CPC G06F 21/6218 (2013.01) [G06F 11/1464 (2013.01); G06F 11/1469 (2013.01); G06F 21/32 (2013.01); G06F 21/602 (2013.01); G06F 21/78 (2013.01); G06F 21/107 (2023.08)] | 18 Claims |
1. A computer-implemented method for use in securing a backup data file, the method comprising:
receiving, by a mobile device, a request to backup a data file;
generating, by the mobile device, an L4 key;
for each contact attribute of the data file:
generating, by the mobile device, an L3 file including the L4 key and an identifier associated with a user; and
encrypting, by the mobile device, the L3 file with an un-masked version of the contact attribute;
compiling, by the mobile device, the encrypted L3 file(s) and the masked version(s) of the contact attribute(s) into an L2 file;
generating, by the mobile device, an L2 key;
encrypting, by the mobile device, the L2 file with the L2 key;
compiling, by the mobile device, the encrypted L2 file and L2 key into an L1 file;
generating, by the mobile device, an L1 key;
encrypting, by the mobile device, the L1 file with the L1 key;
compiling, by the mobile device, an L4 file to include multiple identity attributes of the user;
encrypting, by the mobile device, the L4 file with the L4 key;
combining, by the mobile device, the encrypted L4 file and the encrypted L1 file;
signing, by the mobile device, the combination of the encrypted L4 file and the encrypted L1 file with a private key;
compressing, by the mobile device, the combined L4 and L1 files; and
storing, by the mobile device, the compressed files in a storage device apart from the mobile device.
|