Patent classifications
H04L63/0478
Secure wireless cooperative broadcast networks
Cryptographically secure data communications between layered groups of devices in a wireless cooperative broadcast network encrypts datagrams twice prior to transmission by a source device, first using an inner layer key that is shared by a first group of devices, and second using an outer layer key that is shared by a second group of devices; the devices of the first group being members of the second group. Received datagrams are recovered by first decrypting with the outer layer key and second decrypting with the inner layer key.
Access control and ownership transfer of digital content using a decentralized content fabric and ledger
Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.
USING MULTI-PARTY COMPUTATION AND K-ANONYMITY TECHNIQUES TO PROTECT CONFIDENTIAL INFORMATION
This disclosure relates to protecting the confidential information of multiple entities using secure multi-party computation (MPC) and k-anonymity techniques. In some aspects, a method includes receiving, by a first MPC computing system from a client device, a content request including encrypted user group identifiers. Each encrypted user group identifier is encrypted using a first encryption key of a second MPC computing system. For each encrypted user group identifier, a request is transmitted to the second MPC computing system. The request includes the encrypted user group identifier. For each user group identifier that satisfies a k-anonymity, the first MPC computing system receives, from the second MPC computing system, a plaintext value of the user group identifier. The first MPC computing system transmits a selection parameter request to one or more platforms. The selection parameter request includes the plaintext value of the user group identifier.
Method and system for secure sharing of aerial or space resources using multilayer encryption and hosted payloads
A method and system for providing secure aerial or space communications. A general payload and a hosted payload are provided on a vehicle. The hosted payload encrypts a data packet that contains restricted data using a secure key to create an encrypted packet. The general payload encrypts the encrypted packet using a general key to create a multilayer-encrypted packet. The multilayer-encrypted packet is transmitted from the vehicle to a destination.
Encryption management
Aspects of the present disclosure relate to encryption management. A determination can be made whether an encryption algorithm is at-risk. In response to determining that the encryption algorithm is at-risk, data protected by the encryption algorithm can be identified. A security action can then be executed on the data protected by the encryption algorithm.
Maintaining quality of service treatment of packets using security parameter index values
Techniques for load balancing encrypted traffic based on security parameter index (SPI) values of packet headers and sets of 5-tuple values of the packet headers are described herein. Additionally, techniques for including quality of service (QoS)-type information in SPI value fields of packet headers are also described herein. The QoS-type information may indicate a particular traffic class according to which the packet is to be handled. Further, techniques for pre-configuring a backend host such that encrypted traffic may be migrated to the backend host from another backend host without causing temporary service disruptions are also described herein.
NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS
A mechanism for building decentralized computer applications that execute on a distributed computing system. The present technology works within a web browser, client application, or other software and provides access to decentralized computer applications through the browser. The present technology is non-custodial, wherein a public-private key pair, which represents user identity, is created on a client machine and then directly encrypted by a third-party platform without relying on one centralized computing system
MANAGEMENT OF DATA COMMUNICATION CONNECTIONS
One example method of operation may include transmitting, via a first computer device to a second computer device, a first portion of packets of a data stream over a first channel and a second portion of the packets of the data stream over a second channel bonded with the first channel, and the first portion and the second portion include different packets of the data stream, determining the data stream experienced a potential network communication error, and retransmitting at least a portion of the data stream packets over a mirrored channel transmission with the first and second channels which both retransmit in parallel at least a same portion of the retransmitted portion of the data stream.
PACKET SECURITY OVER MULTIPLE NETWORKS
Examples described herein relate to a network interface device that includes an interface and circuitry. In some examples, the circuitry coupled to the interface is to apply encryption for packets received from a first network interface device and tunnel the encrypted packets to a second network interface device. In some examples, forwarding operations by the first network interface device and forwarding operations in the second network interface device are based on different header fields.
Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
The present document discloses methods, systems and terminals for controlling encryption of information and analyzing information. The method for controlling encryption of information includes: determining a content of a message required to be encrypted when it is detected that the message needs to be encrypted and transmitted; combining and encrypting the content of the message required to be encrypted and a time parameter indicating a decryption time limit of the message to generate an encrypted data block; and sending the message in which the encrypted data block is carried.