H04L63/062

Encryption key management for international data residency

Media, method, and system for providing encryption key management for international data residency. Organizations using a group-based communication system can designate a particular geopolitical area where that organization's data can be stored and another geopolitical area (which may be the same or different) where encryption keys used to encrypt and decrypt that data should be stored. Users of that organization can post message or access messages previously posted on the group-based communication system from any geopolitical area, causing the system to automatically store and retrieve messages and encryption keys from the appropriate regions to allow the users to transparently access the group-based communication system while maintaining security and data residency requirements.

Asymmetric key management for cloud computing services
11539678 · 2022-12-27 · ·

A key manager receives one or more asymmetric key pairs associated with a user to be associated with remote access of cloud computing resources, selects a first asymmetric key pair of the one or more asymmetric key pairs, determines one or more cloud service providers associated with the user, selects a first cloud service provider of the one or more cloud service providers to be associated with the first asymmetric key pair, determines one or more cloud service components associated with the first cloud service provider that are accessible to the user, provisions at least one of the one or more cloud service components with the first public key, and configures a connection component to establish a secure connection to the at least one of the one or more cloud service components using the first private key.

Encrypted cross-zone replication for cross-zone replicated block storage devices

The present disclosure generally relates to creating virtualized block storage devices whose data is replicated across isolated computing systems to lower risk of data loss even in wide-scale events, such as natural disasters. The virtualized device can include at least two volumes, each of which is implemented in a distinct computing system. Each volume can be encrypted with a distinct key, and an encryption service can operate to transform data “in-flight” on the replication path between the volumes, reencrypting data according to the key appropriate for each volume.

Remote blockchain masternode deployment

A remote blockchain masternode deployment system including a light client that can deploy a remote masternode without requiring the masternode owner to lose control of the funds staked at the masternode using a transaction identifier including a transaction hash and an index instead of a transfer of locked funds on the blockchain to an address controlled by a party other than the masternode owner. The masternode owner can unilaterally dismantle the masternode and recover the staked funds by spending the staked funds to another address controlled by the masternode operator. A pingless activation allows the masternode owner to “click and run” after funding the masternode without having to wait for the funding transaction to become buried before broadcasting an activation message. A staking vault performs staking functions for the owner in a way that does not allow unilateral spending of staked funds by the vault.

DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT
20220407846 · 2022-12-22 · ·

In order to improve security upon distributing a group key, there is provided a gateway (20) to a core network for a group of MTC devices (10_1-10_n) communicating with the core network. The gateway (20) protects confidentiality and integrity of a group key, and distributes the protected group key to each of the MTC devices (10_1-10_n). The protection is performed by using: a key (Kgr) that is preliminarily shared between the gateway (20) and each of the MTC devices (10_1-10_n), and that is used for the gateway (20) to authenticate each of the MTC devices (10_1-10_n) as a member of the group; or a key (K_iwf) that is shared between an MTC-IWF (50) and each of the MTC devices (10_1-10_n), and that is used to derive temporary keys for securely conducting individual communication between the MTC-IWF (50) and each of the MTC devices (10_1-10_n).

Automated Lightweight Database Access Protocol Secure/Multipurpose Internet Mail Extensions Key Server
20220407888 · 2022-12-22 ·

A Secure/Multipurpose Internet Mail Extensions (S/MIME) key material publication system that converts cryptographic material extracted from digitally signed and validated S/MIME messages it receives into key material formats suitable for populating email address books. Publication of the address book contents both internal and external to an organization is done using the standard address book lightweight database access protocol (LDAP). The wide availability and coordination of such automated address books distributing key material across the Internet allows the large installed base of S/MIME email clients to immediately send secure encrypted email across organizational boundaries. The system serves the role of public key server thus removing a barrier to ubiquitous secure encrypted email by simplifying global key management.

Installing and manipulating a secure virtual machine image through an untrusted hypervisor

Systems, apparatuses and methods may provide for technology that associates a key domain of a plurality of key domains with a customer boot image, receives the customer boot image from the customer, and verifies the integrity of the customer boot image that is to be securely installed at memory locations determined from an untrusted privileged entity (e.g., a virtual machine manager).

Digital credentials for step-up authentication
11531783 · 2022-12-20 · ·

The system comprises an interface and a processor. The interface is configured to receive a request from an application for authorization to access, wherein access to the application is requested by a user, and receive a task request from the application for authorization to access a task, wherein access to the task is requested by the user. The processor is configured to authenticate the request from the application for authorization to access, determine that the task comprises a sensitive task, determine a user authentication device, provide a challenge for a digital credential to the user authentication device, wherein the digital credential is backed by data stored in a distributed ledger, receive a response from the user authentication device, determine the response is valid, and provide an authorization to access the sensitive task.

Methods and devices for optimal information-theoretically secure encryption key management
11533167 · 2022-12-20 · ·

Method, device and computer program product for managing a plurality of encryption keys using a keystore seed that defines a seed bit set. A key management process defines a key mapping between the seed bit set and the plurality of encryption keys. The key management process enables each encryption key to be generated from the seed bit set using a corresponding keying material value and the key mapping. The key mapping specifies that an encryption key is generated by partitioning the seed bit set into a plurality of seed bit partitions, determining a keying value from the keying material value, determining a key sequence using the plurality of seed bit partitions and the keying value, and determining the encryption key from the key sequence. Management of a large number of encryption keys can be simplified through indirect management via the keystore seed and the key management process.

METHOD AND SYSTEM FOR COMMUNICATING OVER OVERLAY NETWORKS
20220400525 · 2022-12-15 ·

A method for communicating overlay networks according to an embodiment of the present disclosure includes acquiring a first authentication information from a first authentication server by the first terminal, establishing a connection with a first relay node based on the first authentication information by the first terminal, acquiring a second authentication information from a second authentication server via the first relay node by the first terminal, and communicating with the second terminal by way of the first relay node using the second authentication information by the first terminal.