COMMUNICATION PROTOCOL
    1.
    发明申请

    公开(公告)号:WO2020051012A2

    公开(公告)日:2020-03-12

    申请号:PCT/US2019/048137

    申请日:2019-08-26

    Abstract: A zero knowledge communications protocol is provided that can unconditionally secure communications sent through a communications network by encrypting all messages, continuously sending noise messages through the network, and routing all network activity through an anonymity network. This combination of components prevent an eavesdropper on the network from garnering any information about when a communication is sent, the contents and statistics of a communication, the sender, or the intended recipient of the communication.

    COMMUNICATION PROTOCOL
    2.
    发明申请

    公开(公告)号:WO2020051012A3

    公开(公告)日:2020-03-12

    申请号:PCT/US2019/048137

    申请日:2019-08-26

    Abstract: A zero knowledge communications protocol is provided that can unconditionally secure communications sent through a communications network by encrypting all messages, continuously sending noise messages through the network, and routing all network activity through an anonymity network. This combination of components prevent an eavesdropper on the network from garnering any information about when a communication is sent, the contents and statistics of a communication, the sender, or the intended recipient of the communication.

    SECURING DATA IN MOTION
    3.
    发明申请

    公开(公告)号:WO2020131870A1

    公开(公告)日:2020-06-25

    申请号:PCT/US2019/066850

    申请日:2019-12-17

    Abstract: Techniques are disclosed for transmitting a secure message over a public or untmsted network. The techniques include receiving a message and creating multiple hash values of the message. A sending device signs and encrypts the message and hash values, then encapsulates and transmits to the message and hash values a security server. The security server receives and de-encapsulates the message and hash values, decrypts the message and hash values, and verifies the signature. The security server verifies the hash values and determines whether any changes were made to the message during transmission. If verified, the security server processes the message for transmission to the recipient. The security server creates multiple hash values of the original message, signs and encrypts the message and the hash values, encapsulates the message and hash values and transmits to a recipient device for further verification and presentation to the recipient.

    MULTI-HOP SECURITY AMPLIFICATION
    4.
    发明申请

    公开(公告)号:WO2020112949A1

    公开(公告)日:2020-06-04

    申请号:PCT/US2019/063533

    申请日:2019-11-27

    Abstract: Techniques are disclosed for multi-hop security amplification. The techniques disclosed provide multi-hop security amplification by applying a secret sharing scheme to data as the data is routed within a network to an intended recipient device. In an embodiment, a sending device divides the data into shares based on a secret sharing scheme, and sends the shares to respective network nodes in a network. These network nodes then divide their respective shares into lower-level shares based on the secret sharing scheme, and route the lower-level shares to downstream network nodes for further routing to the intended recipient device. The intended recipient device receives some or all of the lower-level shares and reconstructs the data from the received lower-level shares. In an embodiment, the secret sharing scheme is a threshold-based secret sharing scheme, such as Shamir's secret sharing scheme.

Patent Agency Ranking