Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
S Christensen, D Becker, T Black, M Calcano… - US Patent …, 2022 - Google Patents
A system includes at least one processor and at least one memory communicatively coupled
to the at least one processor. The at least one processor is configured to encrypt each secret …
to the at least one processor. The at least one processor is configured to encrypt each secret …
Proof-of-work key wrap** with integrated key fragments
MHM Bursell, NP McCallum, PM Jones… - US Patent …, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that uses
integrated key fragments to cryptographically control access to data. An example method …
integrated key fragments to cryptographically control access to data. An example method …
Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
S Christensen, D Becker, T Black, T Perkins - US Patent 11,601,264, 2023 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
Proof-of-work key wrap** for temporally restricting data access
MHM Bursell, NP McCallum, PM Jones - US Patent 11,316,839, 2022 - Google Patents
The technology disclosed herein provides an enhanced access control mechanism that
uses a proof-of-work key wrap** system to temporally restrict access to data. An example …
uses a proof-of-work key wrap** system to temporally restrict access to data. An example …
Proof-of-work key wrap** with key thresholding
MHM Bursell, NP McCallum, PM Jones - US Patent 11,303,437, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that uses
key thresholding to crypto graphically control data access. An example method may include …
key thresholding to crypto graphically control data access. An example method may include …
Proof-of-work key wrap** for verifying device capabilities
MHM Bursell, NP McCallum, PM Jones - US Patent 11,271,734, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system for verifying
device capabilities. An example method may include: receiving a wrapped key and a …
device capabilities. An example method may include: receiving a wrapped key and a …
Proof-of-work key wrap** for cryptographically controlling data access
MHM Bursell, NP McCallum, PM Jones - US Patent 11,424,920, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that
cryptographically controls access to data. An example method may include: selecting a set …
cryptographically controls access to data. An example method may include: selecting a set …
Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
S Christensen, D Becker, T Black… - US Patent App. 18 …, 2024 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
Stream-based key management
Techniques for stream-based key management are disclosed. A system obtains a first
payload to be published to a first set of one or more subscribers, encrypts the first payload …
payload to be published to a first set of one or more subscribers, encrypts the first payload …
Messaging layer security (MLS) delivery service for real-time group confidentiality using hybrid information-centric networking (hICN)
In one embodiment, a delivery service provided by a device receives one or more
Messaging Layer Security commit messages comprising a plurality of public and private …
Messaging Layer Security commit messages comprising a plurality of public and private …