H04L2463/061

Method, apparatus, and system for performing an establishment of a security context between user equipment and an access node
10812256 · 2020-10-20 · ·

Embodiments of the present invention disclose a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption.

KEY DERIVATION METHOD, COMMUNICATION SYSTEM, COMMUNICATION TERMINAL, AND COMMUNICATION DEVICE

An object is to provide a key generation method capable of maintaining a high security level in each of sliced networks when network slicing is applied to a core network. A key generation method according to this disclosure specifies network slice identification information indicating a network slice system that provides a service to be used by a communication terminal (50) among a plurality of network slice systems included in a core network (10) and, using the network slice identification information, generates a service key to be used for security processing in the network slice system indicated by the network slice identification information.

SECURE KEY MANAGEMENT IN A HIGH VOLUME DEVICE DEPLOYMENT
20200329021 · 2020-10-15 · ·

A method is provided for remotely and securely accessing a modem is provided that uses an encrypted authentication token with a modem password. The method includes receiving an encrypted authentication token from the modem, the authentication token having a modem password stored in secure memory and being encrypted according to a public key, transmitting the encrypted authentication token to an authentication server. receiving a decrypted authentication token from the authentication server, the decrypted authentication token comprising the modem password, generating an authentication key and a privacy key from the modem password, configuring modem interfaces at least in part using the authentication token, the modem interfaces including a network management protocol interface and communicating with the modem using the network management protocol interface according to at least one of the generated authentication key and the privacy key.

METHODS AND SYSTEMS FOR COMMUNICATING WITH AN M2M DEVICE
20200322315 · 2020-10-08 ·

Method, apparatus and system for communicating between a machine to machine, M2M, device 110 and a device management, DM, server 420 over SMS, comprising: obtaining key material, the key material configured to protect data communicated between the M2M device 110 and the DM server 420. Protecting data to be communicated using the key material. Communicating the protected data between the M2M device 110 and the DM server 420 over SMS.

System and Method for a Self-Calculating Token Vault
20200320531 · 2020-10-08 · ·

A system and method for electronic payment that involves generating and then using a temporary token based on a legacy PAN (Primary Account Number) to conduct an electronic transaction. The token is generated by transforming the PAN using specific inputs such that the original PAN can be recovered by manipulating the token in various ways as disclosed herein. One potential manipulation that may be used is encryption/decryption. The token is transmitted to a portable electronic device such that the portable electronic device may present the token to a point-of-sale device. The POS communicates the token to a server which validates the token by, among other things, recovering the PAN. If the PAN is recovered as expected a validation message is returned to the POS device.

Security System And Method
20200322318 · 2020-10-08 ·

A security system and method for improving the security of a file/data transmitted from a special purpose user computer to a recipient special purpose computer. A special purpose computer having an individualized encryption software application server that runs individualized encryption software is provided, along with an amino acid database generator having an amino acid database storing natural and/or synthetic amino data. The individualized encryption software applicant server sends a request to the secure amino acid database generator producing the mathematical characteristics of the natural and synthetic amino acids. This is used to construct an amino acid base layer. The amino acid base layer is folded into two or three dimensional shapes and have values assigned to them, and a secret key is provided such that the transmission cannot be opened by a recipient unless he or she has the key and the values associated with the folded amino acids.

Method and system for anonymous user data storage and controlled data access

Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external to a user's computing device) and the user's data is maintained anonymously. Content is stored in association with a user identifier and access by third parties is controlled by linked third party identifiers.

Mapping slice groupings in a dispersed storage network
10795766 · 2020-10-06 · ·

A method for a distributed storage network (DSN) includes retrieving a slice of a chunk for execution of a partial task, identifying a record configuration of the slice, facilitating processing of a partial task on at least one record of the slice, and when the slice includes a partial record, identifying a slice location of another slice that includes a remaining partial record corresponding to the partial record, and when the slice location is favorable, retrieving the other slice from the slice location, and facilitating processing of the partial task on at least one record of the other slice.

SECURE NEXT-HOP COMMUNICATION

A method of a communication device of requesting data of a destination network node via at least one intermediate node in a service chain. The method comprises acquiring a secret session key configured to subsequently verify authenticity of the requested data and first seed data to be used by the at least one intermediate node and the destination node to generate the session key, transmitting the data request, an indication of the service chain to be traversed, and the first seed data to a next-hop node in the service chain, receiving, in response to the forwarded data request, the requested data having been provided with an indication of authenticity by the next-hop node, and verifying the authenticity of the received data using the acquired session key, wherein the received requested data is considered authenticated.

INCREASING SECURITY OF OBJECTS IN CLOUD ENVIRONMENTS BY USING A TWO-PART ENCRYPTION SCHEME

Provided are techniques for increasing security of objects in cloud environments by using a two-part encryption scheme. Objects to be stored in a cloud node are received. A number of keys to be used is determined. That number of keys are obtained. A sequence for the keys is obtained. The keys are concatenated using the sequence to form a concatenated key. The concatenated key is hashed to form an encryption key. Each of the objects is encrypted using the encryption key to form encrypted objects.