The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 31, 2017

Filed:

Nov. 16, 2015
Applicant:

Fireeye, Inc., Milpitas, CA (US);

Inventor:

Ali Islam, Union City, CA (US);

Assignee:

FireEye, Inc., Milpitas, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 29/06 (2006.01); H04L 12/28 (2006.01); H04L 29/12 (2006.01); H04L 12/24 (2006.01); H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1408 (2013.01); H04L 9/0886 (2013.01); H04L 12/2865 (2013.01); H04L 41/50 (2013.01); H04L 61/15 (2013.01); H04L 61/1552 (2013.01); H04L 63/061 (2013.01); H04L 63/0876 (2013.01); H04L 63/123 (2013.01); H04L 9/00 (2013.01); H04L 9/08 (2013.01); H04L 9/0894 (2013.01);
Abstract

A decryption scheme for recover of a decrypted object without a cryptographic key is described. First, logical operation(s) are conducted on data associated with a first data string expected at a first location within an object having the predetermined format and data within the encrypted object at the first location to recover data associated with a portion of a cryptographic key from the encrypted object. Thereafter, logical operation(s) are conducted on that data and a first portion of the encrypted object at a second location to produce a result. Responsive to the result including data associated with the plaintext version of the second data string, logical operation(s) are conducted on a second portion of the encrypted object and the data associated with the plaintext version of the second data string to recover data associated with the cryptographic key. Thereafter, the encrypted object may be decrypted using the cryptographic key.


Find Patent Forward Citations

Loading…