H04L29/00

VEHICLE COMMUNICATIONS BUS DATA SECURITY
20210312043 · 2021-10-07 ·

A method of real-time data security of a communications bus, the method comprising the steps of: reading at least an early portion of a message being transmitted over a communications bus, determining whether the message is suspicious, according to at least one rule applied on the read early portion of the message, and upon determining that the message is suspicious, corrupting at least a part of the message.

System and apparatus for transferring data between communication elements

A method, device and machine-readable storage device for transferring data between identity modules is disclosed. Data is stored in one of a first removable storage module coupled to a donor communication device and a memory of the donor communication device, or both. A first portion of the data is provided to a server. The server provides the first portion of the data to a second removable storage module coupled to a recipient communication device responsive to a determination that a recipient communication device has a right to the data. Additional embodiments are disclosed.

Security systems and methods for encoding and decoding content
11132464 · 2021-09-28 · ·

Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.

Method and apparatus for establishing chat group

A method including: receiving, from a first terminal, a request for establishing a chat group without receiving an identifier of an existing social network contact; monitoring incoming requests for additional users to join the first chat group; while monitoring, detecting a request from a second terminal to obtain information of other terminals located around the second terminal; in accordance with the request from the second terminal and in accordance with a determination that the second terminal and the first terminal are located within a preset distance, requesting authentication information corresponding to the first chat group; receiving the authentication information from the second terminal, wherein the authentication information is obtained by the second user independently of the server of the social network platform; and in accordance with a determination that the authentication information is correct, establishing the first chat group including the first user and the second user.

Systems and methods for associating and verifying an association of a transducer with an imaging device
11103212 · 2021-08-31 · ·

The present disclosure describes system, application, and/or methods for enabling operation of a transducer probe with a medical imaging device. An example method includes the steps of retrieving a user identification code assigned to a user associated with an imaging device, retrieving a transducer identification code of a transducer probe from a memory of the transducer probe responsive to connecting the transducer probe to the imaging device, generating a temporary digital key based on the user identification code and the transducer identification code, retrieving a stored digital key from the memory of the transducer probe, verifying an association of the transducer probe including comparing the stored digital key with the temporary digital key, enabling operation of the transducer probe with the imaging device if the stored digital key matches the temporary digital key.

Propagating belief information about malicious and benign nodes

Example embodiments disclosed herein relate to propagating belief information about malicious and benign nodes. In one example, a domain name system (DNS) resolution graph including multiple nodes is determined. In this example, a first subset of nodes is determined based on an initial benign value or an initial unknown value associated with the respective nodes. In the example, benign belief information is propagated for the first subset based on the respective initial benign values. Moreover, in the example, a second subset of the nodes is determined based on an initial malicious value or an initial unknown value. Malicious belief information is propagated for the second subset based on the respective malicious values. The propagated belief information is copied to a DNS resolution graph.

Identity authentication method, device, and system

This application discloses an identity authentication method, a device, and a system. The method includes: obtaining a first master public key and a first private key from a key generation center; sending a ClientHello message; obtaining a second identity from a ServerKeyExchange message; generating a pre-shared key of a selected PSK mode by using the second identity, the first private key, and the first master public key; and completing identity authentication with a second device by using the pre-shared key. According to the method, device, and system provided in embodiments of this application, an identity can be transmitted by using information in the TLS protocol, without extending the TLS protocol. This can avoid a compatibility problem caused by TLS protocol extension.

Security processing unit of PLC and bus arbitration method thereof

The present invention relates to a security processing unit of PLC and a bus arbitration method thereof, to provide PLC with an active defense means to build a PLC hardware and software security layer. On a hardware security layer, a part of hardware processing mechanism is added to support trusted measurement, encryption algorithms and signature algorithms, and a virtual isolation technology is used; and on a software security layer, transparent encryption and decryption, integrity verification, backup recovery and virtual isolation security mechanism are provided. The security processing aspect is improved to achieve the purpose of security and reliability. The present invention can correctly establish a trusted environment of PLC to ensure that PLC is guided by a strictly verified path. A new star type trusted structure is designed to reduce loss during information transmission and increase information transmission efficiency.

Information processing apparatus, information processing method and storage medium
11126700 · 2021-09-21 · ·

An information processing apparatus includes a processor that functions as a login section, an accepting section, a notifying section and a removing section. The login section performs a login process based on a predetermined account assigned to a first user. The accepting section accepts a use request of a predetermined function from the first user when the login process has been performed by the login section. The notifying section notifies a second user about the use request accepted by the accepting section. The removing section removes prohibition on execution of a process relevant to the predetermined function based on removal instruction information from the second user notified by the notifying section.

Anonymous social communications

An anonymous or ad hoc communication is established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a user of smart phone may wish to send a message to an unknown user's smartphone. The anonymous or ad hoc communication thus allows messaging with an unknown user.