US 12,149,611 B2
Multicast encryption scheme for data-ownership platform
Elena Pasquali, Bolzano (IT); and Daniele Grazioli, Bolzano (IT)
Assigned to Ecosteer Srl, (IT)
Filed by Ecosteer Srl, Bolzano (IT)
Filed on Sep. 4, 2020, as Appl. No. 17/012,689.
Application 17/012,689 is a continuation of application No. 16/861,760, filed on Apr. 29, 2020, granted, now 10,771,243.
Prior Publication US 2021/0344484 A1, Nov. 4, 2021
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/0819 (2013.01) [H04L 9/0861 (2013.01); H04L 9/0891 (2013.01); H04L 9/14 (2013.01); H04L 9/3213 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable storage device having instructions stored thereon, wherein the instructions, when executed by at least one computer processor, cause the at least one computer processor to perform operations comprising: loading a first cryptographic key associated with a first subscriber who has been granted access to a data stream by a data owner, wherein access to the data steam is controlled by the data owner and wherein the first cryptographic key was received via a network channel separate from the data stream; encrypting at least one first data payload, wherein the at least one first data payload, once encrypted, requires the first cryptographic key for any subsequent decryption of the at least one first data payload; publishing, via the data stream, the at least one first data payload as encrypted; loading a second cryptographic key associated with a second who has been granted access to the data stream by the data owner, responsive to a determination that the first subscriber access has been revoked by the data owner, wherein the second subscriber differs from the first subscriber, and wherein the second cryptographic key was received via the separate network channel wherein loading the second cryptographic key further comprises publishing a message in the separate network channel, the message indicating that the second cryptographic key is going to be used; encrypting at least one second data payload, wherein the at least one second data payload, once encrypted, requires the second cryptographic key for any subsequent decryption of the at least one second data payload, and wherein the first cryptographic key is ineffective to decrypt the at least one second data payload; and publishing, via the data stream, the at least one second data payload as encrypted, wherein the first data payload and the second data payload comprise a first data point and a second data point, respectively, wherein the first data point and the second data point are collected from at least one sensor, and wherein the at least one sensor is communicatively coupled with the at least one computer processor.