Patent classifications
H04L63/0478
METHOD AND SYSTEM FOR ASYNCHRONOUS SIDE CHANNEL CIPHER RENEGOTIATION
A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.
Methods and devices for increasing entropy of a blockchain using blinded outcome diversification
An implementation of the present application provides a computer—implemented method to increase the security of a blockchain—implemented transaction, the transaction including participation from a plurality of participating nodes, each participating node participating as a message originator, selector, and propagator. The method, implemented at a participating node, includes: receiving ciphertext from a prior node and determining whether the participating node is a selector node for said ciphertext received from the prior node. When the participating node is the selector node for said ciphertext, the method includes selecting a subset of said ciphertext, decrypting the selected subset of said ciphertext to provide opted ciphertext and transmitting said opted ciphertext to the next node. When the participating node is other than the selector node for said ciphertext, the method includes decrypting said ciphertext received from the prior node and transmitting the decrypted ciphertext to the next node.
Video communication data security
A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.
CONTENT ENCRYPTION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for securely publishing and accessing a media's premium content. Methods include a media that comprises premium content encrypted with a first cryptographic key. The media also comprises data structures that include this key and the access entitlements. These data structures are encrypted using the key for each entity that can authorize user access to the media. Methods further include verifying user access to the media and then providing the decrypted premium content. Methods include decrypting the data structure using the authorizing entity's key and providing the first cryptographic key in the decrypted data structure to the client device, after verifying that the user has the appropriate access entitlements for the media. Methods include decrypting the premium content using the first cryptographic key and then displaying the media, including the decrypted premium content, on the client device.
Transfer of security protected configuration data from HPLMN
Protected configuration data may be sent to user equipment subscribed to a first wireless communication network by a second wireless communication network with which the user equipment is registered. The first wireless communication network may protect the configuration data based on at least one first key when sending the data to the second wireless communication network. The second wireless communication network may send the configuration data to user equipment in messages protected by at least one second key. User equipment receives the message from the second wireless communication network, extracts the configuration data using the at least one second key, determines whether the configuration data has been altered at least in part based on the at least one first key, and applies the configuration data if the configuration data has not been altered. The protected configuration data may be sent in an information element of a control plane message.
Method and arrangement for encoding/decoding a signal at a first and second communication node in a road vehicle
Method for encoding/decoding a signal at a first and second communication node (N1; N2) in a road vehicle. A signal (1) from an on-board sensor (10) is encoded using a first encoding scheme (a), encoding the formed single encoded sensor signal (1a) using a second encoding scheme (b), decoding this double encoded sensor signal (1ab) in the second communication node (N2) based on the second encoding scheme (b), forming a decoded single encoded sensor signal (1a′). In the first communication node (N2), performing a comparison analysis, comprising at least one of the following: comparing the decoded single encoded sensor signal (1a′) with a stored single encoded sensor signal (1a), or after encoding the decoded single encoded sensor signal (1a′) with the second encoding scheme (b) comparing (110) the thus formed double encoded sensor signal (1a′b) with a stored double encoded sensor signal (1ab). If the compared sensor signals (1a′,1a; 1 ab,1a′b) match, then sending (111) a signal to the second communication node (N2) validating the sensor signal (1), and if they do not match, then initiating (112) a corrective action.
Method for embedding searchable information, encryption, signing operation, transmission, storage and retrieval
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
Secured communication between a host device and a client device
A method for a host to establish communication with a client comprising receiving a client-specific certificate and a pairing request message, verifying the client-specific certificate, verifying the pairing request message, sending a host-specific certificate and a first value, receiving a second value, verifying the second value; sending a third value, receiving an encrypted fourth value, decrypting the fourth value using a group key, determining the fourth value equals the third value, identifying the client received the group key correctly, and ending a verification message indicating successful establishment of communication.
Decentralized content fabric
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.
Systems and methods for cryptographic-chain-based group membership content sharing
In some embodiments, a first device may generate a data block for an ordered set of data blocks such that the data block is cryptographically chained to a given data block preceding the data block in the ordered set. The first device may obtain an encryption key used to encrypt information related to the data block, and use group members' keys to encrypt the encryption key to generate a group key. As an example, the group's members may include a first member associated with the first device and other members. The keys used to encrypt the encryption key may include the other members' keys. The first device may transmit the ordered set and the group key to a communication resource (e.g., accessible by the members). Other devices (associated with the other members) may use the ordered set and the group key to obtain content related to the ordered set.