End to end encryption
First Claim
1. A method comprising:
- accessing, at a computing device, an image, the image including a geometric shape;
determining that the accessed image includes a candidate shape inside the geometric shape;
determining, using the candidate shape, an orientation of the geometric shape;
determining a public signing key (B) of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape;
receiving a message at the computing device;
verifying, based on the public signing key of the communication partner device, whether the message is from the communication partner device;
providing an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device;
providing an output indicating an error if the message is not verified to be from the communication partner device;
comparing the public signing key determined by decoding the data encoded within the geometric shape to a preexisting public key for the communication partner device;
marking the preexisting public key as trusted in response to the comparison determining the public signing key and the preexisting public key are equivalent; and
communicating with the communication partner device using the preexisting public key based on the preexisting public key being marked as trusted.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.
32 Citations
26 Claims
-
1. A method comprising:
-
accessing, at a computing device, an image, the image including a geometric shape; determining that the accessed image includes a candidate shape inside the geometric shape; determining, using the candidate shape, an orientation of the geometric shape; determining a public signing key (B) of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape; receiving a message at the computing device; verifying, based on the public signing key of the communication partner device, whether the message is from the communication partner device; providing an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device; providing an output indicating an error if the message is not verified to be from the communication partner device; comparing the public signing key determined by decoding the data encoded within the geometric shape to a preexisting public key for the communication partner device; marking the preexisting public key as trusted in response to the comparison determining the public signing key and the preexisting public key are equivalent; and communicating with the communication partner device using the preexisting public key based on the preexisting public key being marked as trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 21, 22, 23, 24)
-
-
12. A non-transitory machine-readable medium comprising instructions which, when executed by one or more processors of a computing device, cause the computing device to perform operations comprising:
-
accessing an image, the image including a geometric shape; determining that the accessed image includes a candidate shape inside the geometric shape; determining, using the candidate shape, an orientation of the geometric shape; determining a public signing key (B) of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape; receiving a message; verifying, based on the public signing key of the communication partner device, whether the message is from the communication partner device; providing an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device; providing an output indicating an error if the message is not verified to be from the communication partner device; comparing the public signing key determined by decoding the data encoded within the geometric shape to a preexisting public key for the communication partner device; marking the preexisting public key as trusted in response to the comparison determining the public signing key and the preexisting public key are equivalent; and communicating with the communication partner device using the preexisting public key based on the preexisting public key being marked as trusted. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 25)
-
-
20. A system comprising:
-
one or more hardware processors; and a memory comprising instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising; accessing an image, the image including a geometric shape; determining that the accessed image includes a candidate shape inside the geometric shape; determining, using the candidate shape, an orientation of the geometric shape; determining a public signing key (B) of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape; receiving a message; verifying, based on the public signing key of the communication partner device, whether the message is from the communication partner device; providing an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device; providing an output indicating an error if the message is not verified to be from the communication partner device; comparing the public signing key determined by decoding the data encoded within the geometric shape to a preexisting public key for the communication partner device; marking the preexisting public key as trusted in response to the comparison determining the public signing key and the preexisting public key are equivalent; and communicating with the communication partner device using the preexisting public key based on the preexisting public key being marked as trusted. - View Dependent Claims (26)
-
Specification