Three-party cryptographic handshake protocol

    公开(公告)号:US11930356B2

    公开(公告)日:2024-03-12

    申请号:US17603325

    申请日:2021-04-05

    Applicant: Google LLC

    CPC classification number: H04W12/0471 H04L9/0869 H04L63/0435 H04L2209/80

    Abstract: This document describes a three-party cryptographic handshake protocol in a wireless network in which a sighter receives, from a beacon, a packet including an exponentiation of a random value and a proxy value and generates an end-to-end encrypted ephemeral identifier (E2EE-EID) from the exponentiation of the random value and the proxy value. The sighter generates a message for an owner, selects a private key, and computes an exchanged key using the private key and the E2EE-EID. The sighter extracts a common symmetric key from the exchanged key, encrypts the message using the common symmetric key, and transmits the encrypted message to the owner.

    End-to-End Encrypted Location-Finding

    公开(公告)号:US20230132742A1

    公开(公告)日:2023-05-04

    申请号:US17907087

    申请日:2021-04-05

    Applicant: Google LLC

    Abstract: This document describes methods, devices, systems, and means to ensure end-to-end encryption of location information that is forwarded through a potentially untrustworthy cloud service that serves to forward the location information from a sighting device to an owner of a sighted device. The end-to-end encryption of location information preserves the privacy of location information that is provided by sighter devices that are not associated with the owner as the location information traverses network nodes from the sighter to the owner.

    Three-Party Cryptographic Handshake Protocol

    公开(公告)号:US20220124491A1

    公开(公告)日:2022-04-21

    申请号:US17603325

    申请日:2021-04-05

    Applicant: Google LLC

    Abstract: This document describes a three-party cryptographic handshake protocol in a wireless network in which a sighter receives, from a beacon, a packet including an exponentiation of a random value and a proxy value and generates an end-to-end encrypted ephemeral identifier (E2EE-EID) from the exponentiation of the random value and the proxy value. The sighter generates a message for an owner, selects a private key, and computes an exchanged key using the private key and the E2EE-EID. The sighter extracts a common symmetric key from the exchanged key, encrypts the message using the common symmetric key, and transmits the encrypted message to the owner.

Patent Agency Ranking