Methods And Apparatuses For Maintaining Secure Communication Between A Group Of Users In A Social Network
First Claim
Patent Images
1. A method of maintaining security between a group of users in a social network, comprising:
- identifying, by a social network host, a group of users, U1 . . . Um of the social network who securely communicate between each other using an initial commonly derived shared key that the social network host can not derive;
adding, by the social network host, at least one additional user Um−
1 to the group of users of the social network, wherein the at least one additional user cannot derive the initial shared key; and
storing shared data D1 sent by one user in said group of users, the shared data being encrypted by an updated commonly derived shared key.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments address various methods and apparatuses that attempt to minimize the time that the security communication between group members may be at risk due to a user joining or leaving. For example, embodiments include methods of minimizing the time for which a joining member receives a secure commonly shared key and other embodiments include methods of minimizing the time that a user leaving the group has access to data shared within the group through updating the secure commonly shared key.
-
Citations
25 Claims
-
1. A method of maintaining security between a group of users in a social network, comprising:
-
identifying, by a social network host, a group of users, U1 . . . Um of the social network who securely communicate between each other using an initial commonly derived shared key that the social network host can not derive; adding, by the social network host, at least one additional user Um−
1 to the group of users of the social network, wherein the at least one additional user cannot derive the initial shared key; andstoring shared data D1 sent by one user in said group of users, the shared data being encrypted by an updated commonly derived shared key. - View Dependent Claims (2, 6, 7, 8, 9, 10)
-
-
3-5. -5. (canceled)
-
11. A method of maintaining security between a group of users in a social network, comprising:
-
identifying a group of users, U1 . . . Um of the social network, by a social network host, who securely communicate between each other using a commonly derived shared key that the social network host can not derive; removing a user Ui from the group of users who securely communicate between each other; and updating at least one published parameter on which the updated commonly derived shared key is to be based, wherein the group of users minus the removed user can now securely communicate between each other without the removed user being able to derive the commonly shared key without the social network host being able to derive the commonly shared key. - View Dependent Claims (13, 14, 15, 16)
-
-
12. (canceled)
-
17. A method of maintaining security between a group of users in a social network, comprising:
-
identifying a group of users, U1 . . . Um of the social network, by a social network host, who securely communicate between each other using a initial commonly derived shared key that the social network host can not derive; adding at least one additional user Um+1, who can not derive the shared key, to the group of users of the social network, by the social network host; switching users Um and Um+1 upon the expiration of a timer, wherein user Um did not update its Xm value by the end of the timer; and updating at least the Xm value, now corresponding to the joining user on which an updated commonly derived shared key is to be based, wherein the group of users and the additional new user, except for switched user Um+1, can now securely communicate between each other using the updated commonly derived shared key based on the updated Xm value, without the social network host being able to derive the updated commonly shared key.
-
-
18. (canceled)
-
19. An apparatus comprising:
-
a memory; and at least one processor coupled to the memory and configured to; identify a group of users, U1 . . . Um of the social network, by a social network host who securely, communicate between each other using an initial commonly derived shared key that the social network host can not derive; add at least one additional user Um+1 who can not derive the shared key to the group of users of the social network, by the social network host; and update at least one published parameter on which an updated commonly derived shared key is to be based, wherein the group of users and the additional user can now securely communicate between each other using the updated commonly derived shared key based on the updated at least one published parameter without the social network host being able to derive the updated commonly shared key.
-
-
20. An apparatus comprising:
-
a memory; and at least one processor coupled to the memory and configured to; identify a group of users, U1 . . . Um of the social network, by a social network host who securely, communicate between each other using a commonly derived shared key that the social network host can not derive; remove a user Ui from the group of users who securely communicate between each other; and update at least one published parameter on which an updated commonly derived shared key is to be based, wherein the group of users minus the removed user can now securely communicate between each other without the removed user being able to derive the updated commonly shared key and without the social network host being able to derive the updated commonly shared key.
-
-
21. A method of maintaining security between a first user and additional users in a social network, comprising:
-
securely communicating between members of a first group of users that includes the first user and a first number of the additional users using an initial commonly shared key derived by the first user from parameters provided by the first number of additional users; deriving an updated commonly derived shared key by the first user from parameters provided by a second different number of additional users; and securely communicating between members of a second group of users that includes the first user and the second number of additional users. - View Dependent Claims (22, 23, 24, 25)
-
Specification