Abstract: A method for establishing secure communication between a first device and a second device. The method includes generating ephemeral keys at the first device, encapsulating a public key of the second device to generate a first cipher key and a first shared secret key, transmitting a first message to the second device comprising the ephemeral public key and the first cipher key, receiving a second message from the second device containing a second cipher key, decapsulating the second cipher key to achieve a second shared secret key, receiving and decapsulating a third cipher key to achieve a third shared secret key, deriving a final encryption key using the first, second, and third shared secret keys, and establishing secure communication by encrypting communication using the final encryption key. The method further includes verifying the final encryption key with the second device through hash exchange.
Abstract: A method and system for facilitating communication in an organization. The method comprises creating a hierarchical messaging structure including one or more hierarchy levels of the organization. The hierarchical messaging structure incudes a plurality of circles structured in a genesis circle and one or more sub-circles, such that each circle includes one or more members. A message is published by a member from at least one of the one or more members of the genesis circle and the sub-circles, wherein the message is dynamically routed according to privilege rights defined in at least one of the genesis circle and the one or more sub-circles. Finally, the message is displayed selectively, at least in one of the genesis circles and one or more sub-circles of the organization.
Abstract: A method for user verification that includes scanning a photo ID of the user. A user image is extracted from the scanned photo ID. Further, a random task is generated to be performed by the user. A video is recorded to capture execution of the generated random task. The recorded video is processed to extract an audio segment and one or more image frames from the recorded video. The random task performed by the user is validated based on the extracted audio segment and the extracted one or more image frames. A user image from the extracted one or more image frames is identified. The extracted user image is compared from the scanned photo ID with the identified user image. The user is authenticated based on a successful match between the extracted user image and the identified user image, and successful execution of the generated random task.