H04K1/00

Method for communicating in a network, a communication device and a system therefor

The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier.

Gaming headset with voice scrambling for private in-game conversations
09769569 · 2017-09-19 · ·

An electronic device may be configurable to operate in a scrambling mode and a non-scrambling mode while processing chat audio and microphone audio for a first player participating in an online multiplayer game via a game console. While operating in the non-scrambling mode, the electronic device may be configured to transmit the microphone audio to the game console without scrambling the microphone audio. While operating in the scrambling mode, the electronic device may be configured to scramble the microphone audio and transmit the scrambled microphone audio to the game console. The electronic device may be operable to select a scrambling key used to scramble the microphone audio based on a signal received by the electronic device that indicates a role of the player in the online multiplayer game. The role of the player may correspond to which of two or more opposing teams the first player is a member of in the online multiplayer game.

Quantum key distribution device, quantum key distribution system, and computer program product

According to an embodiment, a quantum key distribution device includes a quantum key distributor, a sifter, a corrector, an identifier, a classifier, a calculator, and a privacy amplifier. The quantum key distributor obtains a photon string from a photon string of two or more intensities of light pulses. The sifter obtains pulse information indicating the light pulse to which each bit of a shared bit string corresponds. The corrector corrects an error included in the shared bit string and generates a post-correction bit string. The identifier generates error position information. The classifier classifies each bit of the post-correction bit string. The calculator calculates the error rate for each light pulse and each base using the error position information. The privacy amplifier generates a cryptographic key from the post-correction bit string on the basis of the error rate.

Control of information units for encryption

In response to receiving a login request message with a security indicator enabled for security, a storage port establishes a security association by transmitting a response indicating a login accept with the security indicator enabled for security. In response to establishing the security association, the storage port modifies a protocol behavior for transmitting and receiving information units.

SYSTEM AND METHOD FOR OMNICHANNEL SOCIAL ENGINEERING ATTACK AVOIDANCE
20220046053 · 2022-02-10 ·

A method, computer program product, and computer system for identifying social engineering activity associated with at least one of a first communication and a second communication based upon, at least in part, correlation to a predetermined rule. Characteristics of the communications are compared to the predetermined rule to determine if there is a correlation.

Customer- or patient-based selective data encryption in medical device management

A system for remotely managing a medical device includes a selective shielding component, configured to (a) shield with an electronic key any portion of device information that identifies the medical device individually while maintaining unshielded with the electronic key an association between such any portion and a rest of the device information and/or (b) shield with an electronic key any portion of device information that identifies the patient individually while maintaining unshielded with the electronic key an association between such any portion and a rest of the device information, and record the selectively shielded device information; a first communication component configured to facilitate transmitting the selectively shielded device information through a network; and a server device communicatively coupled to the network and configured to use the selectively shielded device information to generate reports about the device information, and the clinical event information, but wherein the server device lacks access to the electronic key.

Blockchain-based data authorization method and apparatus

One or more implementations of the present specification provide a blockchain-based data authorization method and apparatus. The method can include receiving, by a blockchain node, an authentication transaction submitted by a privacy computing platform, where the authentication transaction queries whether a data user has obtained authorization of target data possessed by a data owner, and in response to determining that the data user has obtained authorization of the target data, executing, by the blockchain node, a smart contract invoked by the authentication transaction to provide an authorization token to the privacy computing platform that instructs the privacy computing platform to obtain the target data, and send a computational result of one or more predetermined computational operations based on the target data to the data user.

Scrambling for wireless communications

Aspects of the present disclosure describe scrambling of information for wireless communications to prevent deciphering or altering by unintended recipients. An example method may include generating, by a first device, a scrambling key based on at least one of a freshness parameter or a private key. The private key is known by the first device and a second device. The method also includes scrambling a payload based on the scrambling key at a physical layer. A packet includes the payload for wireless transmission from the first device to the second device via a shared channel.

Acoustic detector for solid medium with wireless transmission
11212121 · 2021-12-28 · ·

An example acoustic detector includes an acoustic transducer, an analog-to-digital converter, an encryption module, and a wireless communication interface. The acoustic transducer is to be coupled to a solid medium and is configured to generate an electrical signal in response to acoustic waves propagating through the solid medium. The analog-to-digital converter is coupled to the acoustic transducer to convert the electrical signal into digital acoustic data. The encryption module is coupled to encrypt the digital acoustic data to generate encrypted acoustic data and the wireless communication interface is coupled to transmit the encrypted acoustic data via one or more radio access technologies (RATs).

DYNAMICALLY ENCRYPTED RADIO FREQUENCY FINGERPRINTING
20210392497 · 2021-12-16 ·

Aspects described herein provide for hardening an RF signature by dynamically utilizing a sending device carrier frequency offset (CFO) as part of the RF signature. The CFO and the CFO varying pattern of wireless devices observed. A radio frequency signature at a sending device is paired to a frequency offset estimation algorithm at a receiving device, the final CFO estimation error may be bounded to a small range for various applications and communication protocols, and utilized to properly identify the sending device at the receiving device.