Patent classifications
H04L63/18
Data protection for networking devices
Embodiments are described for a method and system of applying data protection software mechanisms to network equipment devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques.
Scalable onboarding for internet-connected devices
Examples described herein include systems and methods for onboarding a device into a management system. An example method can include loading a management agent onto the device and receiving inventory information for the device. The example method can further include receiving a request to whitelist the device. In some examples, the request originates from a different device, such as a device used by a technician installing the connected device. The management server can authorize the device and add it to the whitelist. After authorizing the device, the management server can onboard the device by sending management information to the management agent on the device. The management server can then exercise management control of the device through the management agent installed on the device.
MECHANISM FOR ENABLING CRYPTOGRAPHIC AGILITY IN LEGACY APPLICATIONS AND SERVICES
The disclosure provides an approach for cryptographic agility. Embodiments include establishing, by a proxy component associated with a cryptographic agility system, a first secure connection with an application. Embodiments include receiving, by the proxy component, via the first secure connection, a communication from the application directed to an endpoint. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information related to the communication. Embodiments include establishing, by the proxy component, a second secure connection with the endpoint based on the cryptographic technique. Embodiments include transmitting, by the proxy component, a secure communication to the endpoint via the second secure connection based on the communication.
SECURELY VERIFYING PROTECTED DEVICES
One or more computing devices, systems, and/or methods for securely verifying devices such as protected are provided. A code may be generated for a first device. A short message service (SMS) message comprising the code may be transmitted to the first device at a mobile directory number of the first device. An entry may be created to associate the code with the mobile directory number. A determination may be made as to whether a first code within a message associated with the mobile directory number matches the code within the entry. In response to a match, the message may be processed and a status of the first device may be marked as valid, otherwise, the message may be rejected.
Preventing shortened lifetimes of security keys in a wireless communications security system
23A wireless communications device has a first security key, a second security key, and established channels. Each established channel has a corresponding security count value, and utilizes a security key. At least one of the established channels utilizes the first security key. The second security key is assigned to a new channel. A first set is then used to obtain a first value. The first set has only security count values of all the established channels that utilize the second key. The first value is at least as great as the x most significant bits (MSB.sub.x) of the greatest value in the first set. The MSB.sub.x of the initial security count value for the new channel is set equal to the first value. If the first set is empty, then the initial security count is set to zero.
Methods and systems for blocking malware attacks
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
Methods for managing the traffic associated with a client domain and associated server, client node and computer program
A method for managing traffic associated with a client domain, implemented in a server. The method includes: detecting a communication problem between the server and at least one first client node of the client domain, called failed node, identifying at least one second client node belonging to the client domain, verifying if a session between the server and the at least one second client node is active, and if no session is active: triggering a mitigation procedure on at least one IP resource associated with the client domain if at least one session is active: the use of the second client node associated with the at least one active session, called active node, to initiate an action managing the traffic associated with the client domain.
Systems and methods for securely pairing a transmiting device with a receiving device
Systems and methods for securely pairing a transmitting device with a receiving device are described. The systems and methods may communicate with a first device via a first communication method over a wireless communication network. The systems and methods may transmit, to the first device via a second communication method, a first sensory pattern representing a first key. In addition, the system and methods may communicate with the first device via the first communication method using the first key.
Communication device and non-transitory computer-readable recording medium storing computer-readable instructions for communication device
A communication device may receive a specific signal from a first external device; display a first instruction screen; in a case where it is instructed that the target process is to be executed in a situation where the first instruction screen is displayed, send a public key to the first external device, wherein in a case where it is not instructed that the target process is to be executed in the situation where the first instruction screen is displayed, the public key is not sent; after the public key has been sent to the first external device, receive an authentication request from the first external device; send an authentication response to the first external device; receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.
Control method and information processing apparatus
A control method executed by a computer, the method includes receiving a program to identifiably display an authentication screen of a service transmitted from an authenticator in response to a reception of a first authentication request from a browser included in a terminal device to the authenticator, the browser displaying the authentication screen at the terminal device, and transmitting the received program to the terminal device.