Patent classifications
H04L2209/601
Method and system for performing broadcast encryption with revocation capability
A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SK.sub.ID1 and the secret key SK.sub.ID1 is sent to the user ID1 via a secure data channel. During a Decrypt stage, the user uses the secret key SK.sub.ID1, to decrypt the Cipher Text (CT) and obtain the message M. During a Revoke stage of k users (k=1, 2, 3, . . . ) a State Update Message (SUM) which is sent to all users, is provided and each user updates his state with the SUM he received, such that the k users having identities ID.sub.1, ID.sub.2, . . . ID.sub.k will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked. Temporary revocation is done by inserting a list of IDs (ID.sub.1, ID.sub.2, . . . ID.sub.k) to be revoked into the CT.
Multiparty Key Exchange
This invention pertains to secure communications between multiple parties and/or secure computation or data transmission between multiple computers or multiple vehicles. This invention provides a secure method for three or more parties to establish one or more shared secrets between all parties. In some embodiments, there are less than 40 parties and in other embodiments there are more than 1 million parties that establish a shared secret. In some embodiments, establishing a shared secret among multiple parties provides a method for a secure conference call. In some embodiments, a shared secret is established with multiple computer nodes across the whole earth to help provide a secure Internet infrastructure that can reliably and securely route Internet traffic. In some embodiments, a shared secret is established so that self-driving vehicles may securely communicate and securely coordinate their motion to avoid collisions. In some embodiments, a shared secret is established with multiple computer nodes that participate as a network, performing blockchain computations.
Key provisioning for broadcast control channel protection in a wireless network
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may communicate with a base station in a wireless communications system. The base station may transmit signaling to the UE over a broadcast channel. The base station may transmit control signaling to the UE that indicates a broadcast root key. The UE may identify the broadcast root key for a wireless network corresponding to the base station. The base station may transmit an encrypted broadcast transmission. The UE may receive the encrypted broadcast transmission from the base station, and the UE may decrypt the encrypted broadcast transmission to obtain broadcast information based on a cell-specific key derived from the broadcast root key.
Intercepting not directly interceptable program object property
One or more instances in program code that references an identifier of the standard web object model program object property that is prevented by a web browser from being directly reassigned are identified. The one or more instances in the program code that references the identifier of the standard web object model program object property that is prevented by the web browser from being directly reassigned are modified with one or more corresponding replacement references that include a replacement identifier. The replacement identifier id defined in the program code as being associated with a new program object property defined to invoke the standard web object model program object property in addition to being defined to perform additional processing of a resource identifier associated with the invocation of the standard web object model program object property.
Delayed encoding of resource identifiers
A resource identifier to be encoded dynamically upon detection of a triggering event is identified. The resource identifier is allowed to remain not encoded prior to detection of the triggering event. The triggering event that will cause the resource identifier to be consumed by a web browser is detected. In response to detecting the triggering event, the resource identifier is encoded, and an encoded version of the resource identifier is provided for consumption by the web browser.
Key management for fast transitions
When an access point associates with an electronic device, the access point may establish secure communication with the electronic device using a four-way handshake with the electronic device. Next, the access point may distribute secondary pairwise master keys (PMKs) to radio-frequency (RF)-neighbor access points of the access point in a wireless local area network, where the secondary PMKs facilitate fast basic service set (BSS) transitions with the electronic device when a handover occurs without using the four-way handshake to establish secure communication with the electronic device. Furthermore, when the access point receives information that indicates that the electronic device has associated with a second access point in the RF-neighbor access points of the access point, the access point provides instructions to delete the secondary PMKs at the RF-neighbor access points of the access point, and provides additional secondary PMKs to RF-neighbor access points of the second access point.
SECURE LAYERED ENCRYPTION OF DATA STREAMS
Technology permitting secure storage and transmission of data stream as well as tiered access to multiple data stream according to permission. Data streams may be encrypted using symmetric encryption performed with varying symmetric keys according to a key stream of symmetric keys. Native data may be discarded for safety. Whole or partial key streams may be encrypted using the public keys of authorized entities having permission to access respective data streams or portions thereof. Only the corresponding private keys can decrypt the encrypted key streams required to decrypt the encrypted data streams. Thus rigorous access control is provided. IT personnel accessing data stream files on a server or intruders maliciously obtaining files will not be able to derive the data stream. Sensitive data streams may be stored using cloud services despite inherent risks.
Secure broadcast delivery and verification
A vehicle receives a first portion of content via ATSC broadcast, generates a random nonce, responsive to receiving the content, and sends the nonce and a request for content verification to a remote server. The vehicle receives a message from the remote server indicating whether the first portion of content is likely valid, the message including a second portion of content and a hash value when the content is likely valid. The vehicle then calculates a second hash value, using the random nonce and the first portion of content. The vehicle compares the second hash value to the first hash value, and responsive to the second hash value matching the first hash value, combines the second portion of content and the first portion of content to create combined content. The vehicle then uses a security strategy to convert the combined content into utilizable content, and utilizes the content.
HOME DEVICE CONTROL METHOD AND DEVICE
A home device control method and a device. When detecting that the home device meets a preset condition, the electronic device sends a second message to the home device, to indicate the home device to use a first antenna and to indicate to obtain a random code; receives the random code sent by the home device by using the first antenna; accesses a wireless local area network based on the random code, and obtains configuration information including an interface element of a control page and a control instruction that are used to control the home device; and displays the control page and interacts with a user by using the control page, and sends the control instruction to the home device through the wireless local area network, to control the home device.
Mechanisms and apparatus for securing broadcast content distribution of time-sensitive data
Aspects of the subject disclosure may include, for example, authenticating a user device based on communication over a data plane of a network, generating a decryption key, transmitting the decryption key to the user device, and transmitting encrypted content to the user device. The encrypted content may be accessible at the user device via the encryption key, potentially as a function of location and/or time. Other embodiments are disclosed.