H04L63/0478

Methods and systems for secure sharing of data between user devices using a proxy re-encryption key (PRE)

Embodiments disclosed herein relate to cryptology, and more particularly to secure sharing of data objects stored in the at least one cloud device between two user devices using the PRE. Embodiments herein disclose methods and systems for enabling a first user device to subscribe with a key server for uploading encrypted data object to at least one cloud device using the PRE. Embodiments herein disclose methods and systems for allowing the first user device to share the encrypted data object stored in the at least one cloud device with a second user through the key server using the PRE.

APPARATUS AND METHOD FOR SECURE ROUTER DEVICE
20220217126 · 2022-07-07 · ·

Method, systems, and devices for providing a multi-function router. A router may receive and forward data packets at a physical network interface. The router may also run a virtualized server or router using a logical network interface mapped statically or dynamically to the physical network interface.

CONTENT RECORDING AND GROUP ENCRYPTION
20220245220 · 2022-08-04 ·

Systems and methods for managing group encryption are described. In certain methods, a content asset may be encrypted with an asset key. An account key may be determined. Using the account key, an encrypted content asset package may be generated comprising at least the asset key, wherein the encrypted content asset package is decryptable with the account key. The encrypted content asset package and an identifier associated with the account key may be transmitted, for example to a playback device.

Techniques for payment-based network transmissions

Techniques and apparatus for providing payment-based transmission processes are described. In one embodiment, for example, a network node may include a storage device, and logic, at least a portion of the logic implemented in circuitry coupled to the storage device. The logic may operate to provide a routing query to transmit information over a network, the routing query comprising at least one destination node for the information and a transmission value, receive at least one bid from at least one bidding node in response to the routing query, determine a path through the network to transmit the information anonymously based on the at least one bid that corresponds to the transmission value, and transmit the information at least partially anonymously via the path within a network packet encrypted in a number of layers of encryption corresponding to a number of intermediary nodes in the path. Other embodiments are described.

Methods and systems for controlling a smart lock

The present disclosure discloses methods and systems for controlling a smart lock. The method may include establishing a secure connection with a network, obtaining security control information through the secure connection, obtaining an operation input; performing a security verification based on the security control information and the operation input, and performing a corresponding operation based on the operation input when the security verification is passed.

Secure network protocol and transit system to protect communications deliverability and attribution

A network protocol and transit system that together provide data tunneling designed for anonymous and hidden delivery. The approach protects communications deliverability and attribution for users on any device and in any location, irrespective of the underlying operating environment. The solution provides for a fully “cloaked network” comprising zero-trust nodes, an onion routing-based bi-directional protocol with modular multi-layered encryption, evasive multi-pathing that leverages randomized ephemeral virtual circuit generation, and virtual rendezvous for person-to-person communications. The approach may be implemented “as-a-service,” in a hybrid/bridged network, on-premises, or otherwise.

Load balancing based on security parameter index values

Techniques for load balancing encrypted traffic based on security parameter index (SPI) values of packet headers and sets of 5-tuple values of the packet headers are described herein. Additionally, techniques for including quality of service (QoS)-type information in SPI value fields of packet headers are also described herein. The QoS-type information may indicate a particular traffic class according to which the packet is to be handled. Further, techniques for pre-configuring a backend host such that encrypted traffic may be migrated to the backend host from another backend host without causing temporary service disruptions are also described herein.

Homomorphic encryption with quantum key distribution encapsulation

Systems and methods for processing and transmission of encrypted data are provided. The method includes: encrypting a first data set; encapsulating the encrypted first data set in a protective layer; and transmitting the encapsulated encrypted first data set to a destination over one or more communication channels. The encrypting is performed by using a homomorphic encryption (HE) technique. The encapsulating is performed by using a quantum key distribution (QKD) encapsulation technique to generate a QKD-protected layer. The communication channels may include a classical/non-quantum channel over which the QKD-encapsulated encrypted first set of data is transmitted and a quantum channel over which a quantum key distribution is conducted, or a single communication channel to conduct both.

SYSTEMS AND METHODS FOR NETWORK PRIVACY
20220272078 · 2022-08-25 ·

A privacy gateway may communicate with user devices located at a plurality of premises. The privacy gateway may receive a data packet, from one of the user devices, indicating destinations, such as other computing devices, located external to the premises. The privacy gateway may decrypt at least a portion of the data packet to determine that at least a portion of data in the packet is associated with the user device. The privacy gateway may remove the data associated with the user device from the data packet and replace the removed data with data associated with the privacy gateway. The privacy gateway may send the data packet with the replaced data to a destination device. The privacy gateway may receive a response to the data packet from the destination device. The privacy gateway may encrypt a portion of the response and send the response to the user device.

ENFORCING SECURITY PARAMETERS SPECIFIED BY AN OWNER ON A BLOCKCHAIN PLATFORM
20220182415 · 2022-06-09 ·

An approach is disclosed on a blockchain platform for one or more intermediaries for receiving an encrypted file from a user for storage on the blockchain platform. Mapping the user to be the owner of the encrypted file. Receiving one or more security policy parameters for the encrypted file from the owner. Enforcing the security policy parameters for all access requests to the file on the blockchain platform. Optionally providing audit report of the encrypted file storage and access. The owner may be established using past read or write transactions. The encrypted file may be divided into two or more parts before sending for storage on the blockchain platform.