Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys. The system encrypts each file key differently and stores a first file key on the primary device and transmits one of the encrypted file keys in addition to the encrypted file to a backup device for storage. On the backup device, the system associates the encrypted file key with a set of backup keys protected by a user password. In one embodiment, the system generates an initialization vector for use in cryptographic operations based on a file key. In another embodiment, the system manages cryptographic keys on a backup device during a user password change.
Abstract:
A system and method for using bloom filters to identify service providers. Service providers generate bloom filters with the user ID codes of registered users and exchange the filters with one another. A first provider will query its own database to determine if the first user is registered with the first provider. If the first user is not registered with the first provider, then the first provider will query its filters to identify other providers with which the first user may be registered. A positive response from a filter indicates that the first user may or may not be registered with the provider associated with that filter, and a negative response indicates with certainty that the first user is not registered with that provider. The request to locate the first user is only transmitted to those providers for which a positive filter response has been received.