Patent classifications
H04L2209/24
Method and device for unlocking electronic equipment and unlocking key thereof
Disclosed is a method for unlocking an electronic equipment, and the method includes: the electronic equipment detects periodically whether there is an unlocking key in its surrounding environment, and when there is an unlocking key in the surrounding environment, transmits an unlocking request to the unlocking key; the unlocking key receives the unlocking request, determines in accordance with the unlocking request whether the electronic equipment matches the unlocking key, and when it is determined that the electronic equipment matches the unlocking key, transmits an unlocking signal to the electronic equipment so as to unlock the electronic equipment. Further disclosed are a device for unlocking an electronic equipment and an unlocking key for unlocking an electronic equipment. By means of the present disclosure, the unlocking key is enabled to automatically unlock an electronic equipment when it is disposed near the electronic equipment.
Accessing a computer resource using an access control model and policy
In one embodiment disclosed herein is a method of processing a request made by a terminal of a user to access a resource made available to a client entity by a platform of a cloud computer service supplier. The method is performed by a server situated between the terminal and the platform utilizing distinct instructions for each client entity. The method comprises verifying that the user is authorized to access the computer resource via the terminal by applying to the user and to the resource an access control model and an access control policy corresponding to the model.
WWAN-WLAN AGGREGATION SECURITY
One feature pertains to a method for secure wireless communication at an apparatus of a network. The method includes receiving a user equipment identifier identifying a user equipment and a cryptographic key from a wireless wide area network node, and using the cryptographic key as a pairwise master key (PMK). A PMK identifier (PKMID) is generated based on the PMK and the two are stored at the network. A PMK security association is initialized by associating the PMK with at least the PMKID and an access point identifier identifying an access point of the apparatus. An association request is received that includes a PMKID from the user equipment, and it's determined that the PMKID received from the user equipment matches the PMKID stored. A key exchange is initiated with the user equipment based on the PMK to establish a wireless local area network security association with the user equipment.
Method of cryptographic processing of data on elliptic curves, corresponding electronic device and computer program product
In one embodiment, it is proposed a method of cryptographic processing of data, the method being executed by an electronic device, and comprising obtaining at least two points belonging to a same elliptic curve defined on an algebraic structure being a finite ring, each point being represented by at least two coordinates. The method is remarkable in that it comprises: obtaining a parameterization of an isomorphism between said elliptic curve and another elliptic curve, said parameterization defining some configuration parameters, each configuration parameter having a range of possible values; determining in function of values of coordinates of said at least two points said configuration parameters, delivering determined configuration parameters; and obtaining coordinates of another point corresponding to an image of an addition of said at least two points through said isomorphism, said another point belonging to said another elliptic curve, and said obtaining being performed without an inversion operation in said algebraic structure, due to said determined configuration parameters.
Communication system
A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.
Techniques for securing and controlling access to data
Various embodiments are directed to techniques for controlling access to data in a decentralized manner. An apparatus includes an apportioning component to divide an item of data into multiple portions based on an organizational structure of the item of data; a tree component to generate a PRN tree including a multitude of nodes and a branching structure based on the organizational structure, the multitude including at least one branching node and multiple leaf nodes that correspond to the multiple portions; a PRN component to generate a PRN for each node of the multitude, the PRN component to use a PRN of a branching node of the PRN tree to generate a PRN for a leaf node that depends therefrom; and a communications component to transmit the multiple portions and multiple addresses based on PRNs of leaf nodes of the PRN tree to a server. Other embodiments are described and claimed.
Distributed system for multi-function secure verifiable signer authentication
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a fragmented distributed signing engine by a secure protocol and is issued a signer certificate from a circle of trust certificate server to securely electronically sign documents.
Method for creating a derived entity of an original data carrier
There is provided a method for creating an authentication entity derived from an original data carrier, wherein the original data carrier has a key pair that is individual to the original data carrier and comprises a public key and a secret key of the original data carrier, and a certificate for the public key of the original data carrier. The method comprises the following steps: deriving a secret key for the derived authentication entity from the secret key of the original data carrier by the original data carrier; forming derivation data for the derived authentication entity; transferring authentication data to the derived authentication entity, wherein the authentication data have the derivation data, the certificate of the public key of the original data carrier as well as a derived key pair which comprises the derived secret key and the public key of the original data carrier.
Apparatus and method for processing authentication information
Provided is an information processing apparatus including a physical unclonable function (PUF) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.
Cryptographic system
An inner-product predicate encryption scheme with improved flexibility without a restriction that the dimensions of an attribute vector x.sup..fwdarw. and a predicate vector v.sup..fwdarw. should be equivalent. A ciphertext having an element c.sub.0 and an element c.sub.t for each index t included in a set I.sub.x.fwdarw. is decrypted with a decryption key having an element k.sub.0 and an element k.sub.t for each index t included in a set I.sub.v.fwdarw. by computing a product of pairing operations between corresponding pairs of basis vectors on the element c.sub.0 and the element k.sub.0 and on the element c.sub.t and the element k.sub.t.