H04L63/0442

Encryption scheme for making secure patient data available to authorized parties
11531781 · 2022-12-20 · ·

A sharing package data structure for the secure maintenance and sharing of information relating to a person with one or more parties is described. The data structure comprises: (1) a version of the data that has been encrypted in such a way that a data decryption key is needed to decrypt it; (2) a hash on the data decryption key; and (3) access control list entries each containing a version of the data decryption key that has been encrypted with a public key associated with a different party authorized to access the data. The contents of the data structure are usable to provide access to a decrypted version of the data to a party that is able to decrypt the encrypted data decryption key stored in one of the access control entries.

Authentication method

An authentication method and system for mutual authentication between a first entity and a third entity via a second entity, based on an authentication protocol used by the first entity and the third entity. The second entity forwards mutual authentication messages between the first entity and the third entity. An apparatus is configured to perform an authentication method for a mutual authentication between a first entity and a third entity via a second entity, based on an authentication protocol used by the first entity and the third entity, the second entity forwards mutual authentication messages between the first entity and the third entity.

METHOD FOR OPERATING A PRINTING SYSTEM
20220398329 · 2022-12-15 · ·

The application relates to a method for operating a printing system with a printing server and a printing device that can be connected to the printing server. The printing system is configured to obtain a print job encrypted with a public print job key from a computer connected to the printing server and to receive a private print job key encrypted with a public printing device key from a mobile user terminal. The received encrypted print job is subsequently sent to the printing device for printing.

METHOD FOR OPERATING A SCANNING SYSTEM
20220400186 · 2022-12-15 · ·

The application relates to a method for operating a scanning system with a scan server arrangement and a scanning device that can be connected to the scan server arrangement. The scanning system is configured to obtain a scan job encrypted with a public scan job key from a scanning device and to receive a private scan job key encrypted with a public computer device key from a mobile user terminal. The received encrypted private scan job key is subsequently sent to the computer device for further processing.

ANTI-REPLAY PROTECTION BASED ON HASHING ENCRYPTED TEMPORAL KEY IN A SECURE PEER-TO-PEER DATA NETWORK
20220400011 · 2022-12-15 · ·

In one embodiment, a method comprises: generating and maintaining, by a network device in a secure peer-to-peer data network, a secure private key and a corresponding secure public key; establishing, by the network device, a two-way trusted relationship with a second network device in the secure peer-to-peer data network; generating by the network device a temporal key, and encrypting a data packet payload using the temporal key into an encrypted payload; encrypting, by the network device, the temporal key into an encrypted temporal key using a second secure public key of the second network device; and generating and outputting a secure data packet comprising the encrypted temporal key and the encrypted payload, enabling a receiving network device to verify the secure data packet is not a copy based on a determined absence of a prior prescribed hash of at least a portion of the encrypted temporal key.

CRYPTO-SIGNED SWITCHING BETWEEN TWO-WAY TRUSTED NETWORK DEVICES IN A SECURE PEER-TO-PEER DATA NETWORK
20220400102 · 2022-12-15 · ·

In one embodiment, a method comprises: generating and maintaining, by a replicator device in a secure peer-to-peer data network, a secure private key and secure public key; establishing a two-way trusted relationship with a second replicator device for a pairwise topology of two-way trusted replicator devices; establishing a two-way trusted relationship with a first endpoint device based on validating a secure attachment request using the secure private key, and obtaining a second secure public key of the first endpoint device; validating, using the second secure public key, a secure data packet from the first endpoint device and destined for the second endpoint device, and obtaining information for reaching the second endpoint device via the second replicator device; and securely signing the secure data packet, received from the first endpoint device and destined for the second endpoint device, into a secure forwarded packet for secure transmission to the second replicator device.

Methods and systems for a digital trust architecture
11528138 · 2022-12-13 · ·

In some aspects, methods and systems for a digital trust architecture are provided. In some aspects, the architecture includes a user account provisioning process. The provisioning process may make use of in person verifications of some personal information to ensure authenticity of the user information. Once the authenticity of user information is established, an account may be created. The user account may include a user email account, with integrated access to digital certificates linked to the user account. Account creation may also automatically publish the new user's public key in a publicly accessible directory, enabling encrypted email information to be easily sent to the new user.

Synchronizing content

Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.

Biometric identity verification systems, methods and programs for identity document applications and renewals

An automated identity verification computing device, system and method receives an encrypted renewal request from a user computing device including a biometric value, a digital passport object identifier, and request data. The computing device, system and method retrieves trusted biometric data based on the digital passport object identifier from an identity database, determine a verification score based on the trusted biometric data and the biometric value, and generates a renewal package including the verification score, the digital passport object identifier, and the request data. The computing device, system and method transmit the renewal package to a sponsoring authority computing device.

Electronic devices having embedded circuitry for accessing remote digital services

Systems and methods for accessing remote digital services by using embedded circuitry included in an electronic device.