Patent classifications
H04L2209/84
PRIVACY PROTECTED AUTONOMOUS ATTESTATION
An apparatus operating as a certificate authority (CA) is described. The apparatus can perform operations including receiving, from a plurality of requesting devices, a request to join a group. The request can include identification information for the group and attestation evidence for the plurality of requesting devices. Responsive to receiving the request, the apparatus can provide a group certificate for the group to the plurality of requesting devices.
APPARATUS AND METHOD FOR MANAGING PSEUDONYM CERTIFICATE
A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.
Secure vehicular part communication
Secure vehicular part communication is described herein. An example apparatus can include a processing resource, a memory having instructions executable by the processing resource, and a vehicular communication component coupled to the processing resource. The vehicular communication component can be configured to, in response to receiving a part public key and a part signature from a part communication component associated with a vehicular part, verify an identity of the vehicular part based on the part signature. The vehicular communication component can be configured to, in response to verifying the identity, generate a vehicular public key. The vehicular communication component can be configured to encrypt vehicular data using the part public key. The vehicular communication component can be configured to provide the vehicular public key and the vehicular data to the part communication component. The vehicular communication component can be configured to receive, from the part communication component, part data encrypted using the vehicular public key.
Distributed Ledger Systems For Modular Vehicles
The disclosure is directed to, among other things, distributed ledger systems for modular vehicles. The disclosure may involve receiving, at a first ledger associated with a first node, information regarding an interaction between the first node and a second node. The same transaction information may also be received at a second ledger associated with the second node, as well as ledgers associated with any other number of nodes. The first node, second node, and any other number of nodes may be modular vehicle components. Additionally, the first ledger, second ledger, and any other number of ledgers include a set of the same information. The first node, second node, and third node may be nodes on a distributed ledger network.
Fault tolerant provisioning verification for cryptographic keys
The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.
Quantum authentication in wireless communication networks
A wireless User Equipment (UE) performs quantum authentication with a wireless communication network. The wireless UE receives qubits that were generated by the wireless communication network and determines polarization states for the qubits. The wireless UE exchanges cryptography information with the wireless communication network. The wireless UE and the wireless communication network both generate cryptography keys based on the polarization states and the cryptography information. The wireless UE generates authentication data based the cryptography keys. The wireless UE wirelessly transfers the authentication data to the wireless communication network. The wireless communication network authenticates the wireless UE based on the authentication data and the cryptography keys.
Enabling operator controls for machine operation
A plurality of operator controls can, in an operation mode, operate a machine, and, in a validation mode, be disabled to operate the machine and selectable to provide inputs for a candidate key. A computing device can initialize the validation mode, including initializing the candidate key and, according to a number base, and a maximum storage length, of a stored key, an input multiplier; receive a plurality of inputs to the operator controls in the validation mode; determine respective numeric values of the inputs; add the candidate key to a product of the multiplier and the numeric value of a first input to update the candidate key; for each of one or more second inputs to the operator controls after the first input to the operator controls, determine whether the candidate key matches a stored key; and upon determining that the candidate key matches the stored key, output an authorization.
Methods and systems for trusted management of traffic violation data using a distributed ledger
Disclosed herein are methods and systems for managing traffic violation or enforcement data using a distributed ledger. The distributed ledger provides a transparent chain of custody/evidence related to all digital interactions with traffic violation or enforcement data. The distributed ledger can be audited for data accuracy and integrity by nodes making up the system each time one of the nodes interacts with the traffic violation or enforcement data. For example, a digital evidence package related to a traffic violation event can be generated by a node within the system and a package digest can be logged in the distributed ledger beginning with the creation of the digital evidence package and each time that the digital evidence package is processed, modified, or reviewed by nodes within the system.
Cryptographic methods and systems for authentication in connected vehicle systems and for other uses
Cryptographic authentication is described to improve security in connected vehicle systems and other applications. Identity Based Cryptography and threshold cryptography are among techniques used in some embodiments.
System and method for identifying and verifying one or more individuals using facial recognition
The invention encompasses systems and methods for identification, verification, and authentication of an individual by obtaining a biometric feature (e.g., facial recognition) of an individual using a mobile device (e.g., a mobile device camera). The system and method includes receiving from a mobile device biometric data of an individual captured by the mobile device (e.g., a camera on a mobile tablet), storing and encrypting the biometric data, securely forwarding the encrypted biometric data to a known server or database and receiving a request from the mobile device for authenticating of the individual, the request including biometric data captured by the mobile device, comparing the biometric data to known data of the individual stored on a database or server and the biometric data included in the request, and sending to the mobile device a response to the request for authenticating the individual based on a result of the comparison, wherein the response to the request allows verification of the individual and access to the individual to a secured area.