H04L9/40

METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
20230052597 · 2023-02-16 ·

In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.

TRANSMISSION DEVICE FOR TRANSMITTING DATA
20230051229 · 2023-02-16 ·

A transmitting data between a real first network and a real second network is provided. The transmission device has a first network port for coupling to the real first network and a second network port for coupling to the real second network and also comprises: a simulation unit which is connected to the first network port and which is configured to receive network-specific data from the real first network via the first network port, to provide, in accordance with the received network-specific data, a virtual simulation network of the real first network, and to prepare the provided virtual simulation network, via the second network port, for access to the provided virtual simulation network by the real second network. The transmission device provided allows an attacker to be deliberately deceived, which increases security against attempts to access the real first network from the real second network.

In-Vehicle Speech Interaction Method and Device
20230048330 · 2023-02-16 ·

An in-vehicle speech interaction method and a device are provided. The method includes: obtaining user speech information; determining a user instruction based on the user speech information; determining, based on the user instruction, whether response content to the user instruction is privacy-related; and determining, based on whether the response content is privacy-related, whether to output the response content in a privacy protection mode, to protect privacy from being leaked.

SYSTEMS AND METHODS FOR NETWORK MONITORING, REPORTING, AND RISK MITIGATION
20230051016 · 2023-02-16 · ·

A network monitoring, reporting and risk mitigation system collects events at a computing device within the local network to provide improved network security. The events are aggregated into alerts, which may be processed according to triggering definitions in order to create ARO (action, recommendations and observations) reports providing required or recommended actions to take or observations to a network administrator. The ARO reports may be processed by a remote server in order to generate contextual feedback for updating the triggering definitions.

AUTHENTICATION TIMERS
20230047564 · 2023-02-16 ·

A first device transmits a first message to a second device as part of a challenge-response protocol in order to authenticate the second device. A power limited power supply coupled to the second device limits power consumption by the second device during the second device's challenge-response protocol calculations. The first device measures a response time of the second device during the challenge-response protocol. The authentication of the second device is based on the response time of the second device while it has limited power consumption.

SYSTEM FOR PROVIDING CUSTOMIZED COSMETICS

The present disclosure relates to a system for providing customized cosmetics by using genetic information, the system comprising: a terminal that receives user information related to a user; a genetic/medical information server that stores genetic information related to the user; a skin meter that acquires skin information on the user; and a cosmetic manufacturing system that manufactures cosmetics by discharging at least one cosmetic material, wherein the cosmetic manufacturing system can select a cosmetic material to be discharged on the basis of at least one among the user information, the genetic information, and the skin information.

VXLAN ACCESS AUTHENTICATION METHOD AND VTEP DEVICE
20230048013 · 2023-02-16 ·

A VXLAN access authentication method includes: An authentication point device receives a VXLAN authentication packet, where the VXLAN authentication packet is a VXLAN packet. The VXLAN authentication packet includes a VXLAN header and an authentication request sent by a terminal, the VXLAN header includes a first VNI, and the authentication request includes an authentication credential. The authentication point device obtains permission of the terminal or a second VNI based on the authentication credential. The permission of the terminal corresponds to the second VNI. The authentication point device sends the permission of the terminal or the second VNI to a control point device, where the control point device is a device that encapsulates the authentication request into the VXLAN authentication packet. In this application, VXLAN access authentication is performed on an overlay network, so that configuration complexity can be reduced when a VXLAN access authentication mode is modified or created.

METHOD FOR DETERMINING RISK LEVEL OF INSTANCE ON CLOUD SERVER, AND ELECTRONIC DEVICE

A method for determining a risk level of an instance on a cloud server. The method includes: obtaining one or more monitoring items of an instance to be monitored and a rule base of each monitoring item; obtaining monitoring data corresponding to each monitoring item of the instance to be monitored; and determining a risk level of the instance to be monitored under each monitoring item based on the rule base and the monitoring data of each monitoring item.

COMPUTER-IMPLEMENTED USER IDENTITY VERIFICATION METHOD
20230050280 · 2023-02-16 ·

A computer-implemented method of verifying a user's identity comprising the steps of receiving biometric user data, personalized user data, and unique phone data of a verifying user from the verifying user's electronic computing device 102, compiling the biometric user data, personalized user data, and unique phone data of a verifying user into a single user identity data file, encrypting the single user identity data file and generating a data decryption key, and segregating the single user identity data file into a plurality of encrypted segregated user identity data files each independently stored on a first administrator server and a second administrator server, wherein the plurality of encrypted segregated user identity data files may only be aggregated and decrypted upon providing secondary biometric user data, personalized user data, and unique phone data which matches the original biometric user data, personalized user data, and unique phone data of the verifying user.

METHODS AND SYSTEMS FOR DATA PROCESSING, AND STORAGE MEDIUM

A method for data processing is performed by an operation data recording device. The method includes: in response to a data access request sent by a client for a target vehicle, generating symmetric keys for symmetrically encrypting operation data of the target vehicle, in which the symmetric keys are generated based on a user ID and a primary public key for a third party, and the user ID is carried in the data access request; obtaining target encrypted data by symmetrically encrypting the operation data using the symmetric keys; and sending the target encrypted data to the client.