Patent classifications
H04L2463/062
Management of access authorization using an immutable ledger
The system can be for the management of access authorization using an immutable ledger comprising and can include a server having a computer readable medium in communications with an immutable ledger. A set of computer readable instructions can be included in the server and can be configured for: receiving a set of data, encrypting the set of data with a data-encryption-key and storing the encrypted data on the immutable ledger, creating a key tree having a node associated with a user, creating a key-encryption-key associated with the node and the user, and, distributing the key-encryption-key to the user wherein the key-encryption-key is configured to decrypt the data-encryption-key thereby providing access to the data for the user.
NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS
A mechanism for building decentralized computer applications that execute on a distributed computing system. The present technology works within a web browser, client application, or other software and provides access to decentralized computer applications through the browser. The present technology is non-custodial, wherein a public-private key pair, which represents user identity, is created on a client machine and then directly encrypted by a third-party platform without relying on one centralized computing system
DISTRIBUTED PROCESSING OF A PRODUCT ON THE BASIS OF CENTRALLY ENCRYPTED STORED DATA
The invention provides a system for encryptedly storing product data of a product having an attached tag centrally on a product data server, and reading out the centrally stored product data by production stations which are to process the product. The product data are encrypted with a document key which in turn is encrypted with a public key of the tag. The tag contains access information for the centrally stored product data. When a production station accesses product data on the product data server, the tag carries out a re-encryption of the document key from the key system of the tag to that of the accessing production station.
USER INTERFACE FOR ACCESS CONTROL ENABLED PEER-TO-PEER SHARING
Implementations disclose a user interface that supports an access control mechanism for peer-to-peer sharing technology. An example method includes providing for display a user interface comprising a plurality of media items and a plurality of media availability indicators, wherein a portion of the user interface represents that an encrypted version of a media item of the plurality of media items and an encryption key for the encrypted version are being received over a peer-to-peer connection; updating a media availability indicator of the media availability indicators to represent that the encrypted version of the media item and the encryption key are saved; receiving an indication that the encrypted version of the media item is decrypted; and updating the media availability indicator to represent the media item is available to be experienced.
ACCESS CONTROL TECHNOLOGY FOR PEER-TO-PEER SHARING
Implementations disclose an access control mechanism for peer-to-peer sharing technology. A method includes receiving, by a processing device of a first user device, an encrypted media item and a wrapped encryption key from a second user device via a peer-to-peer connection; transmitting, by the first user device, the wrapped encryption key and a request to a media server to determine whether the first user device is authorized to play the encrypted media item; receiving, from the media server, a response indicating the first user device is authorized to play the encrypted media item, the response comprising an encryption key derived from the wrapped encryption key; and decrypting the encrypted media item using the encryption key to play the media item.
Secure multimedia transfer system
A method and apparatus for secure multimedia transfer provides an encrypted data transfer system that makes transferring multimedia content from a client to any incompatible system or to a system outside the location of the client very difficult.
JSON encryption and hashing with indication added to key-value
Methods and apparatus to provide extended object notation data are disclosed. An example apparatus includes a data handler having a first input to receive object data and a first output to output an object notation key-value pair for the object data; a string processor having a second input coupled to the first output and a second output to convey the object notation key-value pair without string literals; and a hashing and encryption handler having a third input coupled to the second output and a third output to convey the key-value pair signed with a private key, to convey the key-value pair encrypted with a public key, and to convey an indication that the encrypted key-value pair is encrypted in a key of the encrypted key-value pair.
Key encryption key wrapping
In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.
Mitigating service disruptions in key maintenance
Embodiments of the present invention provide systems and techniques for changing cryptographic keys in high-frequency transaction environments to mitigate service disruptions or loss of transactions associated with key maintenance. In various embodiments, a server device can employ a working key encrypted with a first master key to decrypt messages being communicated from a client device, whereby each message is encrypted with a first cryptogram that was generated based on the working key encrypted with the first master key. While the working key encrypted with the first master key is being employed, the server device can generate a notification including a second cryptogram generated based on the working key encrypted with a second master key for transmission to the client device. The transmitted notification can cause the client device to encrypt the messages being communicated with the second cryptogram. The server device can concurrently employ the working key encrypted with one of the first and second master keys to decrypt messages received from the client device, whether encrypted with the first cryptogram or the second cryptogram.
NETWORK COMMUNICATION METHOD HAVING FUNCTION OF RECOVERING TERMINAL SESSION
A network communication method comprises connecting, by a server and client, through networks and sharing a symmetric key, generating, by the server, a credential by which the client can be identified, through random number generation, and sharing the credential with the client, generating, by the client, transmission data containing a serial number indicating the sequence of the transmission data, and transmitting a message to the server, and generating, by the server, transmission data containing a serial number indicating the sequence of the transmission data, and transmitting a message to the client. Accordingly, the present invention has an advantage in that when a connection between a server and client is interrupted, the connection can be automatically recovered using a credential, by which a connected terminal can be identified in a network environment between the server and the client, without a separate process for authenticating a reconnected terminal.