H04L9/0833

GROUPING DATA IN AN ORGANIZED STORAGE SYSTEM
20230101443 · 2023-03-30 · ·

A method including determining, by a device, an assigned key pair including an assigned key pair including an assigned public key and an assigned private key; determining, by the device for a folder associated with encrypted content, a folder access key pair including a folder access public key and a folder access private key; determining, by the device for a group, a group access key pair including a group access public key and a group access private key; encrypting, by the device, the folder access private key by utilizing the assigned public key; encrypting, by the device, the folder access private key by utilizing the group access public key; and accessing, by the device, the folder based on decrypting the folder access private key by utilizing the group access private key or based on decrypting the folder access private key by utilizing the assigned private key. Other aspects are contemplated.

ENHANCED SECURITY OF SECRET DATA FOR DYNAMIC USER GROUPS

A system can control access to encrypted data shared by a group of users by the use of a vault key that is associated with a group of users. The encrypted data can include encrypted secret data generated from the secret data using a secret key, an encrypted secret key can be generated from the secret key by the use of a vault key, and an encrypted vault key generated from the vault key by the use of a public key associated with a user of the group of users. The system can allow users to store and access the encrypted data only if the user is a current member of the group. The system can verify the user's membership status from a group manager, such as a system managing a channel or chat session.

COMPLIANCE AUDITING FOR ENCRYPTED VIDEO CONFERENCES
20230034088 · 2023-02-02 · ·

One example method includes receiving, by a compliance auditing server, an indication of an encrypted video conference; sending, by the compliance auditing server, a request to a video conference provider to join a compliance auditing participant to the encrypted video conference, wherein the video conference provider does not have access to the compliance auditing server; receiving and storing, by the compliance auditing server, encrypted streams of audio and video from a plurality of participants in the video conference, wherein: the compliance auditing participant is one of the plurality of participants; and the video conference provider does not have access to the cryptographic meeting key; receiving, by the compliance auditing server after the encrypted video conference has ended, a request for a portion of the encrypted streams of audio and video; and providing, in response to the request, the portion of the encrypted streams of audio and video.

DELEGATED AUTHORIZATION VIA SINGLE ACCESS TOKEN

An information handling system may include a processor; a memory; and a management controller. The information handling system may be configured to: receive, at the management controller and from a client information handling system, a request for management associated with the management controller; determine an audience claim of a token associated with the request, wherein the audience claim comprises a group identifier, and wherein the group identifier is associated with a plurality of management controllers; and in response to a determination that the management controller is one of the plurality of management controllers with which the group identifier is associated, cause the management controller to service the request.

Sharing grouped data in an organized storage system
11616642 · 2023-03-28 · ·

A method including determining, by the first device for a group, a group access key pair including a group access public key and a group access private key; determining, by the first device, a sharing encryption key based on the group access private key and an assigned public key associated with a second device; encrypting, by the first device, the group access private key based on utilizing the sharing encryption key; determining, by a second device, a sharing decryption key based on the group access public key and an assigned private key associated with the second device; decrypting, by the second device, the group access private key based on utilizing the sharing decryption key; and accessing, by the second device, the group based on utilizing the group access private key. Various other aspects are contemplated.

System and methods for fast, secure and power efficient occupancy session management
11490254 · 2022-11-01 · ·

An automated vehicle parking system uses a driver's authentication device, such as a mobile phone or portable tag, to identify the driver. Vehicle sensing terminals detect when and where a vehicle has parked and send wireless notifications to the vehicle owner's authentication device. The authentication device, the vehicle sensing terminal and a cloud server interact using secure wireless communications to validate the driver's qualifications and record the parking event. Vehicle sensing terminals detect when the vehicle leaves its parking space and the parking system automatically terminates the parking session. The authentication device handles the bulk of the communication with the cloud server to reduce consumption of the vehicle sensing terminal's power supply. The sensing and portable tag devices communicate using secure tokens that are encrypted with unique individual or group keys.

PREVENTING FRAUD IN AGGREGATED NETWORK MEASUREMENTS
20220353251 · 2022-11-03 ·

Methods, systems, and apparatus, including a method for preventing fraud. In some aspects, a method includes: receiving, from multiple client devices, a measurement data element that includes a respective group member key and a group identifier for a given conversion as a result of displaying a digital component. Each client device uses a threshold encryption scheme to generate, based at least on network data that includes one or more of impression data or conversion data for the conversion, a group key that defines a secret for encrypting the network data and generate, based on data related to the application, the respective group member key that includes a respective share of the secret. In response to determining that at least the threshold number of measurement data elements having the same group identifier have been received, the network data is decrypted using the group member keys in the received measurement data elements.

Securing Application Communication

In embodiments of systems and methods for synchronous content presentation, a user equipment (UE) may generate a freshness parameter, generate a unique session key based on a first session key and the freshness parameter, and send the freshness parameter to a Network Application Function (NAF) of a network device in a configuration that will enable the NAF to generate the unique session key. The network device may receive the freshness parameter, receive from a Key Server Function (KSF) the first session key, and generate based on the freshness parameter and the first session key the unique session key. The UE and the network device may then conduct secure communications using the unique session key without exchanging the unique session key between the two devices.

SERVER NODE, DIGITAL ASSISTANT AND METHODS IN A COMMUNICATIONS NETWORK FOR HANDLING ACCESS CONTROL
20220345313 · 2022-10-27 ·

A method performed by a server node for handling access control of a request to access information from a first user is provided. Based on a group identity, the server node establishes that a first UE uses a DA that is shared. The server node decides whether the first user of the first UE is enforced to access control to get access to the requested information, based on the type of information requested, the voice profile identity and that the DA for providing the voice message is shared.

Optimized simultaneous authentication of equals (SAE) authentication in wireless networks
11611875 · 2023-03-21 · ·

Authentication with security in wireless networks may be provided. A first confirm message comprising a first send-confirm element and a first confirm element may be received. Next, an Authenticator Number Used Once (ANonce) may be generated and a second confirm message may be sent comprising the ANonce, a second send-confirm element, and a second confirm element. Then an association request may be received comprising a Supplicant Number Used Once (SNonce) and a Message Integrity Code (MIC). An association response may be sent comprising an encrypted Group Temporal Key (GTK), an encrypted Integrity Group Temporal Key (IGTK), the ANonce, and the MIC. An acknowledgment may be received comprising the MIC in an Extensible Authentication Protocol (EAP) over LAN (EAPoL) key frame and a controller port may be unblocked in response to receiving the acknowledgment.