END-TO-END ENCRYPTED VIDEO CONFERENCES
Assignee
Zoom Communications, Inc.
Inventors
Max Krohn
Abstract
Techniques for implementing end-to-end encrypted video conferences are disclosed. In an example method, a client device generates a first key. The client device outputs a request to initiate a locked, end-to-end encrypted video conference encrypted based on the first key. The client device encrypts the first key using public keys of each participant. The client device distributes the encrypted first key to the participants. The client device receives a request to admit an additional participant to the end-to-end encrypted video conference. The client device rejects the request. The client device generates a second key. The client device encrypts the second key using the public keys. The client device distributes the encrypted second key to the participants and the additional participant. The client device outputs a request to restart the end-to-end encrypted video conference for the participants and the additional participant that will be encrypted based on the second key.
CPC Classifications
Filing Date
2025-11-20
Application No.
19396068