| CPC H04L 9/0869 (2013.01) [G06F 21/602 (2013.01); G06F 21/6245 (2013.01); H04L 9/0894 (2013.01); H04L 63/0428 (2013.01); H04L 63/0435 (2013.01)] | 20 Claims |

|
1. A method performed at a first electronic device, comprising:
obtaining a first version of a privacy table, the first version of the privacy table comprising N first bits, wherein N is a positive integer greater than 32;
applying a predefined hashing algorithm to the first version of the privacy table to generate a second version of the privacy table having N second bits;
obtaining a first message for transmission to a second electronic device;
generating a primary key based on the second version of the privacy table;
encrypting the first message using the primary key to form an encrypted first message; and
transmitting the encrypted first message and a version identifier for the second version of the privacy table to the second electronic device, wherein, prior to transmitting the encrypted first message and the version identifier to the second electronic device, the second electronic device: (i) has a copy of the first version of the privacy table, (ii) has access to the predefined hashing algorithm, and (iii) is configured to generate the second version of the privacy table at the second electronic device upon determining that a version identifier for the second version of the privacy table does not match a version identifier for the first version of the privacy table.
|