US20220407691A1 - Data protection and recovery systems and methods - Google Patents

Data protection and recovery systems and methods Download PDF

Info

Publication number
US20220407691A1
US20220407691A1 US17/889,583 US202217889583A US2022407691A1 US 20220407691 A1 US20220407691 A1 US 20220407691A1 US 202217889583 A US202217889583 A US 202217889583A US 2022407691 A1 US2022407691 A1 US 2022407691A1
Authority
US
United States
Prior art keywords
key
message
program
value
pseudo random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/889,583
Inventor
Joshua Freeman Adams
David Patrick Forster
Frank Barry Robertson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ethopass LLC
Original Assignee
Ethopass LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ethopass LLC filed Critical Ethopass LLC
Priority to US17/889,583 priority Critical patent/US20220407691A1/en
Assigned to ETHOPASS, LLC reassignment ETHOPASS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ADAMS, JOSHUA FREEMAN, FORSTER, David Patrick, ROBERTSON, Frank Barry
Publication of US20220407691A1 publication Critical patent/US20220407691A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Definitions

  • This invention is related to computing system security. Specifically, but not intended to limit the invention, embodiments of the invention are related to securely updating user data.
  • service providers such as those providing software as a service
  • service providers have implemented various steps to authenticate users who are attempting to update data associated with the users' accounts.
  • the user is asked to provide a password. If the user does not know his or her password, the service provider will generally send a text, email, or message via 3rd party to the user as a method of authentication.
  • This method is vulnerable to attack, in part because user emails are often easily accessible on their mobile phones, and because a single email can be used to “hack” numerous accounts held by a single user. There therefore remains a need for service providers to offer a secure means for users to change data associated with user accounts.
  • An exemplary system has a first non-transitory computer-readable medium storing a first program and a second non-transitory computer-readable medium storing a second program, the first program and second program including instructions that, when executed by one or more processors, execute a method of verifying a secure message tunnel during a communication session.
  • the method includes: selecting a pseudo random byte string; breaking the pseudo random byte string into binary format; following the breaking the pseudo random byte string into binary format, transmitting a message between the first non-transitory computer-readable medium and the second non-transitory medium; following the transmitting the message, shifting a binary array associated with the pseudo random byte string and assigning a unique shift value to the message; determining the unique shift value has been reused; and responsive to the determining the unique shift value has been reused, breaking the session.
  • FIG. 1 is a schematic of an exemplary system
  • FIG. 2 is a flowchart of an exemplary method
  • FIG. 3 is a flowchart of an exemplary method
  • FIG. 4 is a flowchart of an exemplary method
  • FIG. 5 is a flowchart of an exemplary method.
  • the ARQ protocol represents a communication layer to achieve four primary functions, such as setting up a new account or database entry, or verifying the incoming data before entry. Once a record is set, a connection is able to verify against the record.
  • the communication pipeline may be monitored using a session variable. If that account record needs to be reset with new uncorrupted data, then the initiator of that process may update the record with an enhanced verification process.
  • ARQ autonomous request query
  • ARQ represents a software development kit (SDK), or a set of tools which handle the functional aspects necessary for the key setting and resetting process.
  • SDK software development kit
  • the primary purpose of this SDK is to authenticate and authorize users.
  • the use cases are not limited to a single industry, as the 1-to-1 key reset solves the problem of trying to verify one party to another securely, without the necessity of using a 3-party service.
  • Every connection may be initialized using a public key exchange to secure a message pipeline. Once a secure message pipeline has been created. The message negotiation may begin.
  • a trusted 3rd party may be used to verify transmitted public key sets used to secure the message tunnel. Using a verified 3rd party may help protect against key spoofing, or an in-transit attack. If the initial key is swapped with a malicious key, the attacker can listen in on the conversation in what is known as a “middle-person attack.”
  • the messaging tunnel may be secured using most technologically current best practices. Once the initial message pipeline has been secured the primary processes may begin. The core design of the system was built to ensure that even if the transmitted message contents are leaked. They pose no security risk, as the all values are either; asymmetric public keys, or pre-encrypted ciphertext.
  • the first “primary” asymmetric key may be any value that could potentially be used for authentication, or authorization.
  • the second “Update” asymmetric key may be issued with one of many elliptic curve algorithms known to those skilled in the art.
  • the asymmetrically encrypted “update package” in embodiments described herein is unique to this process. To create the update package the steps may be as follows:
  • a symmetric encryption algorithm must be selected.
  • Various symmetric encryption algorithms have different input requirements to generate secure ciphertext, some may require that a nonce, or ‘number used once,’ be selected. If a nonce is required, then the corresponding nonce size must be correct for the selected algorithm.
  • a pseudo randomly generated value is passed to a cryptographically secure hashing algorithm.
  • the hashing algorithm may output a cryptographically secure hash with a minimum length, such as a minimum length of 32 bytes.
  • the hashing algorithm may use at least 256-bits of entropy or ⁇ 32 bytes, and the secure hash is passed through an elliptic curve to create a public, and private key set.
  • the secure hash used to create this keyset must be temporarily held until it can be secured using the symmetric encryption process.
  • a primary authentication/authorization identification value must be selected or generated.
  • the primary authentication/authorization value could be one of many types of identifiers including but not limited to: a hashed passphrase, an asymmetric key set, or any other value deemed acceptable.
  • the 1st private key, and the 2nd public key are passed through a public key cryptography system to generate a shared encryption key. Once the shared key is generated, the 1st private key is removed, and permanently deleted.
  • the shared key, nonce, and secure hash are passed through a symmetric encryption algorithm. The shared key is used as the primary encryption key, utilizing the nonce if needed.
  • the secure hash is the value or message being encrypted. Once the resulting ciphertext has been created, the secure hash is removed from memory as well.
  • a method may include to regenerate the 2nd private key from a valid key derivation schema built using secure values.
  • the 2nd private key may also be stored on a secondary device or held in any form that can be securely and accurately recalled. It is not advised to ‘move,’ the 2nd private key computationally. This may create a secondary record that could be captured or exfiltrated.
  • a process may maintain an ‘air gapped,’ environment away from programmatic access to the keying material.
  • the 2nd private key is the only required value needed to successfully decrypt the ciphertext. If the 2nd private key is kept secure. The successful decryption of the resulting ciphertext may be used as verifiable proof to update the primary authentication/authorization value/key.
  • Successful negotiation is the process of recalling the stored information, and regenerating the previously deleted key values.
  • the type of symmetric encryption algorithm, and elliptic curve algorithms must be known. If the algorithm types have been lost or misconstrued. An algorithm type brute-force strategy may be employed.
  • the process of negotiation is as follows: 1) The ciphertext, nonce (if used), and 1st public key are recalled from memory or requested from the storing entity. 2) The 2nd private key is either regenerated, or recalled for use. 3) The 1st public key, and the 2nd private key are passed through a public key encryption scheme to generate the 2nd shared key. 4) The 2nd shared key, and nonce passed through the correct symmetric encryption algorithm to decrypt the ciphertext. If successful, the original secure hash is returned. 5) The secure hash is then passed through the same elliptic curve algorithm used to generate the 1st public key.
  • the 1st private key, and a newly selected or generated primary authentication/authorization value/key are passed through an asymmetric encryption signing algorithm, creating a cryptographic signature of the primary authentication value/key.
  • the signed primary authentication value/key is then verified by the origin that stored the 1st public key and ciphertext. If the cryptographic signature is validated successfully by the 1st public key, then the newly selected primary authentication key may be safely updated.
  • This process may be used to update any data value that could require a secure one-to-one update scheme.
  • the utilization of the signing algorithms ensures that any information transmitted is verifiably correct, or was not tampered with in transit.
  • Session If additional security or monitoring is required during the key negotiation.
  • a non-tamperable session may be created, and utilized to verify a secure message tunnel.
  • Many different session schemes may be employed as an additional verification value.
  • One possible session scheme are one-time shifting session values. This adds an additional value to be verified before any transmitted message may be fully unpacked.
  • a pseudo random byte string is selected.
  • the byte string is broken down into base-2 or binary format.
  • the binary array is ‘shifted,’ or ‘stepped’ on a predefined shift parameter field.
  • Each message may then contain the unique shift value. Any reused value becomes evidence of a possible attack or network error. If a value is reused more than once the session is broken and reinitiated from start.
  • a symmetric encryption layered session may utilize the shifting ‘stepped,’ session key, as the primary encryption/decryption key. This process requires that the sender/receiver have successfully, and securely negotiated the necessary key values. Requiring both parties to know the key stepper mechanics, polynomial field size, initial session byte value, and the selected algorithm sets. If the selected symmetric encryption algorithm requires a nonce, then it must also be known by both parties. In order to successfully set up the required prenegotiation values a public key scheme may be used to securely transfer the necessary values.
  • the symmetric encryption algorithm is used to keep all transmitted values private across the wire.
  • Each time a message is transmitted the required encryption/decryption key may be the next session shifter value.
  • I.E. One possible scheme may be: party A, uses key0 to encrypt the first message, then party B uses key0 to decrypt. On the next message sequence, the key is shifted, and party B uses key 1 to encrypt, and party A uses key 1 to decrypt. If at any time either party loses the ‘count,’ the process is broken, and reset from the start. This ensures that if the transmitted values are tampered with, or are hijacked in transit. No critical information is leaked by either party, while providing possible evidence of an active attack or a potential network malfunction.
  • Non-Encrypted Session uses may employ a message signature schema wherein both parties are required to sign incoming/outgoing messages wherein the underlying transport layer security is used.
  • the shift value is used as the signed request verification key. If each transmitted message utilizes the unique shifted value, each message signature will be unique and verifiable. This allows either party to verify if a message was “replayed,” or tampered with adding an additional verification medium. This is especially useful when a signed time vector can't or shouldn't be used due to time constraints, or internationalization.
  • Session Life Cycle The session life cycle is fragile and frail by design. All sessions may be reset if any of the following faults occur: package or signature is retransmitted more than one time, encoding doesn't match specifications, responder or requestor signatures are unable to be verified, symmetric encryption package can't be decrypted, session timeout, transport layer security is compromised. If a session is reset for any reason, a physical boolean request may continue the interaction. If a physical person is required to make authentication or authorization requests. Any of these disqualifying events may or should lead to increased logging parameters if a potential breach is in progress.
  • Entirely new private/public key sets should be generated and used. This ensures that if the corresponding private key material was captured. The new values are no longer compromisable. The old 2nd private key, should be discarded after a successful negotiation with the service provider has occurred.
  • An optimal strategy to employ may be using a key derivation process that requires offline or air gapped material to regenerate the necessary private keying material. This may help to ensure that the new keyset is not captured or exfiltrated from an internet connected machine.
  • the recovery network is a database method where a potential user secures their private key material in/on a remote system, which is provided with a specific maximum memory allocation or data type. This may help ensure all data stored is not corrupted.
  • This remote system may require each memory slot only store an encrypted file that only the originator may decrypt.
  • the storage mechanism necessary to “backup,” or clone data to another data storage medium gives the user various options for recalling their encrypted file, as long as each memory slot was only given secure encrypted material, even if every file was copied and selectively brute forced. It would be near impossible to yield any meaningful theft in any reasonable amount of time.
  • This type of database may be private, semi-private, semi-public, or public; as long as all stored material is encrypted before transit.
  • One option may be to use a central consensus and immutable record sets to save; and verify data integrity of all servers involved.
  • the memory allocation may also be saved directly to local media.
  • a deception system may also be used or activated by entering a preselected deception key. All deceptive keysets open what look like regular, or real accounts. Any storage of remote private key material is not recommended but may be necessary to aid users in secure recall of critical private keying material recall.
  • Zone keys are the use of similar asymmetric keying schemas that are specifically correlated with machine-to-machine interactions. The purpose of a zone key is to simplify, secure, and identify system interactions. A key feature of the zone key schema is that they are not specifically tied to the service, or person. They are not registered, merely created and destroyed when needed. Zone keys are used to securely handoff interactions between protected internal services. A zone key may be durable, or nondurable; for single use, or re-useable. The option is selected for the situation that works best for the underlying service communication layer.
  • Codex A codex is a protocol to create, cycle, and provision cryptographic key schemas.
  • the base idea is that in order to protect an organization a secure process must be used to create, cycle, and provision employee access to internally or externally business owned services.
  • the codex chain may be based on one of many subsets of relational key setup material; stateless, stateful, spherical deterministic, radix or merkle counter based key trees, to generate the necessary keying material.
  • the selection of specific model changes the provisioning and input key material.
  • the selection of a specific model has added benefits for some organizations over others, because an internet company may prefer a stateless model as their primary key derivation function, which would require memorized content to recreate the correct input values.
  • a hospital may want a stateful model correlated to the individual department, service, or machine identifier codes.
  • Some embodiments include using a pseudo randomly selected mnemonic phrase. This mnemonic phrase is used as input material to a key derivation function, or a cryptographic function that returns a non-reversible output. This protects the root key generation material. Then account creation may begin utilizing a root value to generate the necessary private keys.
  • Generated keys may be registered with specific services and should never be reused. Each private keyset is a single service key. Private keying material should never be used more than once.
  • Any system may specify when keys may be rotated. This may be accomplished through setting a timed flag associated with the primary authentication value/key, 1st public key, and ciphertext. When a user attempts to utilize the primary authentication value/key, the system may deny the request, essentially forcing an invalidation of the primary authentication value. The only remedy would be to successfully negotiate the correlated ciphertext material.
  • a system that utilizes deauthorizing primary authentication values/keys on a timed basis have the additional benefit of closing potential breaches faster. If keys are required to be renegotiated every 12 hours. Any users who have keysets that have been compromised will be actively notified, because they will no longer be able to access the system.
  • a hardware provisioning model may be setup on machines or devices for “drop-in setup,” or specific hardware keys and cryptographic material.
  • a hardware key is used, enabling additional keysets to be added, such as access keys, computer drive decryption keys, which may only be breached if the physical medium is connected to an internet connected machine, or physically stolen.
  • Recovery If a user needs to have access terminated or their accounts have been breached, then the recovery process may be initiated.
  • the key regeneration process may be completed on an air-gapped offline machine. Then ciphertext negotiation may begin only after the necessary keys are recreated. If the associated 1st public key, and related ciphertext are stored locally. Then the ciphertext, and new authentication values may be selected, signed, and ‘readied,’ before being connected to an internet connected machine. If an air-gapped process is used, the transmitted keying material has a superior security status, because the possibility of key derivation material being captured is much lower.
  • the process may include: 0) recovery drive pulled from secure location 1) Primary phrase used to regenerate key sets and request update packages 2) Update packages (1st public key, and ciphertext) are stored on removable durable storage 3) recovery drive and update packages are combined on air-gapped offline system 4) new key-sets are created for each individual system 5) primary authentication values updated 6) Update packages are loaded onto removable media 7) update packages are transmitted.
  • This air-gapped recovery system may require: two removable drives or remote databasing systems.
  • Recovery Branch When the key (or keys) are created, a ‘recovery branch’ may be created.
  • the recovery branch uses three pieces of information to create a key pool.
  • a key pool is a grouping of the necessary 1st and 2nd asymmetric key sets.
  • a recovery branch may use a standardized initialized counter system to generate deterministic keysets. The length of the count does not matter as much as the starting point. If a counter version is updated, all keys will have to be updated as well, noting that each keyset contains the necessary material to recreate the necessary 2nd private key.
  • an initial counter could be: 0x80000001, 0x80000002, 0x80000003, 0x80000004, ect.
  • Using a hexadecimal counter maintaining a scalar base 8 is one simplistic possibility.
  • the root material is combined and passed to a key derivation function that may generate cryptographically nonreversible keys.
  • Entropy hardening may also be employed to a hashing function and hashed (1 to (x)) times. The number of ‘times’ a value is hashed the greater the resulting entropy will be yielded, increasing the time of regeneration necessary upon recovery.
  • the resulting output hash may then be passed to a number of different elliptic curve or non-elliptic curve algorithms. The only requirement being that a public key, and private key are generated. Then immediately upon generation of the key material the hash or seed values are overwritten or deleted from memory.
  • An internal deception program may be employed to protect critical key values.
  • the goal of the key authentication model is one that may make it impossible to brute force such an encryption standard. This leaves one primary avenue of attack, the physical person. Also known as “the fingernail test,” or “wrench test” which means that someone has the ability to pull your fingernails or hit you with a wrench until you give up your private key material.
  • a shadow program may be activated on the service if the user is using the “passphrase,” configuration to encrypt & decrypt private key material held locally.
  • the shadow service may be activated by entering a specific data value.
  • the primary one being the user entering their passphrase into the decrypt screen.
  • Fictional keysets are output. Each keyset may have similar primary values stored on remote systems.
  • the primary difference is that when the primary authentication value is accessed, or the ciphertext is requested to update the primary account value. All actions are completed against a deceptive sandboxed environment that looks real or is even the actual environment. The difference is this is an “alert” mode being activated. Every account notification transmitted or every request that is made may have a hidden “ALERT,” attached to it. This may signal that the user is in trouble or that a possible account takeover has occurred forcefully.
  • ALERT hidden
  • the shadow account may mirror the primary account. This provides the added benefit of being able to potentially alert multiple systems simultaneously that a user may be in grave danger, or malicious key manipulation has occurred. In the event that an attacker is trying to access multiple systems using the ‘shadow key,’ sets. Each service could help alert local authorities for maximum effectiveness.
  • MacGuffin BoxTM The term “MacGuffin Box” is a trademark of the Applicant. The following describes embodiments of a method.
  • the update key is used as the verification medium that confirms that the MacGuffin Box was negated correctly. If a ‘valid,’ asymmetric signature value is able to be correctly verified, then the public key or the primary identifier/authentication medium may be reset securely.
  • the MacGuffin Box represents an encrypted seed value, which can only be decrypted by the correct key private key value.
  • the MacGuffin box is a seed value, or a value that is passed to an elliptic curve function to create an output of 1. Public key, 2. Private key.
  • the public/private key pair may be used in a signing fashion. I.E.
  • the private key may be passed to a mathematical function with a piece of data to create a cryptographically unique signature value.
  • the output signature value has the ability to be verified by the corresponding public key.
  • the output public key is the Update Key.
  • the output private key corresponding to the public key (Update Key) is immediately deleted upon generation. If the corresponding private key, is not successfully deleted, the recovery process could be broken.
  • the MacGuffin Box may be encrypted using any symmetric encryption value. The reason that any symmetric encryption value may be used is that two asymmetric key groups are used to create a shared key, which resembles a symmetric encryption key.
  • Popular encryption mechanics like AES require a nonce, or ‘number used once,’ in order to complete a successful encryption function. If this is the case, then the nonce must be concatenated to the end of the output encrypted cypher text, which makes the output key generation graph to create a viable public key, update key, and MacGuffin box.
  • all that is needed to utilize the MacGuffin box is for the creator or the authenticating user to create/use an authentication value, shared phrase, asymmetric public key, or any authenticating value that is desired. All that may be needed to reset the primary authentication value is for the owner to possess the corresponding private recovery key and know the correct algorithm used to encrypt the MacGuffin box, and the elliptic curve algorithm used to create the corresponding update key (public key), which makes the recovery/reset process. The private recovery key (private rec key) is then the decrypting value needed to unlock the MacGuffin box.
  • the system 100 may include a first non-transitory computer-readable medium 102 storing a first program and a second non-transitory medium 104 storing a second program.
  • the first program and second program may include instructions that, when executed by one or more processors, execute a method 200 (see also FIG. 2 ) of securely replacing a first data value with a second data value.
  • the method 200 may include generating a first public key and a first private key, generating cryptographic seed value 204 , and passing the cryptographic seed value through an elliptic curve to generate a second public key and a second private key 206 .
  • the method 200 may include combining the first public key with the second private key using public key cryptography to create a shared encryption key 208 , and passing the shared encryption key through a symmetric algorithm to encrypt the cryptographic seed value 210 .
  • the method optionally includes removing the second private key after creating the shared encryption key and before passing the shared encryption key through the symmetric algorithm 212 .
  • the method 200 optionally includes sending the encrypted cryptographic seed value and the second public key through a communications interface 106 from the first non-transitory computer-readable medium to the second non-transitory computer-readable medium 214 .
  • the method 200 optionally includes receiving the encrypted cryptographic seed value and the second public key on the second non-transitory computer-readable medium 224 .
  • the method 200 optionally includes using the second public key and the first private key, generating a second shared key to decrypt the encrypted cryptographic seed value and to generate a decrypted cryptographic seed value 226 .
  • the method 200 optionally includes receiving the decrypted cryptographic seed value from the second non-transitory computer-readable medium on the first non-transitory computer-readable medium 216 .
  • the method 200 optionally includes passing the decrypted cryptographic seed value through an elliptic curve to re-generate the second private key 218 .
  • the method optionally includes using the re-generated second private key, cryptographically signing the second data value 220 .
  • the method 200 optionally includes sending the second signed data value through a communications interface to the second non-transitory computer-readable medium 222 .
  • the method 200 optionally includes receiving the second signed data value 228 .
  • the method 200 optionally includes using the second public key, verifying that the first private key was used to decrypt the encrypted cryptographic seed value 230 .
  • a first non-transitory computer-readable medium 102 which may reside on, for example only, an employee computer, may perform method steps 202 , 204 , 206 , 208 , 210 , 212 , 214 , 216 , 218 , 220 , 222 .
  • a second non-transitory computer-readable medium 104 which may reside on, for example, an employer computer or third party service provider network, may perform method steps 224 , 226 , 228 , 230 .
  • FIGS. 3 - 5 illustrate various flowcharts of features of the method 200 , to better visually understand the embodiments described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

A system has a first non-transitory computer-readable medium storing a first program and a second non-transitory computer-readable medium storing a second program, the first program and second program including instructions that, when executed by one or more processors, execute a method of verifying a secure message tunnel during a communication session. The method includes: selecting a pseudo random byte string; breaking the pseudo random byte string into binary format; following the breaking the pseudo random byte string into binary format, transmitting a message between the first non-transitory computer-readable medium and the second non-transitory medium; following the transmitting the message, shifting a binary array associated with the pseudo random byte string and assigning a unique shift value to the message; determining the unique shift value has been reused; and responsive to the determining the unique shift value has been reused, breaking the session.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority U.S. patent application Ser. No. 17/253,822, filed Dec. 18, 2020 and entitled “Data Protection and Recovery Systems and Methods,” which claims priority to International Application No. PCT/US20/41522, filed Jul. 10, 2020, and entitled “Data Protection and Recovery Systems and Methods,” which claims the priority benefit of U.S. Provisional Application No. 62/873,308, filed Jul. 12, 2019 and entitled “Data Protection and Recovery Systems and Methods,” the entire disclosures of which are hereby incorporated by reference for all proper purposes.
  • FIELD
  • This invention is related to computing system security. Specifically, but not intended to limit the invention, embodiments of the invention are related to securely updating user data.
  • BACKGROUND
  • With the proliferation of internet usage and software as a service, service providers, such as those providing software as a service, have been faced with increasingly complex threats to data security, in particular middle person attacks. To combat these threats, service providers have implemented various steps to authenticate users who are attempting to update data associated with the users' accounts. Typically, the user is asked to provide a password. If the user does not know his or her password, the service provider will generally send a text, email, or message via 3rd party to the user as a method of authentication. This method, however, is vulnerable to attack, in part because user emails are often easily accessible on their mobile phones, and because a single email can be used to “hack” numerous accounts held by a single user. There therefore remains a need for service providers to offer a secure means for users to change data associated with user accounts.
  • SUMMARY
  • An exemplary system has a first non-transitory computer-readable medium storing a first program and a second non-transitory computer-readable medium storing a second program, the first program and second program including instructions that, when executed by one or more processors, execute a method of verifying a secure message tunnel during a communication session. The method includes: selecting a pseudo random byte string; breaking the pseudo random byte string into binary format; following the breaking the pseudo random byte string into binary format, transmitting a message between the first non-transitory computer-readable medium and the second non-transitory medium; following the transmitting the message, shifting a binary array associated with the pseudo random byte string and assigning a unique shift value to the message; determining the unique shift value has been reused; and responsive to the determining the unique shift value has been reused, breaking the session.
  • BRIEF DESCRIPTION ON THE DRAWINGS
  • FIG. 1 is a schematic of an exemplary system;
  • FIG. 2 is a flowchart of an exemplary method;
  • FIG. 3 is a flowchart of an exemplary method;
  • FIG. 4 is a flowchart of an exemplary method; and
  • FIG. 5 is a flowchart of an exemplary method.
  • DETAILED DESCRIPTION
  • By way of introduction to the details of the invention, a protocol is described. The ARQ protocol represents a communication layer to achieve four primary functions, such as setting up a new account or database entry, or verifying the incoming data before entry. Once a record is set, a connection is able to verify against the record. The communication pipeline may be monitored using a session variable. If that account record needs to be reset with new uncorrupted data, then the initiator of that process may update the record with an enhanced verification process.
  • The ARQ (autonomous request query) protocol works with a few primary pieces of technology that may be configured in one of many various schemes. ARQ represents a software development kit (SDK), or a set of tools which handle the functional aspects necessary for the key setting and resetting process. The primary purpose of this SDK is to authenticate and authorize users.
  • This works by issuing four primary functions of the SDK: setting up a new user record, and saving to a durable record; verifying against the user record for re-entry; monitoring the user session for takeover or manipulation; and securely updating user information in the event of a breach.
  • The use cases are not limited to a single industry, as the 1-to-1 key reset solves the problem of trying to verify one party to another securely, without the necessity of using a 3-party service.
  • Connection Initialization. Every connection may be initialized using a public key exchange to secure a message pipeline. Once a secure message pipeline has been created. The message negotiation may begin.
  • Additionally, if the authenticity of the responding machine cannot be verified, a trusted 3rd party may be used to verify transmitted public key sets used to secure the message tunnel. Using a verified 3rd party may help protect against key spoofing, or an in-transit attack. If the initial key is swapped with a malicious key, the attacker can listen in on the conversation in what is known as a “middle-person attack.”
  • The messaging tunnel may be secured using most technologically current best practices. Once the initial message pipeline has been secured the primary processes may begin. The core design of the system was built to ensure that even if the transmitted message contents are leaked. They pose no security risk, as the all values are either; asymmetric public keys, or pre-encrypted ciphertext.
  • Setup. To set up a new keystore using the ARQ protocol there are three primary pieces of information necessary: A) 1st “Primary” Asymmetric Key, B) 2nd “Update” Asymmetric Key, and C) Asymmetrically Encrypted Ciphertext “Update Package”.
  • The first “primary” asymmetric key may be any value that could potentially be used for authentication, or authorization. The second “Update” asymmetric key may be issued with one of many elliptic curve algorithms known to those skilled in the art.
  • The asymmetrically encrypted “update package” in embodiments described herein is unique to this process. To create the update package the steps may be as follows:
  • A symmetric encryption algorithm must be selected. Various symmetric encryption algorithms have different input requirements to generate secure ciphertext, some may require that a nonce, or ‘number used once,’ be selected. If a nonce is required, then the corresponding nonce size must be correct for the selected algorithm.
  • A pseudo randomly generated value is passed to a cryptographically secure hashing algorithm. The hashing algorithm may output a cryptographically secure hash with a minimum length, such as a minimum length of 32 bytes. In some embodiments, the hashing algorithm may use at least 256-bits of entropy or ˜32 bytes, and the secure hash is passed through an elliptic curve to create a public, and private key set. The secure hash used to create this keyset must be temporarily held until it can be secured using the symmetric encryption process. Next, a primary authentication/authorization identification value must be selected or generated. The primary authentication/authorization value could be one of many types of identifiers including but not limited to: a hashed passphrase, an asymmetric key set, or any other value deemed acceptable.
  • On the output one may have: 0) Primary authentication value/key, 1) Nonce (if required), 2) Secure Hash, 3) 1st pseudo randomly generated public the corresponding private key set (the private key is immediately zeroed from memory once a shared encrypted key has been generated), 4) 2nd public and private key set.
  • The 1st private key, and the 2nd public key are passed through a public key cryptography system to generate a shared encryption key. Once the shared key is generated, the 1st private key is removed, and permanently deleted. The shared key, nonce, and secure hash are passed through a symmetric encryption algorithm. The shared key is used as the primary encryption key, utilizing the nonce if needed. The secure hash is the value or message being encrypted. Once the resulting ciphertext has been created, the secure hash is removed from memory as well.
  • Next the 1st public key, nonce (if used), and the output ciphertext are packaged together.
  • With this, the only way to recover or decrypt the ciphertext to retrieve the encrypted hash value is to recall or rebuild the corresponding 2nd private key. In some embodiments, a method may include to regenerate the 2nd private key from a valid key derivation schema built using secure values. The 2nd private key may also be stored on a secondary device or held in any form that can be securely and accurately recalled. It is not advised to ‘move,’ the 2nd private key computationally. This may create a secondary record that could be captured or exfiltrated.
  • In some embodiments, a process may maintain an ‘air gapped,’ environment away from programmatic access to the keying material. The 2nd private key is the only required value needed to successfully decrypt the ciphertext. If the 2nd private key is kept secure. The successful decryption of the resulting ciphertext may be used as verifiable proof to update the primary authentication/authorization value/key.
  • Successful negotiation is the process of recalling the stored information, and regenerating the previously deleted key values. In order to create the correct values needed, the type of symmetric encryption algorithm, and elliptic curve algorithms must be known. If the algorithm types have been lost or misconstrued. An algorithm type brute-force strategy may be employed.
  • In some embodiments, the process of negotiation is as follows: 1) The ciphertext, nonce (if used), and 1st public key are recalled from memory or requested from the storing entity. 2) The 2nd private key is either regenerated, or recalled for use. 3) The 1st public key, and the 2nd private key are passed through a public key encryption scheme to generate the 2nd shared key. 4) The 2nd shared key, and nonce passed through the correct symmetric encryption algorithm to decrypt the ciphertext. If successful, the original secure hash is returned. 5) The secure hash is then passed through the same elliptic curve algorithm used to generate the 1st public key. 6) The 1st private key, and a newly selected or generated primary authentication/authorization value/key are passed through an asymmetric encryption signing algorithm, creating a cryptographic signature of the primary authentication value/key. 7) The signed primary authentication value/key is then verified by the origin that stored the 1st public key and ciphertext. If the cryptographic signature is validated successfully by the 1st public key, then the newly selected primary authentication key may be safely updated.
  • This process may be used to update any data value that could require a secure one-to-one update scheme. The utilization of the signing algorithms ensures that any information transmitted is verifiably correct, or was not tampered with in transit.
  • Session. If additional security or monitoring is required during the key negotiation. A non-tamperable session may be created, and utilized to verify a secure message tunnel. Many different session schemes may be employed as an additional verification value. One possible session scheme are one-time shifting session values. This adds an additional value to be verified before any transmitted message may be fully unpacked.
  • Initially a pseudo random byte string is selected. The byte string is broken down into base-2 or binary format. Each time a message is transmitted or received. The binary array is ‘shifted,’ or ‘stepped’ on a predefined shift parameter field. Each message may then contain the unique shift value. Any reused value becomes evidence of a possible attack or network error. If a value is reused more than once the session is broken and reinitiated from start.
  • Symmetric Encryption Layered Session. A symmetric encryption layered session may utilize the shifting ‘stepped,’ session key, as the primary encryption/decryption key. This process requires that the sender/receiver have successfully, and securely negotiated the necessary key values. Requiring both parties to know the key stepper mechanics, polynomial field size, initial session byte value, and the selected algorithm sets. If the selected symmetric encryption algorithm requires a nonce, then it must also be known by both parties. In order to successfully set up the required prenegotiation values a public key scheme may be used to securely transfer the necessary values.
  • The symmetric encryption algorithm is used to keep all transmitted values private across the wire. Each time a message is transmitted the required encryption/decryption key may be the next session shifter value. I.E. One possible scheme may be: party A, uses key0 to encrypt the first message, then party B uses key0 to decrypt. On the next message sequence, the key is shifted, and party B uses key 1 to encrypt, and party A uses key 1 to decrypt. If at any time either party loses the ‘count,’ the process is broken, and reset from the start. This ensures that if the transmitted values are tampered with, or are hijacked in transit. No critical information is leaked by either party, while providing possible evidence of an active attack or a potential network malfunction. This is especially useful when any message negotiation is being completed within a hostile environment, because the transmitted values could be used to fingerprint the user. One example may be useful when privacy is of the utmost concern. If an associated key value could be tied to a critical persona, machine, or personal identity.
  • Non-Encrypted Session. The non-encrypted session uses may employ a message signature schema wherein both parties are required to sign incoming/outgoing messages wherein the underlying transport layer security is used. The shift value is used as the signed request verification key. If each transmitted message utilizes the unique shifted value, each message signature will be unique and verifiable. This allows either party to verify if a message was “replayed,” or tampered with adding an additional verification medium. This is especially useful when a signed time vector can't or shouldn't be used due to time constraints, or internationalization.
  • Session Life Cycle. The session life cycle is fragile and frail by design. All sessions may be reset if any of the following faults occur: package or signature is retransmitted more than one time, encoding doesn't match specifications, responder or requestor signatures are unable to be verified, symmetric encryption package can't be decrypted, session timeout, transport layer security is compromised. If a session is reset for any reason, a physical boolean request may continue the interaction. If a physical person is required to make authentication or authorization requests. Any of these disqualifying events may or should lead to increased logging parameters if a potential breach is in progress.
  • System Recovery. If a system is breached, and all associated account records need to be re-secured. Then a passive or active recovery process may occur. The recovery process assumes that the required private key material has not been breached. If the necessary key material needs to be regenerated, then it should be done on a non-compromised machine. Once the necessary private keying material has been recreated or recalled. Each of the corresponding record holders storing a primary authentication value/key, 1st public key, and related ciphertext. Must be contacted to flag the accounts as possible targets. Once flagged, each account may begin the ciphertext decryption process to sign a new primary authentication value/key. The primary component of this process is that with each authentication reset. Entirely new private/public key sets should be generated and used. This ensures that if the corresponding private key material was captured. The new values are no longer compromisable. The old 2nd private key, should be discarded after a successful negotiation with the service provider has occurred. An optimal strategy to employ may be using a key derivation process that requires offline or air gapped material to regenerate the necessary private keying material. This may help to ensure that the new keyset is not captured or exfiltrated from an internet connected machine.
  • Recovery Network. The recovery network is a database method where a potential user secures their private key material in/on a remote system, which is provided with a specific maximum memory allocation or data type. This may help ensure all data stored is not corrupted. This remote system may require each memory slot only store an encrypted file that only the originator may decrypt. The storage mechanism necessary to “backup,” or clone data to another data storage medium gives the user various options for recalling their encrypted file, as long as each memory slot was only given secure encrypted material, even if every file was copied and selectively brute forced. It would be near impossible to yield any meaningful theft in any reasonable amount of time. This type of database may be private, semi-private, semi-public, or public; as long as all stored material is encrypted before transit. One option may be to use a central consensus and immutable record sets to save; and verify data integrity of all servers involved. The memory allocation may also be saved directly to local media. A deception system may also be used or activated by entering a preselected deception key. All deceptive keysets open what look like regular, or real accounts. Any storage of remote private key material is not recommended but may be necessary to aid users in secure recall of critical private keying material recall.
  • Zone keys. Zone keys are the use of similar asymmetric keying schemas that are specifically correlated with machine-to-machine interactions. The purpose of a zone key is to simplify, secure, and identify system interactions. A key feature of the zone key schema is that they are not specifically tied to the service, or person. They are not registered, merely created and destroyed when needed. Zone keys are used to securely handoff interactions between protected internal services. A zone key may be durable, or nondurable; for single use, or re-useable. The option is selected for the situation that works best for the underlying service communication layer. Codex. A codex is a protocol to create, cycle, and provision cryptographic key schemas. The base idea is that in order to protect an organization a secure process must be used to create, cycle, and provision employee access to internally or externally business owned services. The codex chain may be based on one of many subsets of relational key setup material; stateless, stateful, spherical deterministic, radix or merkle counter based key trees, to generate the necessary keying material. The selection of specific model changes the provisioning and input key material. The selection of a specific model has added benefits for some organizations over others, because an internet company may prefer a stateless model as their primary key derivation function, which would require memorized content to recreate the correct input values. In contrast, a hospital may want a stateful model correlated to the individual department, service, or machine identifier codes.
  • Some embodiments include using a pseudo randomly selected mnemonic phrase. This mnemonic phrase is used as input material to a key derivation function, or a cryptographic function that returns a non-reversible output. This protects the root key generation material. Then account creation may begin utilizing a root value to generate the necessary private keys.
  • Generated keys may be registered with specific services and should never be reused. Each private keyset is a single service key. Private keying material should never be used more than once.
  • Any system may specify when keys may be rotated. This may be accomplished through setting a timed flag associated with the primary authentication value/key, 1st public key, and ciphertext. When a user attempts to utilize the primary authentication value/key, the system may deny the request, essentially forcing an invalidation of the primary authentication value. The only remedy would be to successfully negotiate the correlated ciphertext material. A system that utilizes deauthorizing primary authentication values/keys on a timed basis have the additional benefit of closing potential breaches faster. If keys are required to be renegotiated every 12 hours. Any users who have keysets that have been compromised will be actively notified, because they will no longer be able to access the system. If an attacker has exfiltrated the necessary keysets, their isolated machine may negotiate the ciphertext update, creating two divergent key branches and invaliding one, because all encryption functionality is individually distributed on the remote negotiating system. The computational overhead is also distributed, thereby not requiring a centralized service to handle all functional processing, thus ensuring that a single cryptographic function creation machine cannot be compromised removing another single point of failure.
  • Hardware Provisioning Model (some account protections). A hardware provisioning model may be setup on machines or devices for “drop-in setup,” or specific hardware keys and cryptographic material. In some embodiments, a hardware key is used, enabling additional keysets to be added, such as access keys, computer drive decryption keys, which may only be breached if the physical medium is connected to an internet connected machine, or physically stolen.
  • Recovery. If a user needs to have access terminated or their accounts have been breached, then the recovery process may be initiated. The key regeneration process may be completed on an air-gapped offline machine. Then ciphertext negotiation may begin only after the necessary keys are recreated. If the associated 1st public key, and related ciphertext are stored locally. Then the ciphertext, and new authentication values may be selected, signed, and ‘readied,’ before being connected to an internet connected machine. If an air-gapped process is used, the transmitted keying material has a superior security status, because the possibility of key derivation material being captured is much lower. The process may include: 0) recovery drive pulled from secure location 1) Primary phrase used to regenerate key sets and request update packages 2) Update packages (1st public key, and ciphertext) are stored on removable durable storage 3) recovery drive and update packages are combined on air-gapped offline system 4) new key-sets are created for each individual system 5) primary authentication values updated 6) Update packages are loaded onto removable media 7) update packages are transmitted.
  • The goal of this interaction is that if a user is breached or attacked, then the user may take specific measures to regenerate secure key material. This air-gapped recovery system may require: two removable drives or remote databasing systems.
  • Recovery Branch. When the key (or keys) are created, a ‘recovery branch’ may be created. The recovery branch uses three pieces of information to create a key pool. A key pool is a grouping of the necessary 1st and 2nd asymmetric key sets. A recovery branch may use a standardized initialized counter system to generate deterministic keysets. The length of the count does not matter as much as the starting point. If a counter version is updated, all keys will have to be updated as well, noting that each keyset contains the necessary material to recreate the necessary 2nd private key.
  • To create the key pool one of many methods may be used, such as to use the seed key (or keys) with a counter module. Ex. an initial counter could be: 0x80000001, 0x80000002, 0x80000003, 0x80000004, ect. Using a hexadecimal counter maintaining a scalar base 8 is one simplistic possibility.
  • Once a key branching mechanism is selected, the root material is combined and passed to a key derivation function that may generate cryptographically nonreversible keys. Entropy hardening may also be employed to a hashing function and hashed (1 to (x)) times. The number of ‘times’ a value is hashed the greater the resulting entropy will be yielded, increasing the time of regeneration necessary upon recovery.
  • The resulting output hash may then be passed to a number of different elliptic curve or non-elliptic curve algorithms. The only requirement being that a public key, and private key are generated. Then immediately upon generation of the key material the hash or seed values are overwritten or deleted from memory.
  • Account Alert. An internal deception program may be employed to protect critical key values. The goal of the key authentication model is one that may make it impossible to brute force such an encryption standard. This leaves one primary avenue of attack, the physical person. Also known as “the fingernail test,” or “wrench test” which means that someone has the ability to pull your fingernails or hit you with a wrench until you give up your private key material.
  • In order to get around this potential physical attack, a shadow program may be activated on the service if the user is using the “passphrase,” configuration to encrypt & decrypt private key material held locally. The shadow service may be activated by entering a specific data value. The primary one being the user entering their passphrase into the decrypt screen. Fictional keysets are output. Each keyset may have similar primary values stored on remote systems. The primary difference is that when the primary authentication value is accessed, or the ciphertext is requested to update the primary account value. All actions are completed against a deceptive sandboxed environment that looks real or is even the actual environment. The difference is this is an “alert” mode being activated. Every account notification transmitted or every request that is made may have a hidden “ALERT,” attached to it. This may signal that the user is in trouble or that a possible account takeover has occurred forcefully.
  • In order to achieve this, upon account creation an additional flagged keyset is registered with the target service. The shadow account may mirror the primary account. This provides the added benefit of being able to potentially alert multiple systems simultaneously that a user may be in grave danger, or malicious key manipulation has occurred. In the event that an attacker is trying to access multiple systems using the ‘shadow key,’ sets. Each service could help alert local authorities for maximum effectiveness.
  • MacGuffin Box™. The term “MacGuffin Box” is a trademark of the Applicant. The following describes embodiments of a method.
  • The update key is used as the verification medium that confirms that the MacGuffin Box was negated correctly. If a ‘valid,’ asymmetric signature value is able to be correctly verified, then the public key or the primary identifier/authentication medium may be reset securely. The MacGuffin Box represents an encrypted seed value, which can only be decrypted by the correct key private key value. The MacGuffin box is a seed value, or a value that is passed to an elliptic curve function to create an output of 1. Public key, 2. Private key. The public/private key pair may be used in a signing fashion. I.E. The private key may be passed to a mathematical function with a piece of data to create a cryptographically unique signature value. The output signature value has the ability to be verified by the corresponding public key.
  • The output public key is the Update Key. The output private key corresponding to the public key (Update Key) is immediately deleted upon generation. If the corresponding private key, is not successfully deleted, the recovery process could be broken. The MacGuffin Box may be encrypted using any symmetric encryption value. The reason that any symmetric encryption value may be used is that two asymmetric key groups are used to create a shared key, which resembles a symmetric encryption key. Popular encryption mechanics like AES require a nonce, or ‘number used once,’ in order to complete a successful encryption function. If this is the case, then the nonce must be concatenated to the end of the output encrypted cypher text, which makes the output key generation graph to create a viable public key, update key, and MacGuffin box. On the inverse side, all that is needed to utilize the MacGuffin box is for the creator or the authenticating user to create/use an authentication value, shared phrase, asymmetric public key, or any authenticating value that is desired. All that may be needed to reset the primary authentication value is for the owner to possess the corresponding private recovery key and know the correct algorithm used to encrypt the MacGuffin box, and the elliptic curve algorithm used to create the corresponding update key (public key), which makes the recovery/reset process. The private recovery key (private rec key) is then the decrypting value needed to unlock the MacGuffin box.
  • Turning now to FIG. 1 , a system 100 is described. The system 100 may include a first non-transitory computer-readable medium 102 storing a first program and a second non-transitory medium 104 storing a second program. The first program and second program may include instructions that, when executed by one or more processors, execute a method 200 (see also FIG. 2 ) of securely replacing a first data value with a second data value.
  • The method 200 may include generating a first public key and a first private key, generating cryptographic seed value 204, and passing the cryptographic seed value through an elliptic curve to generate a second public key and a second private key 206. The method 200 may include combining the first public key with the second private key using public key cryptography to create a shared encryption key 208, and passing the shared encryption key through a symmetric algorithm to encrypt the cryptographic seed value 210.
  • The method optionally includes removing the second private key after creating the shared encryption key and before passing the shared encryption key through the symmetric algorithm 212.
  • The method 200 optionally includes sending the encrypted cryptographic seed value and the second public key through a communications interface 106 from the first non-transitory computer-readable medium to the second non-transitory computer-readable medium 214.
  • The method 200 optionally includes receiving the encrypted cryptographic seed value and the second public key on the second non-transitory computer-readable medium 224. The method 200 optionally includes using the second public key and the first private key, generating a second shared key to decrypt the encrypted cryptographic seed value and to generate a decrypted cryptographic seed value 226.
  • The method 200 optionally includes receiving the decrypted cryptographic seed value from the second non-transitory computer-readable medium on the first non-transitory computer-readable medium 216. The method 200 optionally includes passing the decrypted cryptographic seed value through an elliptic curve to re-generate the second private key 218. The method optionally includes using the re-generated second private key, cryptographically signing the second data value 220.
  • The method 200 optionally includes sending the second signed data value through a communications interface to the second non-transitory computer-readable medium 222.
  • The method 200 optionally includes receiving the second signed data value 228. The method 200 optionally includes using the second public key, verifying that the first private key was used to decrypt the encrypted cryptographic seed value 230.
  • A first non-transitory computer-readable medium 102, which may reside on, for example only, an employee computer, may perform method steps 202, 204, 206, 208, 210, 212, 214, 216, 218, 220, 222. A second non-transitory computer-readable medium 104, which may reside on, for example, an employer computer or third party service provider network, may perform method steps 224, 226, 228, 230.
  • FIGS. 3-5 illustrate various flowcharts of features of the method 200, to better visually understand the embodiments described herein.
  • Each of the various elements disclosed herein may be achieved in a variety of manners. This disclosure should be understood to encompass each such variation, be it a variation of an embodiment of any apparatus embodiment, a method or process embodiment, or even merely a variation of any element of these. Particularly, it should be understood that the words for each element may be expressed by equivalent apparatus terms or method terms—even if only the function or result is the same. Such equivalent, broader, or even more generic terms should be considered to be encompassed in the description of each element or action. Such terms may be substituted where desired to make explicit the implicitly broad coverage to which this invention is entitled.
  • As but one example, it should be understood that all action may be expressed as a means for taking that action or as an element which causes that action. Similarly, each physical element disclosed should be understood to encompass a disclosure of the action which that physical element facilitates. Regarding this last aspect, the disclosure of a “processor” should be understood to encompass disclosure of the act of “processing”—whether explicitly discussed or not—and, conversely, were there only disclosure of the act of “encrypting”, such a disclosure should be understood to encompass disclosure of an “encrypting mechanism”. Such changes and alternative terms are to be understood to be explicitly included in the description.
  • Those skilled in the art can readily recognize that numerous variations and substitutions may be made in the invention, its use and its configuration to achieve substantially the same results as achieved by the embodiments described herein.
  • Accordingly, there is no intention to limit the invention to the disclosed exemplary forms. Many variations, modifications and alternative constructions fall within the scope and spirit of the invention as expressed in the claims.

Claims (3)

What is claimed is:
1. A system comprising a first non-transitory computer-readable medium storing a first program and a second non-transitory computer-readable medium storing a second program, the first program and second program including instructions that, when executed by one or more processors, execute a method of verifying a secure message tunnel during a communication session, the method comprising:
selecting a pseudo random byte string;
breaking the pseudo random byte string into binary format;
following the breaking the pseudo random byte string into binary format, transmitting a message between the first non-transitory computer-readable medium and the second non-transitory medium;
following the transmitting the message, shifting a binary array associated with the pseudo random byte string and assigning a unique shift value to the message;
determining the unique shift value has been reused; and
responsive to the determining the unique shift value has been reused, breaking the session.
2. The system of claim 1, wherein the method further comprises:
generating a first shared key;
retrieving ciphertext, a nonce, and a first public key from the first program;
at least one of regenerating or recalling a second private key;
passing the first public key and the second private key through a public key encryption scheme to generate a second shared key;
passing the second shared key and nonce passed through a symmetric encryption
algorithm to decrypt the ciphertext and return a secure hash; and
passing the secure hash through an elliptic curve algorithm;
3. The system of claim 2, wherein the method further comprises:
passing the first private key and a newly selected key through an asymmetric encryption signing algorithm and creating a cryptographic signature.
US17/889,583 2019-07-12 2022-08-17 Data protection and recovery systems and methods Abandoned US20220407691A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/889,583 US20220407691A1 (en) 2019-07-12 2022-08-17 Data protection and recovery systems and methods

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201962873308P 2019-07-12 2019-07-12
PCT/US2020/041522 WO2021011343A1 (en) 2019-07-12 2020-07-10 Data protection and recovery systems and methods
US17/253,822 US11444761B2 (en) 2019-07-12 2020-07-12 Data protection and recovery systems and methods
US17/889,583 US20220407691A1 (en) 2019-07-12 2022-08-17 Data protection and recovery systems and methods

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2020/041522 Continuation WO2021011343A1 (en) 2019-07-12 2020-07-10 Data protection and recovery systems and methods
US17/253,822 Continuation US11444761B2 (en) 2019-07-12 2020-07-12 Data protection and recovery systems and methods

Publications (1)

Publication Number Publication Date
US20220407691A1 true US20220407691A1 (en) 2022-12-22

Family

ID=74210894

Family Applications (2)

Application Number Title Priority Date Filing Date
US17/253,822 Active US11444761B2 (en) 2019-07-12 2020-07-12 Data protection and recovery systems and methods
US17/889,583 Abandoned US20220407691A1 (en) 2019-07-12 2022-08-17 Data protection and recovery systems and methods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US17/253,822 Active US11444761B2 (en) 2019-07-12 2020-07-12 Data protection and recovery systems and methods

Country Status (7)

Country Link
US (2) US11444761B2 (en)
EP (1) EP3997834A4 (en)
JP (1) JP2022540653A (en)
KR (2) KR20240013292A (en)
AU (1) AU2020314540A1 (en)
CA (1) CA3141024A1 (en)
WO (1) WO2021011343A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11537740B2 (en) * 2021-01-04 2022-12-27 Bank Of America Corporation System for enhanced data security using versioned encryption
EP4311162A4 (en) * 2021-08-20 2024-10-09 Samsung Electronics Co Ltd Electronic device for generating mnemonic words of private key and operating method of electronic device
CN114039727A (en) * 2021-12-09 2022-02-11 施耐德电气(中国)有限公司 Data transmission method and device, intelligent terminal and gateway equipment
US11948144B2 (en) * 2022-02-07 2024-04-02 Capital One Services, Llc Knowledge-based authentication for asset wallets
US20230291548A1 (en) * 2022-03-08 2023-09-14 Western Digital Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
CN115242468B (en) * 2022-07-07 2023-05-26 广州河东科技有限公司 Safe communication system and method based on RS485 bus
CN118051937B (en) * 2024-04-16 2024-06-21 天清数安(天津)科技有限公司 Data security destroying method based on data encryption and overwriting

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117625A1 (en) * 2002-12-16 2004-06-17 Grawrock David W. Attestation using both fixed token and portable token
US20160191494A1 (en) * 2014-12-29 2016-06-30 Vasco Data Security, Inc. Method and apparatus for securing a mobile application
US20190253249A1 (en) * 2016-10-26 2019-08-15 Alibaba Group Holding Limited Data transmission method, apparatus and system
US10615970B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Secure key exchange electronic transactions

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19935285B4 (en) * 1999-07-27 2012-07-05 Deutsche Telekom Ag Method for generating / regenerating an encryption key for a cryptography method
EP2182671B1 (en) * 2003-01-07 2019-03-20 Qualcomm Incorporated System, apparatus and method for replacing a cryptographic key
US8842833B2 (en) * 2010-07-09 2014-09-23 Tata Consultancy Services Limited System and method for secure transaction of data between wireless communication device and server
WO2013130555A2 (en) * 2012-02-29 2013-09-06 Good Technology Corporation Method of operating a computing device, computing device and computer program
EP2884690A4 (en) * 2012-08-08 2016-03-09 Toshiba Kk Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program
US10644885B2 (en) 2015-07-14 2020-05-05 Fmr Llc Firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems
CN107404461B (en) * 2016-05-19 2021-01-26 阿里巴巴集团控股有限公司 Data secure transmission method, client and server method, device and system
US10057061B1 (en) * 2016-09-13 2018-08-21 Wells Fargo Bank, N.A. Secure digital communications
CN107465505B (en) * 2017-08-28 2021-07-09 创新先进技术有限公司 Key data processing method and device and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117625A1 (en) * 2002-12-16 2004-06-17 Grawrock David W. Attestation using both fixed token and portable token
US20160191494A1 (en) * 2014-12-29 2016-06-30 Vasco Data Security, Inc. Method and apparatus for securing a mobile application
US20190253249A1 (en) * 2016-10-26 2019-08-15 Alibaba Group Holding Limited Data transmission method, apparatus and system
US10615970B1 (en) * 2017-02-10 2020-04-07 Wells Fargo Bank, N.A. Secure key exchange electronic transactions

Also Published As

Publication number Publication date
KR102644767B1 (en) 2024-03-06
US20220141012A1 (en) 2022-05-05
EP3997834A1 (en) 2022-05-18
EP3997834A4 (en) 2023-08-09
WO2021011343A1 (en) 2021-01-21
KR20220025155A (en) 2022-03-03
JP2022540653A (en) 2022-09-16
US11444761B2 (en) 2022-09-13
KR20240013292A (en) 2024-01-30
AU2020314540A1 (en) 2022-02-17
CA3141024A1 (en) 2021-01-21

Similar Documents

Publication Publication Date Title
US11444761B2 (en) Data protection and recovery systems and methods
US10439811B2 (en) Method for securing a private key on a mobile device
KR102717212B1 (en) Secure, multi-agency, loss-proof storage and transfer of cryptographic keys for blockchain-based systems linked to wallet management systems
US12003634B2 (en) Systems and methods for encrypted content management
US8059818B2 (en) Accessing protected data on network storage from multiple devices
JP5815294B2 (en) Secure field programmable gate array (FPGA) architecture
CN109150517B (en) Secret key safety management system and method based on SGX
US20170012949A1 (en) Dynamic identity verification and authentication continuous, dynamic one-time-pad/one-time passwords and dynamic distributed key infrastructure for secure communications with a single key for any key-based network security controls
US20130227286A1 (en) Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
US11588627B2 (en) Systems and methods for utilizing quantum entropy in single packet authorization for secure network connections
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
EP1992101A2 (en) Secure data transmission using undiscoverable or black data
US10630466B1 (en) Apparatus and method for exchanging cryptographic information with reduced overhead and latency
US20210144002A1 (en) Secondary Channel Authentication of Public Keys
TW201537937A (en) Unified identity authentication platform and authentication method thereof
US11088835B1 (en) Cryptographic module to generate cryptographic keys from cryptographic key parts
CN109218251B (en) Anti-replay authentication method and system
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
EP3292654A1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
Das et al. A decentralized open web cryptographic standard
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
Prakash et al. Data security in wired and wireless systems
CN115412236A (en) Method for key management and password calculation, encryption method and device
CN117859290A (en) Secure storage key

Legal Events

Date Code Title Description
AS Assignment

Owner name: ETHOPASS, LLC, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADAMS, JOSHUA FREEMAN;FORSTER, DAVID PATRICK;ROBERTSON, FRANK BARRY;REEL/FRAME:060830/0839

Effective date: 20190806

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE