, PDAs, laptops, and so forth, are a critical aspect of the day-to-day-operations for many users. Mobile devices enable communication in the form of email, text messaging, live chat, voice and video. These devices often store valuable information, such as personal data and confidential corporate data. The amount of information that such devices can store is increasing, as is the importance of the information stored. When a mobile device is lost or destroyed, all of the information stored within the device is also lost.
  • Some computing systems employ backup mechanisms such that in the event of loss or destruction of the computing system, at least some data is recoverable. The backup mechanism usually involves copying all or part of a file to a backup system for storage. Optionally, backup systems store incremental backups for a file previously backed up such that only data that has changed is sent to the backup system.
  • Mobile device backup mechanisms exist that regularly and automatically backup data stored on a mobile device. These mechanisms can backup data to other devices or computing systems such as phones, laptop computers, desktop computers and servers and are sufficient when data on a mobile device is accessible. However, when the data is inaccessible, such as when a mobile device is locked, the backup mechanism cannot backup the data because it does not have access to the user passcode to unlock the device. One method to overcome this weakness is for a backup mechanism to only perform backups when the device is unlocked. This method provides a means for backup, but cannot backup more recent data stored on the device since the last unlock event. Another solution is for a user to unlock a mobile device to perform a backup. However this method requires input from the user.
  • SUMMARY
  • Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.
  • Disclosed are systems, methods, and non-transitory computer-readable storage media for protecting cryptographic keys during a backup between a primary device and a backup device. A primary device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, smart phone, personal digital assistant or other stationary or mobile devices capable of storing data. Likewise, a backup device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, personal digital assistant or other stationary or mobile devices capable of storing data. An exemplary system manages cryptographic keys on a primary device by encrypting a file with a file key, resulting in an encrypted file. The system encrypts the file key with a class encryption key, resulting in an encrypted file key. The class encryption key protects the file key according to the class of which the file is a member. After the system encrypts the file key with the class encryption key, the system encrypts the file key a second time, using a public key associated with a set of backup keys, resulting in a second encrypted file key. The system then transmits the encrypted file and the second encrypted file key to a backup device. The first encrypted file key is stored on the primary device.
  • An exemplary backup device manages cryptographic keys by receiving an encrypted file and an encrypted file key at a backup device from a primary device. The system associates the encrypted file key with a set of backup keys and encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys. The backup device stores the encrypted file, the encrypted file key and the set of encrypted backup keys on the backup device for use in restoration.
  • In a backup restoration embodiment, an exemplary system can restore encrypted file data from a backup device to a primary device. When a primary device such as a phone or laptop is destroyed or lost, the system can restore the data lost with the device from the backup device to the primary device or to a new device. The approaches set forth herein can assume, when a device is destroyed or lost, that the passwords, keys, or other credentials associated with that device are compromised. The system transmits encrypted file data, an encrypted file key and a set of encrypted backup keys, from the backup device to the primary device. The system creates the set of encrypted backup keys by receiving an encrypted file and an encrypted file key at a backup device and associating the encrypted file key with a set of backup keys. Then the system encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys.
  • During data restoration, at the primary device, the system receives encrypted file data, an encrypted file key and a set of encrypted backup keys from the backup device. The system decrypts the set of encrypted backup keys with a backup key set key resulting in a set of decrypted backup keys. Then the system decrypts the encrypted file key with a backup key, resulting in a decrypted file key. The encrypted file data is decrypted with the decrypted file key resulting in decrypted file data. Then the system stores the file data on the primary device.
  • In another embodiment, a system managing cryptographic keys can generate an initialization vector for use in a cryptographic operation. The system performs a cryptographic hash on a file encryption key and truncates the resulting hash to an encryption key size. The system then generates an intermediate result utilizing a linear feedback shift register with a block offset as the seed. The intermediate result is encrypted with the truncated hash of the file encryption key, resulting in an initialization vector. The initialization vector is utilized during encryption and decryption with a block cipher algorithm run in cipher block chaining mode. The initialization vector initializes the block cipher algorithm.
  • Additionally, the system can backup encryption keys during a password change performed by a user. The system assumes an old password has been compromised and generates an additional set of keys for protecting file keys. The system associates new file encryption keys generated when new files are created with the additional set of backup keys. Then the system encrypts the second set of backup keys with a new password received from the user. In this way, the system backs up encryption keys during a password change.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
  • FIG. 1 illustrates an example system embodiment;
  • FIG. 2 illustrates asymmetric key cryptography;
  • FIG. 3 illustrates symmetric key cryptography;
  • FIG. 4 illustrates cipher-block chaining (CBC) mode encryption;
  • FIG. 5 illustrates electronic codebook (ECB) mode encryption;
  • FIG. 6 illustrates an exemplary method embodiment for cryptographic key management on a primary device;
  • FIG. 7 illustrates example file key protection utilizing classes;
  • FIG. 8 illustrates an exemplary method embodiment for cryptographic key management on a backup device;
  • FIG. 9 illustrates exemplary cryptographic key management on a primary device;
  • FIG. 10 illustrates exemplary cryptographic key management on a backup device;
  • FIG. 11 illustrates a block diagram of backup key set key protection;
  • FIG. 12 illustrates an exemplary method embodiment for restoring backup data on a backup device;
  • FIG. 13 illustrates an exemplary method embodiment for restoring backup data on a primary device;
  • FIG. 14 illustrates an exemplary method embodiment for generating an initialization vector;
  • FIG. 15 illustrates an exemplary logic flow for generating an initialization vector;
  • FIG. 16 illustrates an exemplary method embodiment for backup key management during a password change;
  • FIG. 17 illustrates an example architecture for backup key management during a password change; and
  • FIG. 18 illustrates an exemplary backup key generation process.
  • DETAILED DESCRIPTION
  • Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.
  • The present disclosure addresses the need in the art for wireless data protection. A system, method and non-transitory computer-readable media are disclosed which protect wireless data by managing cryptographic keys on a primary device and a backup device, restoring file data from a backup device to a primary device, and generating initialization vectors for use in cryptographic operations and protecting file keys during a password change. A brief introductory description of a basic general purpose system or computing device in FIG. 1 which can be employed to practice the concepts is disclosed herein. A more detailed description of wireless data protection will then follow. The disclosure now turns to FIG. 1.
  • With reference to FIG. 1, an exemplary system 100 includes a general-purpose computing device 100, including a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including the system memory 130 such as read only memory (ROM) 140 and random access memory (RAM) 150 to the processor 120. The system 100 can include a cache 122 of high speed memory connected directly with, in close proximity to, or integrated as part of the processor 120. The system 100 copies data from the memory 130 and/or the storage device 160 to the cache 122 for quick access by the processor 120. In this way, the cache provides a performance boost that avoids processor 120 delays while waiting for data. These and other modules can control or be configured to control the processor 120 to perform various actions. Other system memory 130 may be available for use as well. The memory 130 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 100 with more than one processor 120 or on a group or cluster of computing devices networked together to provide greater processing capability. The processor 120 can include any general purpose processor and a hardware module or software module, such as module 1 162, module 2 164, and module 3 166 stored in storage device 160, configured to control the processor 120 as well as a special-purpose processor where software instructions are incorporated into the actual processor design. The processor 120 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric.
  • The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. Other hardware or software modules are contemplated. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a non-transitory computer-readable medium in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out the function. The basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.
  • Although the exemplary embodiment described herein employs the hard disk 160, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
  • For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in FIG. 1 may be provided by a single shared processor or multiple processors. (Use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software.) Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software performing the operations discussed below, and random access memory (RAM) 150 for storing results. Very large scale integration (VLSI) hardware embodiments, as well as custom VLSI circuitry in combination with a general purpose DSP circuit, may also be provided.
  • The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit, and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in FIG. 1 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited non-transitory computer-readable storage media. Such logical operations can be implemented as modules configured to control the processor 120 to perform particular functions according to the programming of the module. For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 and Mod3 166 which are modules configured to control the processor 120. These modules may be stored on the storage device 160 and loaded into RAM 150 or memory 130 at runtime or may be stored as would be known in the art in other computer-readable memory locations.
  • Cryptography Discussion
  • Having disclosed some components of a computing system, the disclosure now turns to a brief discussion of cryptography. Cryptography encompasses both encryption and decryption and is used to hide information such that only the intended recipients of a message have access to the information. Encryption is the process of changing intelligible information in such a way that it appears unintelligible, and decryption is the reverse process, changing unintelligible information back into intelligible information. Encryption and decryption utilize a key that is kept secret to change the information between forms. Two different types of cryptography exist, the traditional symmetric key cryptography and asymmetric (or public-key) cryptography.
  • Public-key cryptography is a cryptographic approach that utilizes asymmetric key algorithms in addition to or in place of traditional symmetric key algorithms. FIG. 2 illustrates asymmetric key cryptography and FIG. 3 illustrates symmetric key cryptography. Asymmetric key algorithms differ from symmetric key algorithms in that different keys are used for encryption 210 and decryption 220. Symmetric key algorithms use the same key for encryption 310 and decryption 320 and are based on the notion of a shared secret key between the sender and the receiver of a message. Because public-key cryptography utilizes different keys for encryption and decryption, no secure exchange of a secret key between the sender and the receiver is needed. Advantages of traditional symmetric key cryptography include speed, because more modern asymmetric key algorithms are slower.
  • In public-key cryptography, a mathematically related key pair is generated, a private key and a public key. Although the keys are related, it is impractical to derive one key based on the other. The private key is kept secret and the public key is published. A sender encrypts a message with the receiver's public key 210 and an encryption algorithm 230, and the receiver of the message decrypts the message with the private key 220 and a corresponding encryption (or decryption) algorithm 240. Only the receiver's private key can decrypt the message encrypted with the receiver's public key. For example, Alice desires to send Bob a message containing personal information and encrypts the message to protect that information. Alice utilizes public key cryptography to send her message because she cannot securely share a cryptographic key with Bob. Alice encrypts the message to Bob with Bob's public key and sends the encrypted message to him. Bob receives the encrypted message and decrypts the message with the corresponding private key related to the asymmetric key pair. In this way, Alice sends Bob an encrypted message via public key cryptography without exchanging cryptographic keys.
  • Having discussed asymmetric and symmetric key cryptography, the disclosure now turns to a discussion of block ciphers. A block cipher is a cryptographic algorithm that encrypts data block-by-block, in contrast to a stream cipher which encrypts data bit-by-bit. The block cipher algorithm splits input data into blocks and operates on each block of data. Block ciphers can operate in different modes such as electronic code book (ECB) or cipher block chaining (CBC).
  • In CBC mode, the output from one block of encryption is used as input to the next encryption operation. FIG. 4 illustrates a cipher run in CBC mode. An initialization vector (IV) 410 is combined with the first block of unencrypted bits b1 420 and the result is encrypted. An initialization vector randomizes unencrypted bits such that if the same block of plaintext is encrypted more than once with the same key, it does not appear as the same ciphertext. Encrypting the same block of plaintext more than once with the same key produces the same ciphertext. Using an IV 410 prevents this undesired effect from occurring. The IV 410 is used for the first block of data because no output from a previous round exists to combine with the first block of unencrypted bits. The encryption algorithm outputs a block of cipher bits cb1 430 and combines the cipher bits with the next block b 2 440, which is then encrypted. The system repeats this process until all blocks of data have been encrypted. For decryption, the process is reversed. Each block of cipher bits is decrypted using the block cipher decryption algorithm, and then combined with the cipher bits of the previous block to produce plain (unencrypted) bits. For the first block, the cipher bits are decrypted and combined with the IV to produce unencrypted data.
  • FIG. 5 illustrates a cipher run in ECB mode. In ECB mode, the input data is split into blocks of data, which are then encrypted. Unlike CBC mode, there is no combination with output from previous rounds of encryption. The first block of unencrypted bits b 1 510 is used as input to the encryption algorithm, and the algorithm outputs cipher bits cb 1 520. One problem with ciphers run in ECB mode is that blocks of identical plain bits encrypt to blocks of identical cipher bits because the algorithm uses the same key to encrypt each block.
  • Having disclosed some system components and encryption concepts, the disclosure now turns to the exemplary method embodiment shown in FIG. 6. For the sake of clarity, each exemplary method herein is discussed in terms of an exemplary system 100 as shown in FIG. 1 configured to practice the respective method. The steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.
  • FIG. 6 illustrates wireless data protection by managing cryptographic keys on a primary device. A primary device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, personal digital assistant or other stationary or mobile devices capable of storing data. Backup of a primary device is necessary because devices are subject to accidental data deletion, loss, destruction and theft. In the event of data loss, the system can restore data to the same device, a new device of the same type, and/or a device of another type. Protecting the cryptographic keys during a backup event can ensure a secure system. A system practicing the method encrypts a file with a file key, resulting in an encrypted file (610). The file can contain text, images, video, speech, multimedia, etc. and can be in any format such as PNG, JPG, AVI, and HTML. The concept of a file key can be extended to cover data not stored in files, such as a memory segment or set of instructions, however the principles herein are discussed in terms of files. The file key is an encryption key and can be randomly generated. The file key can be a 256-bit AES key or a cryptographic key of any other length for use in any encryption algorithm such as AES, DES, Blowfish, etc. After the system encrypts the file with the file key, the system encrypts the file key with a class encryption key, resulting in an encrypted file key (620).
  • After the system encrypts the file key with a class encryption key, the system encrypts the file key with a public key associated with a set of backup keys resulting in a second encrypted file key (630). The public key can belong to an asymmetric key pair, and the respective private key is stored on a backup device. Then, the system transmits the encrypted file and the second encrypted file key to a backup device (640). A backup device can be any computing device such as a personal computer, laptop, workstation on a network, server, cell phone, smartphone, personal digital assistant or other stationary or mobile devices capable of storing data. The backup device can store one or more sets of backup keys for any number of devices. For example, a backup server can store five sets of backup keys for a cell phone and two sets of backup keys for a PDA.
  • The class encryption key is a cryptographic key used to encrypt keys of a particular protection class. FIG. 7 illustrates a filesystem that protects file keys according to protection class. The system assigns each respective file to one of a set of protection classes 710, and assigns each protection class a class encryption key. In one aspect, each class encryption key is unique. The system encrypts each file encryption key with the corresponding class encryption key 720. For example, File 1 and File 5 are part of protection Class A, but have unique file encryption keys. File 1 is encrypted with Key 1, while File 5 is encrypted with key 5. Both key 1 and 5 are encrypted with key A. The protection classes allow certain file behavior and access rights. For example, files labeled readable while locked can be protected by a class encryption key, files labeled readable after first unlock can be protected by a different class encryption key and all files created by a particular user can be encrypted by a different class encryption key. Other file labels include writable while locked and readable while unlocked. Files can be classified or labeled in different ways for different security purposes. For instance, the classification system can be used to label files requiring different security. For example, class A files can be files that require the highest level of security and the class encryption key that protects the file keys for class A files can be a particularly strong encryption key, whereas class B files can be files that require a moderate level of security. The class encryption key that protects the file keys for class B files can be a moderately strong encryption key. This tiered approach to file or credential access through protection classes allows the system to protect files differently depending on the desired level of security.
  • FIG. 8 illustrates an exemplary method embodiment for wireless data protection on a backup device. The system manages cryptographic keys on a backup device by receiving an encrypted file and an encrypted file key at a backup device from a primary device (810). The system associates the encrypted file key with a set of backup keys (820) and encrypts the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys (830). The backup device stores the encrypted file, the encrypted file key and the set of encrypted backup keys on the backup device (840). The backup device stores the same encrypted file data as the primary device. However the file key used to encrypt file data is encrypted differently. The file key stored on the primary device is encrypted with a class encryption key, whereas the file key stored on the backup device is encrypted with a public key related to an asymmetric key pair.
  • FIG. 9 illustrates wireless data protection utilizing cryptographic key management on a primary device. The system stores file 1, file 2 and file 3 on a primary device, in this example, a cell phone 910. Each of the files is encrypted with a separate corresponding file encryption key, k1, k2 and k 3 920. Each of the file encryption keys k1, k2 and k3 are encrypted with a respective public key, pk1, pk2 and pk 3 930 associated with a backup key set. The primary device 910 transmits the encrypted file data for each of the file 1, file 2 and file 3, and each of the respective encrypted file keys k1, k2 and k3 to the backup device, in this example, a desktop computer. The public keys can be a mirror of the class keys in the system keybag on the device.
  • FIG. 10 illustrates wireless data protection on a backup device. The system stores the corresponding private keys in one or more sets of backup keys 1010 on the backup device. For example, the system stores the set of backup keys 1010 on a desktop computer for safe-keeping. The system then encrypts the set of backup keys 1010 with a backup key set key k b 1020. FIG. 11 illustrates an exemplary block diagram for backup key set key protection. The system can receive a randomly generated secret from a primary device 1120, the backup key set key k b 1110, which the backup device escrows 1130. Key escrow is the process of providing a cryptographic key to a third party for safe-keeping. The backup device protects the backup key set key with a user password 1140. The user password can be the same as a user account password already in use in the system. In this case, if a user forgets their password, a service provider can reset the user password without updating the encrypted set of keys. A service provider can protect the backup key set key with the new user password so the user can access the set of backup keys by providing the new user password. Additionally, a backup device can encrypt the backup key set key in any way because it is escrowing the key. Optionally, the user can choose to protect the set of backup keys such that the backup key set key is unrecoverable by a service provider. The user can provide a separate backup password 1150 that is used to generate the backup key set key 1160. In this case, if a user forgets their password, the service provider cannot recover the backup key set key.
  • Some implementations offer two levels of protection for the backup key-bag on the server. For example, the device can generate a random backup key-bag secret and escrow that backup key-bag secret with the server. The server protects this secret with the user's regular account password, but it is not encrypted with that password. The server can encrypt the secret in any manner it chooses as part of escrowing the secret. Because the account password is recoverable, the backup key-bag secret is also recoverable. A separate random backup key-bag secret allows the account password to change without the need to update the encrypted key-bag.
  • In another example, the user can specify a separate backup password. The device generates a backup key-bag secret based on that password, but does not escrow that secret with the server. The user re-enters this separate backup password when restoring, and there is no way to recover this password, resulting in an unrecoverable password.
  • FIG. 12 illustrates an exemplary method embodiment for restoring encrypted file data from a backup device to a primary device. A primary device can be the same device from which the backup was performed or a different device. For example, if a user accidentally deletes data from their phone, the user can restore the lost data up to the point of the last backup of the phone. Alternately, if a user's phone is stolen, a user can purchase a new phone and restore the lost data up to the point of the last backup from the user's original device on the new phone. A system practicing the method transmits encrypted file data, an encrypted file key and a set of encrypted backup keys, from the backup device to the primary device (1200). The set of encrypted backup keys are generated by the system or by another device or collection of devices which receive an encrypted file and an encrypted file key at a backup device (1210), associate the encrypted file key with a set of backup keys (1220) and encrypt the set of backup keys with a backup key set key, resulting in an encrypted set of backup keys (1230).
  • FIG. 13 illustrates an exemplary method embodiment for restoring encrypted file data on a primary device. A system practicing the method receives encrypted file data, an encrypted file key and a set of encrypted backup keys, at the primary device (1310). The system decrypts the set of encrypted backup keys with a backup key set key, resulting in a set of backup keys (1320). Once the set of backup keys is decrypted, the system decrypts the encrypted file key with a backup key from the set of backup keys, resulting in a file key (1330). The file key is used to decrypt the encrypted file data to yield file data (1340) and the system stores the decrypted file data on the primary device (1350).
  • Initialization Vector Generation
  • The system can generate an initialization vector for use in cryptographic operations. An initialization vector (IV) is used during the CBC mode of encryption to add variation to the data. FIG. 14 illustrates an exemplary method embodiment for generating an initialization vector. The system performs a cryptographic hash of a first encryption key, the file key, to produce a first intermediate result (1410). The file key is an encryption key and can be randomly generated. The file key can be a 256-bit AES key or a cryptographic key of any other length for use in any encryption algorithm such as AES, DES, Blowfish, etc. Next, the system truncates the first intermediate result to produce a second intermediate result (1420) and generates a third intermediate result utilizing a function of a block offset (1430). The system truncates the first intermediate result, a hash of the file encryption key, to an encryption key size appropriate for a particular cryptographic algorithm such as 16 bytes, or any other size. A function of a block offset can be a linear feedback shift register (LFSR) or any other function utilizing the block offset. The block offset is an index into the data, indicating a block number. Lastly, the system encrypts the third intermediate result with the second intermediate result to yield an IV for use in encryption and decryption (1440). The encryption algorithm used to encrypt the third intermediate result with the second intermediate result can be any encryption algorithm such as DES or other suitable symmetric encryption algorithm.
  • FIG. 15 illustrates an example logical flow for an iterative approach for generating an IV for use in cryptographic operations. When encrypting file data, the system generates an IV for each block of data in the file. For instance, for a file with size 2 MB, the system can split the file into 500 blocks of size 4 KB. For each of the 500 blocks, the system generates an IV for use in encryption and decryption. First, the system checks if the current block is the last block in the file 1510. If the current block is the last block, then the system exits the IV generation routine. If it is not the last block, the system continues with the IV generation routine. The system generates the 20-byte kiv by performing a hash utilizing the SHA-1 encryption algorithm and the per file key, kf as input 1520. The intermediate result kiv is truncated to 16 bytes to produce the intermediate result k t 1530. The truncation size is an encryption key size and can be any size required by a specific encryption algorithm such 8, 12 or 16 bytes or any number of bytes. At this point, the block offset into the file is used as input to a LFSR to produce a pseudorandom value rand 1540.
  • A LFSR is a shift register whose feedback bit is a linear combination of preceding bits. A shift register is a function that operates on data bit by bit, outputting one bit at a time. After the function outputs a bit, all of the bits are shifted one location in the register and a new bit is computed based on the preceding bits. The process repeats until the desired number of bits is output from the function. The register has a finite number of states, and eventually enters a repeating cycle of output bits. Because of the repeating nature of LFSRs, they are not truly random. Software and/or hardware LFSRs can generate the pseudo-random numbers.
  • The variable rand is generated by applying a LFSR to the block offset 1540. After the system generates rand, the system encrypts the output from the LFSR, rand 1550 with the intermediate result kt, and outputs the IV for the current block 1560. The system returns to checking if the current block is the last block in the file 1510. If it is the last block, the system exits after generating all the necessary IVs. If not, the system continues generating IVs for the remaining data blocks in the file.
  • The file key is used to generate the IV in such a way that if an attacker gains access to the IV, he cannot gain access to the file key. One of the benefits of computing an IV in the disclosed manner is that the IV is not tied to the device it is stored on. Alternate methods of generating an IV exist that tie the IV to the device it was generated on. These methods are sufficient when data is restored to the original device, however they are not sufficient when backed up data is restored to a new device as is the case when a device is stolen or destroyed. The disclosed methods provide for data restoration to a different device.
  • Changing a User Password with a Backup Process Enabled
  • FIG. 16 illustrates an exemplary method embodiment for changing a user password. When a user changes his password, the system can assume that the old password has been compromised and is no longer trusted to protect a set of backup keys. The change of passwords can be a mandatory event, such as when a device is lost or destroyed, or can be a voluntary, user-initiated event. When the user changes his password and a backup process is enabled, the system creates a second set of backup keys (1610) on the backup device. The system associates new file encryption keys with the second set of backup keys on the backup device (1620). The system generates new file encryption keys when a new file is created. After the user password change, any new file keys generated for newly created files are associated with the second set of backup keys. The system encrypts the second set of backup keys ultimately with the new user password (1630). The system can generate a random secret and protects the random secret with the new user password. A backup system can contain any number of sets of backup keys. The backup key-bag secret can be derived from the password case instead of being randomly generated. The file keys can be stored in the key-sets, encrypted by the keys in the key-sets, and stored in the file metadata.
  • FIG. 17 illustrates an exemplary architecture for changing a user password. Prior to a password change, the backup set of keys 1710 is protected by a key bk1 derived from a user password. The set of backup keys protected in the first set of keys is k1, k2 and k3. These keys encrypt the file keys for file 1, file 2 and file 3, respectively that are stored on a primary device, such as a cell phone. After the password change, the system creates a new set of backup keys on the backup device and stores newly created backup keys in the new set. For example, the system creates file 4 and file 5 and stores the newly generated encryption keys k4 and k5 that protect the file keys in the new set of backup keys. The file keys for file 4 and file 5 are encrypted by the encryption keys k4 and k5 respectively and stored in the corresponding file metadata. The system derives a new backup key set key bk2 1720 from the new password to protect the new set of backup keys. The system can generate any number of backup key sets for any number of password changes. Each time a user changes his password, the system creates an additional backup key set on the backup device and protects the new set with a key derived from the new user password. In this way, the system protects the set of backup keys stored on another device during a password change.
  • In one embodiment, raw access of encrypted data is enabled by bypassing the buffer cache. A cache stores data such that requests for data can be accomplished faster than fetching data from disk each time it is needed. The buffer cache is bypassed so that the system can access encrypted data from the disk without decrypting the data. When accessing the filesystem in a normal manner, the filesystem access layer can automatically decrypt the data.
  • In another embodiment, an efficient method of generating a backup key based on a per file key stored on a backup device is disclosed. FIG. 18 illustrates the backup key generation process. For example, a system can unlock a primary device and create a new class A file and a random per file encryption key (1810). The system can encrypt the per file key with the device key (1820). The system can generate an ephemeral public/private key pair (1830), which can be used more than once in a single session instead of generating a new public/private key pair for each file. The system can generate a wrapping key to protect the per file key for the backup device (1840) using a key exchange between an ephemeral key and the backup keyset key. Finally, the system encrypts the per file encryption key with the wrapping key (1850) for storage on the backup device. For the duration of time the device is unlocked, the wrapping key and the ephemeral public/private key pair can be reused. This process avoids the expensive generation and key exchange to get a new ephemeral key pair and wrapping key for each file. The disclosed method applies to file keys in the same class, in the provided example class A, for the duration of time the device is unlocked without the loss of security.
  • Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above. By way of example, and not limitation, such non-transitory computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
  • Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
  • Those of skill in the art will appreciate that other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. For example, the principles herein apply not only to backing up mobile devices, but to other devices or computing systems that perform cryptographic operations. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.

Claims (25)

1. A method comprising:
encrypting a file with a file key to yield an encrypted file;
encrypting the file key with a class encryption key to yield an encrypted file key;
encrypting the file key with a public key associated with a set of backup keys to yield a second encrypted file key; and
transmitting the encrypted file and the second encrypted file key to a backup device.
2. The method of claim 1, wherein the class encryption key is associated with a set of files, wherein the set of files has at least one similar attribute.
3. The method of claim 1, wherein the file key is randomly generated.
4. A method comprising:
receiving an encrypted file and an encrypted file key at a backup device;
associating the encrypted file key with a set of backup keys;
encrypting the set of backup keys with a backup key set key to yield an encrypted set of backup keys; and
storing the encrypted file, the encrypted file key and the set of encrypted backup keys on the backup device.
5. The method of claim 4, wherein the backup key set key is randomly generated by a primary device.
6. The method of claim 5, wherein a backup device escrows the backup key set key.
7. The method of claim 6, wherein the backup device protects the backup key set key with a user password.
8. The method of claim 7, wherein the user password is the same as a user account password.
9. The method of claim 4, wherein the backup key set key is recoverable by a service provider.
10. The method of claim 4, wherein the backup key set key is not recoverable by a service provider.
11. The method of claim 4, wherein the backup key set key is derived from a user password.
12. The method of claim 11, wherein the user password is a separate backup password.
13. A method comprising:
transmitting encrypted file data, an encrypted file key and a set of encrypted backup keys, from the backup device to the primary device, wherein the set of encrypted backup keys is generated according to steps comprising:
receiving an encrypted file and an encrypted file key at a backup device;
associating the encrypted file key with a set of backup keys; and
encrypting the set of backup keys with a backup key set key to yield an encrypted set of backup keys.
14. A system comprising:
a processor;
a memory storing instructions for controlling the processor to perform steps comprising:
performing a hash of a first encryption key to yield a first intermediate result;
truncating the first intermediate result to yield a second intermediate result;
generating a third intermediate result utilizing a function of a block offset; and
encrypting the third intermediate result with the second intermediate result to yield an initialization vector, for use in a cryptographic operation.
15. The system of claim 14, wherein the first encryption key is a file encryption key.
16. The system of claim 14, wherein the SHA-1 encryption algorithm is used to perform a hash of the first encryption key.
17. The system of claim 14, wherein the first intermediate result is truncated to an encryption key size.
18. The system of claim 14, wherein the function of a block offset is a linear feedback shift register.
19. The system of claim 18, wherein the block offset is the seed for the linear feedback shift register.
20. The system of claim 14, wherein generating an initialization vector for encryption is performed for each block of data.
21. The system of claim 14, wherein the initialization vector is used to encrypt each block of data.
22. A non-transitory computer-readable storage medium storing instructions which, when executed by a computing device, cause the computing device to perform steps comprising:
creating a second set of backup keys;
associating new file encryption keys with the second set of backup keys; and
encrypting the second set of backup keys with a new password.
23. The non-transitory computer-readable storage medium of claim 22, wherein a first set of backup keys exists prior to receiving a new password from a user.
24. The non-transitory computer-readable storage medium of claim 22, wherein the new file encryption keys are generated when new files are created.
25. A method of generating an encryption key, the method comprising:
creating a file and a file encryption key, wherein the file belongs to one of a set of protection classes;
encrypting the file encryption key with a device encryption key;
generating an asymmetric key pair;
generating a wrapping encryption key based on the asymmetric key pair; and
encrypting the file encryption key with the wrapping encryption key.
US13/204,171 2011-08-05 2011-08-05 System and method for wireless data protection Abandoned US20130034229A1 (en)

Priority Applications (12)

Application Number Priority Date Filing Date Title
US13/204,171 US20130034229A1 (en) 2011-08-05 2011-08-05 System and method for wireless data protection
KR1020147004760A KR101588541B1 (en) 2011-08-05 2012-07-31 System and method for wireless data protection
JP2014524025A JP6018200B2 (en) 2011-08-05 2012-07-31 System and method for wireless data protection
CN201280038007.1A CN103748827B (en) 2011-08-05 2012-07-31 System and method for wireless data protection
PCT/US2012/048944 WO2013022647A2 (en) 2011-08-05 2012-07-31 System and method for wireless data protection
EP12775334.1A EP2730049B1 (en) 2011-08-05 2012-07-31 System and method for wireless data protection
AU2012294770A AU2012294770B2 (en) 2011-08-05 2012-07-31 System and method for wireless data protection
US14/874,360 US9401898B2 (en) 2011-08-05 2015-10-02 System and method for wireless data protection
AU2016200941A AU2016200941B2 (en) 2011-08-05 2016-02-12 System and method for wireless data protection
US15/217,674 US9813389B2 (en) 2011-08-05 2016-07-22 System and method for wireless data protection
JP2016145458A JP6227728B2 (en) 2011-08-05 2016-07-25 System and method for wireless data protection
AU2018202051A AU2018202051A1 (en) 2011-08-05 2018-03-22 System and method for wireless data protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/204,171 US20130034229A1 (en) 2011-08-05 2011-08-05 System and method for wireless data protection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/874,360 Division US9401898B2 (en) 2011-08-05 2015-10-02 System and method for wireless data protection

Publications (1)

Publication Number Publication Date
US20130034229A1 true US20130034229A1 (en) 2013-02-07

Family

ID=47046822

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/204,171 Abandoned US20130034229A1 (en) 2011-08-05 2011-08-05 System and method for wireless data protection
US14/874,360 Active US9401898B2 (en) 2011-08-05 2015-10-02 System and method for wireless data protection
US15/217,674 Active US9813389B2 (en) 2011-08-05 2016-07-22 System and method for wireless data protection

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/874,360 Active US9401898B2 (en) 2011-08-05 2015-10-02 System and method for wireless data protection
US15/217,674 Active US9813389B2 (en) 2011-08-05 2016-07-22 System and method for wireless data protection

Country Status (7)

Country Link
US (3) US20130034229A1 (en)
EP (1) EP2730049B1 (en)
JP (2) JP6018200B2 (en)
KR (1) KR101588541B1 (en)
CN (1) CN103748827B (en)
AU (3) AU2012294770B2 (en)
WO (1) WO2013022647A2 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150156012A1 (en) * 2013-12-04 2015-06-04 Board Of Trustees Of Michigan State University Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
US20150169894A1 (en) * 2013-12-13 2015-06-18 International Business Machines Corporation Network encrypted data object stored on an encrypted file system
EP2950231A1 (en) * 2014-05-30 2015-12-02 Apple Inc. Context based data access control
US9288047B2 (en) 2010-04-07 2016-03-15 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US20160300079A1 (en) * 2013-09-06 2016-10-13 Zte Corporation Method and Device for Processing Hidden File Folder, and Terminal
US20160350544A1 (en) * 2014-10-22 2016-12-01 Sze Yuen Wong Methods And Apparatus For Sharing Encrypted Data
WO2016195797A1 (en) * 2015-05-31 2016-12-08 Apple Inc. Backup system with multiple recovery keys
US9584316B1 (en) 2012-07-16 2017-02-28 Wickr Inc. Digital security bubble
US9584493B1 (en) 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
US9590958B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
US9591479B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure telecommunications
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US20170359174A1 (en) * 2016-06-10 2017-12-14 Apple Inc. File system support for rolling keys on file extents
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US20180198627A1 (en) * 2017-01-06 2018-07-12 Microsoft Technology Licensing, Llc Cryptographic operations in an isolated collection
US10025597B2 (en) 2010-04-07 2018-07-17 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US10114766B2 (en) * 2013-04-01 2018-10-30 Secturion Systems, Inc. Multi-level independent security architecture
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
CN109889518A (en) * 2019-02-18 2019-06-14 天固信息安全系统(深圳)有限责任公司 A kind of encryption storage method
US10404667B2 (en) * 2016-11-17 2019-09-03 Bank Of America Corporation Secure, autonomous file encryption and decryption
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
US10671742B2 (en) * 2016-11-18 2020-06-02 Duncan MacDougall Greatwood Sharing an object using the scattered storage system with high-entropy credentials
US10708236B2 (en) 2015-10-26 2020-07-07 Secturion Systems, Inc. Multi-independent level secure (MILS) storage encryption
CN112241524A (en) * 2019-07-16 2021-01-19 深圳软牛科技有限公司 iOS device account password importing method and system
US10902155B2 (en) 2013-03-29 2021-01-26 Secturion Systems, Inc. Multi-tenancy architecture
CN112486713A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Screen freezing processing method and electronic equipment
US11063914B1 (en) 2013-03-29 2021-07-13 Secturion Systems, Inc. Secure end-to-end communication system
US11177942B2 (en) 2016-11-18 2021-11-16 Duncan MacDougall Greatwood Security through data scattering
US11283774B2 (en) 2015-09-17 2022-03-22 Secturion Systems, Inc. Cloud storage using encryption gateway with certificate authority identification
US11288402B2 (en) 2013-03-29 2022-03-29 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US20220335147A1 (en) * 2021-04-14 2022-10-20 Bank Of America Corporation System for implementing enhanced file encryption technique
US11921906B2 (en) 2022-03-10 2024-03-05 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11283604B2 (en) * 2015-05-29 2022-03-22 Microsoft Technology Licensing, Llc Sharing encrypted data with enhanced security by removing unencrypted metadata
US9858427B2 (en) 2016-02-26 2018-01-02 International Business Machines Corporation End-to-end encryption and backup in data protection environments
JP6894678B2 (en) 2016-08-02 2021-06-30 キヤノン株式会社 Information processing equipment, its control method, and programs
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
CN111198784A (en) * 2018-11-16 2020-05-26 杭州海康威视系统技术有限公司 Data storage method and device
CN109547203A (en) * 2018-12-25 2019-03-29 深圳市安信认证系统有限公司 A kind of backup method of private key, back-up device and terminal device
US10992458B2 (en) * 2019-01-16 2021-04-27 EMC IP Holding Company LLC Blockchain technology for data integrity regulation and proof of existence in data protection systems
CN110086623B (en) * 2019-03-13 2022-06-03 捷德(中国)科技有限公司 Firmware anti-counterfeiting method based on safety element and safety element
US11509649B2 (en) 2020-10-01 2022-11-22 Oboren Systems, Inc. Exclusive self-escrow method and apparatus
US11196558B1 (en) * 2021-03-09 2021-12-07 Technology Innovation Institute Systems, methods, and computer-readable media for protecting cryptographic keys
US11899824B1 (en) 2023-08-09 2024-02-13 Vive Concierge, Inc. Systems and methods for the securing data while in transit between disparate systems and while at rest

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870477A (en) * 1993-09-29 1999-02-09 Pumpkin House Incorporated Enciphering/deciphering device and method, and encryption/decryption communication system
US20040091114A1 (en) * 2002-08-23 2004-05-13 Carter Ernst B. Encrypting operating system
US20070100913A1 (en) * 2005-10-12 2007-05-03 Sumner Gary S Method and system for data backup
US7240219B2 (en) * 2003-05-25 2007-07-03 Sandisk Il Ltd. Method and system for maintaining backup of portable storage devices
US20080063209A1 (en) * 2006-09-07 2008-03-13 International Business Machines Corporation Distributed key store
US20110252232A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US20110252234A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for file-level data protection
US20110252243A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US20110252233A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for backing up and restoring files encrypted with file-level content protection
US8589680B2 (en) * 2010-04-07 2013-11-19 Apple Inc. System and method for synchronizing encrypted data on a device having file-level content protection

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69637799D1 (en) * 1995-02-13 2009-02-12 Intertrust Tech Corp Systems and procedures for secure transaction management and electronic legal protection
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
US6389535B1 (en) 1997-06-30 2002-05-14 Microsoft Corporation Cryptographic protection of core data secrets
US6055316A (en) * 1997-12-26 2000-04-25 Sun Microsystems, Inc. System and method for deriving an appropriate initialization vector for secure communications
US7822797B2 (en) * 2002-07-29 2010-10-26 Broadcom Corporation System and method for generating initial vectors
US7055039B2 (en) * 2003-04-14 2006-05-30 Sony Corporation Protection of digital content using block cipher crytography
EP1629382A4 (en) * 2003-06-02 2011-12-21 Liquid Machines Inc Managing data objects in dynamic, distributed and collaborative contexts
JP2005140823A (en) * 2003-11-04 2005-06-02 Sony Corp Information processor, control method, program, and recording medium
JP4505717B2 (en) * 2003-12-08 2010-07-21 ソニー株式会社 Information processing apparatus, control method, program, and recording medium
JP2007336446A (en) * 2006-06-19 2007-12-27 Canon Inc Data encryption apparatus
JP2008042718A (en) * 2006-08-09 2008-02-21 Seiko Epson Corp Image reading system, information processing apparatus, image reader and program
US20080040613A1 (en) * 2006-08-14 2008-02-14 David Carroll Challener Apparatus, system, and method for secure password reset
US8554176B2 (en) * 2007-09-18 2013-10-08 Qualcomm Incorporated Method and apparatus for creating a remotely activated secure backup service for mobile handsets
US8179860B2 (en) 2008-02-15 2012-05-15 Alcatel Lucent Systems and method for performing handovers, or key management while performing handovers in a wireless communication system
US8510558B2 (en) 2009-02-17 2013-08-13 Alcatel Lucent Identity based authenticated key agreement protocol
WO2010126639A1 (en) 2009-04-29 2010-11-04 Calisolar, Inc. Process control for umg-si material purification
US20110055559A1 (en) * 2009-08-27 2011-03-03 Jun Li Data retention management
US8850203B2 (en) 2009-08-28 2014-09-30 Alcatel Lucent Secure key management in multimedia communication system
CN102231727B (en) * 2011-03-18 2014-02-19 杭州奕锐电子有限公司 Crypto-delta-transfer-based remote sharing backup recovery method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870477A (en) * 1993-09-29 1999-02-09 Pumpkin House Incorporated Enciphering/deciphering device and method, and encryption/decryption communication system
US20040091114A1 (en) * 2002-08-23 2004-05-13 Carter Ernst B. Encrypting operating system
US7240219B2 (en) * 2003-05-25 2007-07-03 Sandisk Il Ltd. Method and system for maintaining backup of portable storage devices
US20070100913A1 (en) * 2005-10-12 2007-05-03 Sumner Gary S Method and system for data backup
US20080063209A1 (en) * 2006-09-07 2008-03-13 International Business Machines Corporation Distributed key store
US20110252234A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for file-level data protection
US20110252232A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US20110252243A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US20110252233A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for backing up and restoring files encrypted with file-level content protection
US8412934B2 (en) * 2010-04-07 2013-04-02 Apple Inc. System and method for backing up and restoring files encrypted with file-level content protection
US8433901B2 (en) * 2010-04-07 2013-04-30 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US8510552B2 (en) * 2010-04-07 2013-08-13 Apple Inc. System and method for file-level data protection
US8589680B2 (en) * 2010-04-07 2013-11-19 Apple Inc. System and method for synchronizing encrypted data on a device having file-level content protection

Cited By (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10025597B2 (en) 2010-04-07 2018-07-17 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US10348497B2 (en) 2010-04-07 2019-07-09 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US11263020B2 (en) 2010-04-07 2022-03-01 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US9288047B2 (en) 2010-04-07 2016-03-15 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US9912476B2 (en) 2010-04-07 2018-03-06 Apple Inc. System and method for content protection based on a combination of a user PIN and a device specific identifier
US9876772B1 (en) 2012-07-16 2018-01-23 Wickr Inc. Encrypting and transmitting data
US10038677B1 (en) 2012-07-16 2018-07-31 Wickr Inc. Digital security bubble
US10659435B2 (en) 2012-07-16 2020-05-19 Wickr Inc. Multi party messaging
US9628449B1 (en) 2012-07-16 2017-04-18 Wickr Inc. Multi party messaging
US9584316B1 (en) 2012-07-16 2017-02-28 Wickr Inc. Digital security bubble
US11159310B2 (en) 2012-07-16 2021-10-26 Amazon Technologies, Inc. Digital security bubble
US9729315B2 (en) 2012-07-16 2017-08-08 Wickr Inc. Initialization and registration of an application
US10432597B1 (en) 2012-07-16 2019-10-01 Wickr Inc. Digital security bubble
US10581817B1 (en) 2012-07-16 2020-03-03 Wickr Inc. Digital security bubble
US9667417B1 (en) 2012-07-16 2017-05-30 Wickr Inc. Digital security bubble
US11783089B2 (en) 2013-03-29 2023-10-10 Secturion Systems, Inc. Multi-tenancy architecture
US11063914B1 (en) 2013-03-29 2021-07-13 Secturion Systems, Inc. Secure end-to-end communication system
US10902155B2 (en) 2013-03-29 2021-01-26 Secturion Systems, Inc. Multi-tenancy architecture
US11288402B2 (en) 2013-03-29 2022-03-29 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US11429540B2 (en) * 2013-04-01 2022-08-30 Secturion Systems, Inc. Multi-level independent security architecture
US10114766B2 (en) * 2013-04-01 2018-10-30 Secturion Systems, Inc. Multi-level independent security architecture
US20190050348A1 (en) * 2013-04-01 2019-02-14 Secturion Systems, Inc. Multi-level independent security architecture
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US20160300079A1 (en) * 2013-09-06 2016-10-13 Zte Corporation Method and Device for Processing Hidden File Folder, and Terminal
US20150156012A1 (en) * 2013-12-04 2015-06-04 Board Of Trustees Of Michigan State University Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
US9608803B2 (en) * 2013-12-04 2017-03-28 Board Of Trustees Of Michigan State University Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
US20150169894A1 (en) * 2013-12-13 2015-06-18 International Business Machines Corporation Network encrypted data object stored on an encrypted file system
US9697378B2 (en) * 2013-12-13 2017-07-04 International Business Machines Corporation Network encrypted data object stored on an encrypted file system
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
US10382197B1 (en) 2014-02-24 2019-08-13 Wickr Inc. Key management and dynamic perfect forward secrecy
US10396982B1 (en) 2014-02-24 2019-08-27 Wickr Inc. Key management and dynamic perfect forward secrecy
US9558363B2 (en) 2014-05-30 2017-01-31 Apple Inc. Systems and methods of context based data access control of encrypted files
AU2015202649B2 (en) * 2014-05-30 2017-02-09 Apple Inc. Context based data access control
EP2950231A1 (en) * 2014-05-30 2015-12-02 Apple Inc. Context based data access control
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
US20160350544A1 (en) * 2014-10-22 2016-12-01 Sze Yuen Wong Methods And Apparatus For Sharing Encrypted Data
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
WO2016195797A1 (en) * 2015-05-31 2016-12-08 Apple Inc. Backup system with multiple recovery keys
US10872042B2 (en) 2015-05-31 2020-12-22 Apple Inc. Backup system with multiple recovery keys
US9904629B2 (en) 2015-05-31 2018-02-27 Apple Inc. Backup system with multiple recovery keys
US9842062B2 (en) 2015-05-31 2017-12-12 Apple Inc. Backup accessible by subset of related devices
US11792169B2 (en) 2015-09-17 2023-10-17 Secturion Systems, Inc. Cloud storage using encryption gateway with certificate authority identification
US11283774B2 (en) 2015-09-17 2022-03-22 Secturion Systems, Inc. Cloud storage using encryption gateway with certificate authority identification
US10708236B2 (en) 2015-10-26 2020-07-07 Secturion Systems, Inc. Multi-independent level secure (MILS) storage encryption
US11750571B2 (en) 2015-10-26 2023-09-05 Secturion Systems, Inc. Multi-independent level secure (MILS) storage encryption
US10142300B1 (en) 2015-12-18 2018-11-27 Wickr Inc. Decentralized authoritative messaging
US9590956B1 (en) 2015-12-18 2017-03-07 Wickr Inc. Decentralized authoritative messaging
US9673973B1 (en) 2015-12-18 2017-06-06 Wickr Inc. Decentralized authoritative messaging
US9584493B1 (en) 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
US10129187B1 (en) 2015-12-18 2018-11-13 Wickr Inc. Decentralized authoritative messaging
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
US9591479B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure telecommunications
US10242217B1 (en) 2016-04-14 2019-03-26 Wickr Inc. Secure file transfer
US9590958B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
US9596079B1 (en) 2016-04-14 2017-03-14 Wickr Inc. Secure telecommunications
US11405370B1 (en) 2016-04-14 2022-08-02 Amazon Technologies, Inc. Secure file transfer
US11362811B2 (en) 2016-04-14 2022-06-14 Amazon Technologies, Inc. Secure telecommunications
US9805212B1 (en) 2016-04-14 2017-10-31 Wickr Inc. Secure file transfer
US9602477B1 (en) 2016-04-14 2017-03-21 Wickr Inc. Secure file transfer
US20170359174A1 (en) * 2016-06-10 2017-12-14 Apple Inc. File system support for rolling keys on file extents
US10454679B2 (en) * 2016-06-10 2019-10-22 Apple Inc. File system support for rolling keys on file extents
US11057357B2 (en) * 2016-11-17 2021-07-06 Bank Of America Corporation Secure, autonomous file encryption and decryption
US10404667B2 (en) * 2016-11-17 2019-09-03 Bank Of America Corporation Secure, autonomous file encryption and decryption
US11177942B2 (en) 2016-11-18 2021-11-16 Duncan MacDougall Greatwood Security through data scattering
US10671742B2 (en) * 2016-11-18 2020-06-02 Duncan MacDougall Greatwood Sharing an object using the scattered storage system with high-entropy credentials
US10833870B2 (en) * 2017-01-06 2020-11-10 Microsoft Technology Licensing, Llc Cryptographic operations in an isolated collection
US20180198627A1 (en) * 2017-01-06 2018-07-12 Microsoft Technology Licensing, Llc Cryptographic operations in an isolated collection
CN109889518A (en) * 2019-02-18 2019-06-14 天固信息安全系统(深圳)有限责任公司 A kind of encryption storage method
CN112241524A (en) * 2019-07-16 2021-01-19 深圳软牛科技有限公司 iOS device account password importing method and system
CN112486713A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Screen freezing processing method and electronic equipment
US20220335147A1 (en) * 2021-04-14 2022-10-20 Bank Of America Corporation System for implementing enhanced file encryption technique
US20230177178A1 (en) * 2021-04-14 2023-06-08 Bank Of America Corporation System for implementing enhanced file encryption technique
US20230169190A1 (en) * 2021-04-14 2023-06-01 Bank Of America Corporation System for implementing enhanced file encryption technique
US11610004B2 (en) * 2021-04-14 2023-03-21 Bank Of America Corporation System for implementing enhanced file encryption technique
US11899803B2 (en) * 2021-04-14 2024-02-13 Bank Of America Corporation System for implementing enhanced file encryption technique
US11921906B2 (en) 2022-03-10 2024-03-05 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US11928223B2 (en) * 2023-01-26 2024-03-12 Bank Of America Corporation System for implementing enhanced file encryption technique

Also Published As

Publication number Publication date
WO2013022647A2 (en) 2013-02-14
JP6227728B2 (en) 2017-11-08
JP2016189626A (en) 2016-11-04
CN103748827A (en) 2014-04-23
AU2018202051A1 (en) 2018-04-12
AU2016200941B2 (en) 2018-01-04
JP2014524687A (en) 2014-09-22
US9401898B2 (en) 2016-07-26
EP2730049B1 (en) 2020-04-22
US9813389B2 (en) 2017-11-07
US20170019383A1 (en) 2017-01-19
CN103748827B (en) 2016-10-26
EP2730049A2 (en) 2014-05-14
AU2016200941A1 (en) 2016-03-03
KR20140039334A (en) 2014-04-01
AU2012294770A1 (en) 2014-02-20
KR101588541B1 (en) 2016-01-25
WO2013022647A3 (en) 2013-05-23
US20160036791A1 (en) 2016-02-04
JP6018200B2 (en) 2016-11-02
AU2012294770B2 (en) 2015-11-26

Similar Documents

Publication Publication Date Title
US9813389B2 (en) System and method for wireless data protection
US10348497B2 (en) System and method for content protection based on a combination of a user pin and a device specific identifier
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
US7428306B2 (en) Encryption apparatus and method for providing an encrypted file system
CA2831367C (en) Method and system for protecting execution of cryptographic hash functions
US8681975B2 (en) Encryption method and apparatus using composition of ciphers
KR20100028516A (en) Accelerated cryptography with an encryption attribute
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
CN102769525A (en) Backup and recovery method of user key of TCM (Trusted Cryptography Module)
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN111008837B (en) Block chain account private key recovery method and device, computer equipment and storage medium
Sri et al. SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY
Bhalde Performance improvement: Audio steganography technique parity bit combined with cryptography
Baviskar et al. Reliable and Efficient Revocation and Data Sharing using Identity based Encryption over Cloud
KR20230070772A (en) Blockchain based cloud storage system and the method of controlling access right in the cloud storage system

Legal Events

Date Code Title Description
AS Assignment

Owner name: APPLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAUERWALD, CONRAD;BHAVSAR, VRAJESH RAJESH;MCNEIL, KENNETH BUFFALO;AND OTHERS;SIGNING DATES FROM 20110803 TO 20110804;REEL/FRAME:026709/0502

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION