Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts

S Christensen, D Becker, T Black, M Calcano… - US Patent …, 2022 - Google Patents
A system includes at least one processor and at least one memory communicatively coupled
to the at least one processor. The at least one processor is configured to encrypt each secret …

Proof-of-work key wrap** with integrated key fragments

MHM Bursell, NP McCallum, PM Jones… - US Patent …, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that uses
integrated key fragments to cryptographically control access to data. An example method …

Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts

S Christensen, D Becker, T Black, T Perkins - US Patent 11,601,264, 2023 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …

Proof-of-work key wrap** for temporally restricting data access

MHM Bursell, NP McCallum, PM Jones - US Patent 11,316,839, 2022 - Google Patents
The technology disclosed herein provides an enhanced access control mechanism that
uses a proof-of-work key wrap** system to temporally restrict access to data. An example …

Proof-of-work key wrap** with key thresholding

MHM Bursell, NP McCallum, PM Jones - US Patent 11,303,437, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that uses
key thresholding to crypto graphically control data access. An example method may include …

Proof-of-work key wrap** for verifying device capabilities

MHM Bursell, NP McCallum, PM Jones - US Patent 11,271,734, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system for verifying
device capabilities. An example method may include: receiving a wrapped key and a …

Proof-of-work key wrap** for cryptographically controlling data access

MHM Bursell, NP McCallum, PM Jones - US Patent 11,424,920, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that
cryptographically controls access to data. An example method may include: selecting a set …

Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts

S Christensen, D Becker, T Black… - US Patent App. 18 …, 2024 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …

Stream-based key management

J Khoury, SC Nelson, WT Strayer - US Patent 11,558,185, 2023 - Google Patents
Techniques for stream-based key management are disclosed. A system obtains a first
payload to be published to a first set of one or more subscribers, encrypts the first payload …

Messaging layer security (MLS) delivery service for real-time group confidentiality using hybrid information-centric networking (hICN)

O Roques, L Muscariello, G Carofiglio - US Patent 11,729,216, 2023 - Google Patents
In one embodiment, a delivery service provided by a device receives one or more
Messaging Layer Security commit messages comprising a plurality of public and private …