-
公开(公告)号:US11973765B2
公开(公告)日:2024-04-30
申请号:US17314950
申请日:2021-05-07
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Giulio Grassi , Jacques Samain , Olivier Roques
CPC classification number: H04L63/104 , H04L9/0819 , H04L9/0861 , H04L9/0891 , H04L63/0435 , H04L63/068
Abstract: This disclosure describes techniques for controlling group access to a collaboration technology. The techniques include generating a shared encryption key among authorized producers of content associated with a collaboration technology. The techniques include receiving, by the authorized producers and from authenticated consumers, requests to access the content. The requests may be received in a partitioned manner, such that individual producers are serving a particular subset of the authenticated consumers. In response to receiving the requests, the techniques include sending the shared encryption key from the individual producers to the corresponding subset of authenticated consumers. The techniques include using the shared encryption key to encrypt content by the authorized producers, which may then be decrypted by the authenticated consumers using the shared encryption key, achieving end-to-end encryption of event content.
-
公开(公告)号:US11729216B1
公开(公告)日:2023-08-15
申请号:US17686612
申请日:2022-03-04
Applicant: Cisco Technology, Inc.
Inventor: Olivier Roques , Luca Muscariello , Giovanna Carofiglio
IPC: H04L9/40 , H04L51/046 , H04L51/06
CPC classification number: H04L63/166 , H04L51/046 , H04L51/06 , H04L63/0442
Abstract: In one embodiment, a delivery service provided by a device receives one or more Messaging Layer Security commit messages comprising a plurality of public and private keys for a Messaging Layer Security group. The delivery service identifies subsets of the plurality of public and private keys to be sent to different destination subgroups in the Messaging Layer Security group. The delivery service maps each of the subsets to Hybrid Information-Centric Networking names. The delivery service sends, based on the Hybrid Information-Centric Networking names, the subsets of the plurality of public and private keys to destination subgroups in the Messaging Layer Security group.
-
公开(公告)号:US20230283636A1
公开(公告)日:2023-09-07
申请号:US17686612
申请日:2022-03-04
Applicant: Cisco Technology, Inc.
Inventor: Olivier Roques , Luca Muscariello , Giovanna Carofiglio
IPC: H04L9/40 , H04L51/06 , H04L51/046
CPC classification number: H04L63/166 , H04L63/0442 , H04L51/06 , H04L51/046
Abstract: In one embodiment, a delivery service provided by a device receives one or more Messaging Layer Security commit messages comprising a plurality of public and private keys for a Messaging Layer Security group. The delivery service identifies subsets of the plurality of public and private keys to be sent to different destination subgroups in the Messaging Layer Security group. The delivery service maps each of the subsets to Hybrid Information-Centric Networking names. The delivery service sends, based on the Hybrid Information-Centric Networking names, the subsets of the plurality of public and private keys to destination subgroups in the Messaging Layer Security group.
-
公开(公告)号:US20220360589A1
公开(公告)日:2022-11-10
申请号:US17314950
申请日:2021-05-07
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Giulio Grassi , Jacques Samain , Olivier Roques
Abstract: This disclosure describes techniques for controlling group access to a collaboration technology. The techniques include generating a shared encryption key among authorized producers of content associated with a collaboration technology. The techniques include receiving, by the authorized producers and from authenticated consumers, requests to access the content. The requests may be received in a partitioned manner, such that individual producers are serving a particular subset of the authenticated consumers. In response to receiving the requests, the techniques include sending the shared encryption key from the individual producers to the corresponding subset of authenticated consumers. The techniques include using the shared encryption key to encrypt content by the authorized producers, which may then be decrypted by the authenticated consumers using the shared encryption key, achieving end-to-end encryption of event content.
-
-
-