US 12,413,429 B2
Systems and methods for group messaging using blockchain-based secure key exchange with key escrow fallback
Muhammad Salman Nomani, Hillsborough, NJ (US); and John M. Stokes, Yorba Linda, CA (US)
Assigned to Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed by Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed on Jun. 27, 2022, as Appl. No. 17/809,047.
Application 17/809,047 is a continuation in part of application No. 17/321,378, filed on May 14, 2021, granted, now 11,849,032.
Prior Publication US 2022/0368546 A1, Nov. 17, 2022
Int. Cl. H04L 9/40 (2022.01); H04L 9/00 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 51/04 (2022.01); H04L 51/21 (2022.01); H04L 51/212 (2022.01)
CPC H04L 9/50 (2022.05) [H04L 9/0819 (2013.01); H04L 9/0894 (2013.01); H04L 51/04 (2013.01); H04L 51/21 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A first device, comprising:
one or more hardware processors configured to:
receive an encrypted communication from a second device, the encrypted communication being associated with a first key, wherein the encrypted communication is associated with a particular identifier;
attempt to obtain, based on the particular identifier, the first key from a blockchain, wherein attempting to obtain the first key from the blockchain includes identifying a particular block of the blockchain that includes the particular identifier and that further specifies a second key;
perform a cross-validation of the second key with at least a threshold quantity of nodes of the blockchain in order to validate the second key as being the first key;
determine, based on performing the cross-validation, that at least the threshold quantity of nodes of the blockchain did not validate the second key as being the first key;
determine, based on determining that the at least the threshold quantity of nodes of the blockchain did not validate the second key as being the first key, that the attempt to obtain the first key from the blockchain was unsuccessful;
request, based on determining that the attempt to obtain the first key from the blockchain was unsuccessful, the first key from a third device, wherein the third device obtains the first key from the second device;
receive the first key from the third device; and
use the first key, as received from the third device, to decrypt the encrypted communication from the second device.