Patent classifications
H04L2463/062
Sending secure communications using a local ephemeral key pool
A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.
System and method for providing a universal shopping cart across multiple search platforms
Systems and methods are disclosed that provide for a linking of a product database across different search platforms and then managing payments by a generalized search entity such that users are not transitioned to a merchant site from advertisements or search results. A method includes establishing, at a generalized search entity, a link to a product database of a merchant, offering, by the generalized search entity and based on a correlation of search terms to the product database of the merchant, search results across at least a first search platform and a second search platform and receiving, from a user, a confirmation of a payment for a product associated with a search result presented on the first search platform by the generalized search entity. The generalized search entity processes the payment for the product without transitioning the user to a site operated by the merchant.
SECURE MESSAGE PASSING USING SEMI-TRUSTED INTERMEDIARIES
Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
Account association for voice-enabled devices
Systems and methods for account association with voice-enabled devices are disclosed. For example, a voice-enabled device situated in a managed environment, such as a hotel room, may be taken by a temporary resident or guest of the environment. Upon determining that the device has been removed from the environment, a device identifier associated with the device may be dissociated from components and/or services associated with environment and/or systems related thereto, and the device identifier may be associated with a user account of the user.
Device locking key management system
A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.
Two-way handshake for key establishment for secure communications
The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device initializes a secure communication session with at least one second device. Initializing the secure communication session includes transmitting an invitation to a secure communication session to the at least one second device. The at least one second device may generate a transmission root key, which may be used to derive a first key for encrypting data transmitted to the first device and a second key for decrypting received data from the first device. The at least one second device may transmit the transmission root key to the first device, which may use the transmission root key to derive a first key to encrypt data transmitted to the at least one second device and a second key to decrypt data received from the at least one second device.
SYSTEM AND METHOD FOR AUTHENTICATING, STORING, RETRIEVING, AND VERIFYING DOCUMENTS
A method is disclosed herein for preparation of an electronic document, comprising associating an unsigned document with an a first authenticated user code for a first signing user and a second authenticated user code for a second signing user, sending the unsigned document to the first signing user and the second signing user for signature, after the first signing user and the second signing user have accepted the document, decrypting the document, obtaining electronic signatures of the first signing user and the second signing user on the document, encrypting the signed document with a first key associated with the first signing party and a second key associated with a second signing party, and transferring the signed and encrypted document to a storage computer or an electronic vault. Corresponding systems also are disclosed.
System and method for providing a social media shopping experience
Disclosed are a system and process of providing social networking purchasing processes. A method includes receiving, from a posting entity and at the social networking entity, a posting or a submission of a text, an image or a video. When the submission is associated with a product within a product catalog of the posting entity, the social networking entity presents in a newsfeed of users or otherwise on the social networking entity, the text, image or video with an associated option to buy. The option to buy might be presented through a messenger application or as the user browses the posting. When there is a correlation between the posting and the product catalog, and when the user makes a purchase of the product, the user is not transitioned away from the social networking entity. Initiating a payment process occurs within the social networking entity.
Secure method, system, and computer program product for exchange of data
A method, system and computer program product for lightweight implementation of strong encryption with zero knowledge that operates in web browser without local software installation.
SYSTEM AND METHOD FOR SECURE CONTENT STREAMING, GOVERNANCE, FRAUD PREVENTION, AND THE EMBEDDING ARTIFICIAL INTELLIGENCE INTO CONTENT
An automated system configured for streamed contents, to be self-aware in preventing fraudulent tactics, during real-time and offline usages, while communicating with its owner for accurate decision making, comprising: a content player module, and a content streaming service module; configured using a codec module to embed logic, encryptions, heuristics data, associated meta data, and management data into the content format; configured to use symmetric encryption keys, public keys, biometrics, and payload data; configured to authenticate the user and content owner; configured to request, receive, send, stream content, and analytics through a secure communication; configured to provide secure virtual communications between users and content owners; configured to use a call-home data, to enable the content and content owner to communicate and update one another securely; Configured to provide real-time, and offline, fraud prevention heuristics using artificial intelligence.