-
公开(公告)号:US11930356B2
公开(公告)日:2024-03-12
申请号:US17603325
申请日:2021-04-05
Applicant: Google LLC
Inventor: Marcel M. M. Yung , David Lazarov
IPC: H04L29/06 , H04L9/08 , H04L9/40 , H04W12/0471
CPC classification number: H04W12/0471 , H04L9/0869 , H04L63/0435 , H04L2209/80
Abstract: This document describes a three-party cryptographic handshake protocol in a wireless network in which a sighter receives, from a beacon, a packet including an exponentiation of a random value and a proxy value and generates an end-to-end encrypted ephemeral identifier (E2EE-EID) from the exponentiation of the random value and the proxy value. The sighter generates a message for an owner, selects a private key, and computes an exchanged key using the private key and the E2EE-EID. The sighter extracts a common symmetric key from the exchanged key, encrypts the message using the common symmetric key, and transmits the encrypted message to the owner.
-
公开(公告)号:US20230132742A1
公开(公告)日:2023-05-04
申请号:US17907087
申请日:2021-04-05
Applicant: Google LLC
Inventor: Marcel M.M. Yung , David Lazarov
Abstract: This document describes methods, devices, systems, and means to ensure end-to-end encryption of location information that is forwarded through a potentially untrustworthy cloud service that serves to forward the location information from a sighting device to an owner of a sighted device. The end-to-end encryption of location information preserves the privacy of location information that is provided by sighter devices that are not associated with the owner as the location information traverses network nodes from the sighter to the owner.
-
公开(公告)号:US20220124491A1
公开(公告)日:2022-04-21
申请号:US17603325
申请日:2021-04-05
Applicant: Google LLC
Inventor: Marcel M. M. Yung , David Lazarov
IPC: H04W12/0471 , H04L9/40 , H04L9/08
Abstract: This document describes a three-party cryptographic handshake protocol in a wireless network in which a sighter receives, from a beacon, a packet including an exponentiation of a random value and a proxy value and generates an end-to-end encrypted ephemeral identifier (E2EE-EID) from the exponentiation of the random value and the proxy value. The sighter generates a message for an owner, selects a private key, and computes an exchanged key using the private key and the E2EE-EID. The sighter extracts a common symmetric key from the exchanged key, encrypts the message using the common symmetric key, and transmits the encrypted message to the owner.
-
-