H04L2463/061

Device and Method of Handling Data Transmission/Reception for Dual Connectivity
20170156060 · 2017-06-01 ·

A communication device for handling data transmission/reception for dual connectivity comprises a storage unit for storing instructions of connecting to a first base station (BS) and a second BS; receiving a message from the first BS, wherein the message configures a handover to a third BS and a connection change to a fourth BS; updating a first parent key to a first updated parent key and updating a second parent key to a second updated parent key based on the first updated patent key, in response to the message; updating a first security key to a first updated security key based on the first updated patent key and updating a second security key to a second updated security key based on the second updated parent key, in response to the message.

Encryption methods and apparatus

The embodiments discussed herein relate to updating and encrypting passwords for one or more computing devices. The computing devices can be associated with a common user account. According to the embodiments discussed herein, the user the can update a password of the user account at one computing device, and log into another computing device using the updated password without having to provide the current password for the other computing device. The embodiments incorporate a variety of encryption and key generation methods in order to safely transmit password updates between local computing devices. Specifically, the embodiments set forth methods and apparatus for generating and storing breadcrumbs that allow for decrypting a current password of a computing device using a new password.

Method, Apparatus and System for Handshaking Between Client and Server
20170149571 · 2017-05-25 ·

Disclosed are a method, an apparatuses and a system for handshaking between a client and a server. The method includes: sending handshaking request information by the client to a source server through a cache server; encrypting, by the source server, certificate information with a private key managed by the source server; sending, to the cache server, the encrypted certificate information configured to be forwarded to the client; verifying the certificate information by the client; sending, to the cache server, key generation information configured to be forwarded to the source server; and decrypting the key generation information by the source server through the private key to obtain a symmetric key.

Sensor derived authentication for establishing peer-to-peer networks

Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is experienced by both devices (e.g., a common physical stimulus). Each device can then use an identical, predetermined algorithm to generate a common authentication key based on the stimulus. The devices can use the common authentication key to establish a secure network.

Methods and apparatus for generating keys in device-to-device communications
09660804 · 2017-05-23 · ·

Methods and apparatus are provided for securing device-to-device communications. A method can comprise: at an access network apparatus, obtaining from a core network apparatus and storing a first key shared between a first user equipment and the core network apparatus for device-to-device communications of the first user equipment; receiving from a second user equipment, a request for generating a second key for a device-to-device communication between the first user equipment and the second user equipment; in response to the request, generating the second key based on the first key and security parameters; and sending the second key to the second user equipment.

Protection from data security threats

A credential, such as a password, for an entity is used to generate multiple keys. The generated keys are distributed to credential verification systems to enable the credential verification systems to perform authentication operations. The keys are generated such that access to a generated key allows for authentication with a proper subset of the credential verification systems. Thus, unauthorized access to information used by one authentication system does not, by itself, allow for successful authentication with other authentication systems.

ENCRYPTING SEGMENTED DATA IN A DISTRIBUTED COMPUTING SYSTEM
20170139843 · 2017-05-18 ·

A method begins by a dispersed storage (DS) processing module segmenting a data partition into a plurality of data segments. For a data segment of the plurality of data segments, the method continues with the DS processing module dividing the data segment into a set of data sub-segments and generating a set of sub keys for the set of data sub-segments based on a master key. The method continues with the DS processing module encrypting the set of data sub-segments using the set of sub keys to produce a set of encrypted data sub-segments and aggregating the set of encrypted data sub-segments into encrypted data. The method continues with the DS processing module generating a masked key based on the encrypted data and the master key and combining the encrypted data and the masked key to produce an encrypted data segment.

Deriving a WLAN security context from a WWAN security context

Techniques for deriving a WLAN security context from an existing WWAN security context are provided. According to certain aspects, a user equipment (UE) establishes a secure connection with a wireless wide area network (WWAN). The UE may receive from the WWAN an indication of a wireless local area network (WLAN) for which to derive a security context. The UE then derives the security context for the WLAN, based on a security context for the WWAN obtained while establishing the secure connection with the WWAN and establishes a secure connection with the WLAN using the derived security context for the WLAN. This permits the UE to establish a Robust Security Network Association (RSNA) with the WLAN while avoiding lengthy authentication procedures with an AAA server, thus speeding up the association process.

SECURE SESSION CAPABILITY USING PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE PRIVATE KEY

A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake procedure, the server receives a premaster secret that has been encrypted using a public key bound with a domain for which the client device is attempting to establish a secure session with. The server transmits the encrypted premaster secret to another server for decryption. The server receives the decrypted premaster secret and continues with the handshake procedure including generating a master secret from the decrypted premaster secret and generating one or more session keys that are used in the secure session for encrypting and decrypting communication between the client device and the server.

Wireless Power Control, Metrics and Management
20170134182 · 2017-05-11 ·

A device (200) for linking a personal controller (10) to a smartmeter (300) and a home automation device (24) which includes a wireless communications module (202) configurable to communicate with the personal controller selectively using peer-to-peer and non-peer-to-peer communications protocols. The device also includes a local network communications module (206) operable for communication with the smartmeter and the home automation device. The device is adapted to report energy usage without locally storing the energy usage data.