Patent classifications
H04L9/0833
METHODS AND SYSTEMS FOR COMPRESSED ENCRYPTION
Disclosed herein are method and systems for transmitting a plurality of ciphertexts to a plurality of users. The systems and methods described herein provide for performing an encryption update comprising a plurality of encryption keys and a multi-ciphertext to a plurality of recipient nodes. Methods and systems for organizing a database are also disclosed herein.
SECURELY RECORDING AND RETRIEVING ENCRYPTED VIDEO CONFERENCES
One disclosed example method includes obtaining a meeting cryptographic key; transmitting, from a client device to a video conference provider, a request to initiate an encrypted video conference, the encrypted video conference including a plurality of participants; distributing the meeting cryptographic key to each participant of the plurality of participants; obtaining a public cryptographic key of a key pair, the key pair including the public cryptographic key and a private cryptographic key; encrypting the meeting cryptographic key using the public cryptographic key; transmitting, from the client device to the video conference provider, a request to record the video conference; encrypting audio and video from a microphone and image sensor of the client device using the meeting cryptographic key; transmitting the encrypted audio and video to the video conference provider; and providing the encrypted meeting cryptographic key to the video conference provider.
Public key protection techniques
Methods, systems, and devices for public key protection techniques are described. An embedded multimedia card (eMMC) may be formatted to include a permanent write protect group that is configured to prevent disabling of write protection for data stored in the permanent write protect group. The eMMC may store a public key associated with a first host device in the permanent write protect group of the eMMC. A data package may be received from the host device and authenticated by using the public key stored in the permanent write protect group. The embedded memory controller may be configured to prevent modifying or writing data to a permanent write protect group.
Compliance auditing for encrypted video conferences
One example method includes receiving, by a compliance auditing server, an indication of an encrypted video conference; sending, by the compliance auditing server, a request to a video conference provider to join a compliance auditing participant to the encrypted video conference, wherein the video conference provider does not have access to the compliance auditing server; receiving and storing, by the compliance auditing server, encrypted streams of audio and video from a plurality of participants in the video conference, wherein: the compliance auditing participant is one of the plurality of participants; and the video conference provider does not have access to the cryptographic meeting key; receiving, by the compliance auditing server after the encrypted video conference has ended, a request for a portion of the encrypted streams of audio and video; and providing, in response to the request, the portion of the encrypted streams of audio and video.
METHOD AND SYSTEM FOR PERFORMING TELEMETRY SERVICES FOR COMPOSED INFORMATION HANDLING SYSTEMS
Techniques described herein relate to a method for performing telemetry services for composed information handling systems. The method includes obtaining, by a system control processor manager, a telemetry request associated with a composed information handling system from a user associated with a group; in response to obtaining the telemetry request: identifying a telemetry intent associated with the telemetry request; aggregating telemetry data based on the telemetry intent to obtain aggregated telemetry data; encrypting the aggregated telemetry data based on telemetry distribution information associated with the group to obtain encrypted aggregated telemetry data; and providing the encrypted aggregated telemetry data to the group.
Method of secure communication among protected containers and system thereof
There is provided a method of communication among at least two processes miming on the same computer. The method comprises: generating, by at least one process of the at least two processes, a group key usable for encrypting/decrypting a data unit retrieved from/stored to shared access memory, wherein the generating utilizes, at least, a nonce provided by each of the at least two processes, and wherein the nonces are provided as encrypted integrity-protected data according to, at least, a platform-provided hiding function, wherein each process executes in a protected container, the processes are signed by a single signing authority, and the protected container infrastructure enables use of encrypted, integrity-protected data according to a platform-provided hiding function and a platform-provided revealing function; and verifying, by at least one process of the at least two processes, that a data unit read from shared access memory is successfully decrypted using the group key.
Method and device for cross-domain strong logical isolation and secure access control in the internet of things
Embodiments of the present disclosure provide a method and a device for cross-domain strong logically isolation and secure access control in the Internet of Things (IoT). The method includes the following. When one IoT gateway receives the identity authentication request, the IoT gateway sends the identity authentication request to all IoT gateways in the domain excluding that IoT gateway. When all IoT gateways in the domain receive the identity authentication request, all IoT gateways verify separately whether the identity authentication request is legal. After a certain IoT gateway obtains the identity authentication result, a distributed consensus procedure is initiated. The IoT gateways in the domain reach a consensus on the identity authentication result through a distributed consensus mechanism, and the identity authentication result is written and stored to a block of a blockchain.
Apparatus and method for terminating an authorization to access a record in a blockchain ledger
A record of authorization including user information is received and appended to a blockchain. The record of authorization authorizes access by a third-party application to the user information for an access duration. The user information is encrypted by a group key and access duration is based on a change to the group key. The group key comprises a public/private key pair, and the access duration is implemented by an authorization group of nodes having the group key. The group key corresponds to either a valid group key at or near the start of the access duration, that enables decryption of a message in the record of authorization that includes the user information, or an incompatible group key at or after the end of the access duration, that does not enable decryption of the message in the record of authorization that includes the user information.
SYSTEM AND METHOD FOR SHARED SESSIONS IN COMMUNICATION NETWORKS
A system, apparatus and method are provided for supporting shared sessions in communication networks. The system, apparatus and method include interoperation between a User Equipment and serving nodes of a communication network. The serving nodes communicate with at least one anchor node of the communication network. In some implementations a shared session identifier and User Equipment identifying component are used to identify a User Equipment within a shared session. In some implementations, a paging notification is used to inform one or more target User Equipment that of a downlink message relating to the shared session.
MUTUAL AUTHENTICATION BETWEEN A HARDWARE TOKEN AND NON-NETWORKED DEVICE
Systems and methods for performing mutual authentication between a hardware access token and a reader device are provided. The systems and methods include reading a unique or pseudo-unique identifier of the hardware access token and computing a password for the hardware access token based on the unique or pseudo-unique identifier and a group secret of the reader device.