End-to-End Encrypted Location-Finding

    公开(公告)号:US20230132742A1

    公开(公告)日:2023-05-04

    申请号:US17907087

    申请日:2021-04-05

    Applicant: Google LLC

    Abstract: This document describes methods, devices, systems, and means to ensure end-to-end encryption of location information that is forwarded through a potentially untrustworthy cloud service that serves to forward the location information from a sighting device to an owner of a sighted device. The end-to-end encryption of location information preserves the privacy of location information that is provided by sighter devices that are not associated with the owner as the location information traverses network nodes from the sighter to the owner.

    METHODS FOR PROTECTING PRIVACY
    3.
    发明申请

    公开(公告)号:US20220060319A1

    公开(公告)日:2022-02-24

    申请号:US17298893

    申请日:2019-12-04

    Applicant: Google LLC

    Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.

    Computing Systems and Devices with Cryptographic Agility

    公开(公告)号:US20250080508A1

    公开(公告)日:2025-03-06

    申请号:US18440539

    申请日:2024-02-13

    Applicant: Google LLC

    Abstract: Provided are computer systems which demonstrate improved cryptographic agility via inclusion of multiple cryptographic operating modes. In one example, one or more devices included within a computing system are designed to include multiple cryptographic operating modes from the outset (e.g., prior to deployment of the system, “by design”). Additionally or alternatively, one or more devices included within the computing system (e.g., a gateway computing device) can be updated to include the multiple cryptographic operating modes after deployment of the system (e.g., in an “ad hoc” fashion). A system can also include both device(s) that have multiple operating modes by design and device(s) that have multiple operating modes introduced in an ad hoc fashion. Inclusion of the multiple cryptographic operating modes can serve to enhance the security of at least the communications of the computing system that are performed by or follow the updated device(s).

    METHODS FOR PROTECTING PRIVACY
    5.
    发明公开

    公开(公告)号:US20240204991A1

    公开(公告)日:2024-06-20

    申请号:US18590514

    申请日:2024-02-28

    Applicant: Google LLC

    CPC classification number: H04L9/085 H04L9/0869 H04L9/32 H04L2209/50

    Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.

Patent Agency Ranking