H04L2463/062

Configuration of headless network appliances

A system and method for securely encrypting and booting a headless appliance. A computerized method is disclosed that includes: providing the network appliance with content encrypted with a secret key; launching the network appliance in a fallback configuration that provides limited operational capabilities; forwarding a request for the secret key to an online service that independently utilizes an identity provider to establish trust with an appliance administrator; receiving the secret key from the online service upon establishment of trust with the appliance administrator; decrypting the content with the secret key received from the online service; and utilizing the content to launch the network appliance in a full configuration.

System for securing memory dumps
11431481 · 2022-08-30 · ·

Disclosed are some implementations of systems, apparatus, methods and computer program products for securing memory dumps. In response to a trigger condition, a server generates a symmetric key corresponding to an instance of a memory dump. The server encrypts memory contents of the server using the symmetric key. In addition, the server encrypts the symmetric key using a key-encrypting key (kek), which can include a public key Both the encrypted memory contents and the encrypted symmetric key are stored for the instance of the memory dump. Responsive to a request for information pertaining to the instance of the memory dump, the encrypted memory contents and the encrypted symmetric key are retrieved from storage, the encrypted symmetric key is decrypted using a private key, and the symmetric key is used to decrypt the encrypted memory contents.

Secure payload delivery
11431689 · 2022-08-30 · ·

A system includes a secure payload generator and a payload warehouse. The secure payload generator receives a payload, which includes a private key and a corresponding public key. For example, the private key may include information for decrypting a message encrypted with the public key. An encryption vector is determined based at least in part on the public key. The private key is encrypted using the determined encryption vector. The encrypted private key and the corresponding public key are provided to the payload warehouse. The payload warehouse stores the encrypted private key and the corresponding public key as a secured payload.

METHOD AND SYSTEM FOR PERSONALIZING A SECURITY ELEMENT OF A TERMINAL
20170230830 · 2017-08-10 ·

Provided are a method for personalizing a security element for a mobile end device for communicating via a mobile radio network as well as a corresponding system. The method comprises the following steps: supplying initialization data of an initialization entity to the security element, wherein the initialization data comprise a personalization token; supplying the personalization token from the security element to a personalization entity; checking the validity of the personalization token through the personalization entity; and after successfully checking the validity of the personalization token, supplying personalization data from the personalization entity to the security element, wherein authorization data for authenticating the security element in encrypted form are already part of the initialization data and the personalization data comprise a key for decrypting the authorization data.

INFORMATION PROCESSING SYSTEM, COMMUNICATION RELAY DEVICE, LICENSE SERVER, PROGRAM, AND DATA RECOVERY METHOD
20170230346 · 2017-08-10 · ·

A communication relay device that relays communication performed between an image processing device and an application server via a network includes: an exchange key generating unit that generates an exchange key, and transmits the exchange key to the image processing device and a license server; a relay information generating unit that generates relay information used for relaying the communication; a storage unit that stores the relay information; a communication relay unit that relays the communication; a backup unit that transmits the relay information to a backup server connected to the network; an exchange key authenticating unit that determines whether or not an exchange sequence start condition is satisfied, and, when satisfied, acquires the exchange key and transmits the exchange key to the license server; and a setting reflecting unit that acquires the relay information from the backup server, and stores the relay information in the storage unit.

Secure communications system for direct transfer between mobile device
09730059 · 2017-08-08 · ·

Apparatus and associated methods relate to securely transmitting, directly between two mobile devices, AES-256 encrypted file attachments which are decrypted within an application program (APP) using a decryption key that is available only to the APP. In an illustrative embodiment, the encrypted file may be attached to an e-mail. The e-mail may be transmitted directly to another mobile device via direct Wi-Fi, for example. The e-mail may be transmitted directly to another mobile device using Bluetooth, for example. In encrypted attachment may be deciphered only within the APP running on the receiving mobile device using a private key accessible to only the APP.

METHOD AND SYSTEM FOR GRANTING REMOTE ACCESS TO AN ELECTRONIC DEVICE
20220311767 · 2022-09-29 ·

Methods, systems, devices and computer-readable media for granting remote access to an electronic device are described herein. An electronic device obtains an encrypted password comprising a password encrypted with a public encryption key. The electronic device outputs the encrypted password for a device user computer to transmit the encrypted password to a support computer to have the encrypted password decrypted with a private encryption key corresponding to the public encryption key. The electronic device receiving an access request comprising the password from the support computer. The electronic device grants the support computer access thereto when the password of the access request from the support computer corresponds to the password at the electronic device.

Authentication method and system using password as the authentication key
09727715 · 2017-08-08 ·

A computer implemented user authentication method, according to which a mobile application is installed on the mobile terminal device of the user and when the user inputs his username and password, the mobile application creates a private and public encryption keys and encrypts the password with the public key. Data including the encrypted password, the username and the public key is sent to a dedicated server and stored therein as an encrypted file under the username, along with information required for contacting the user's mobile terminal device. The user to selects, and enrolls to, an advanced authentication mechanism, which creates an authentication key for validating the identity of the user and encrypting the private key. The encrypted private key is stored on the user's terminal device. Upon launching the mobile application, the user selects a preferred advanced authentication mechanism which returns an authentication key upon successful authentication of the user. The authentication key is used to decrypt the encrypted private key. Then the encrypted password for the user is retrieved and the private key is used to decrypt the user's password. The user's username and password are then forwarded to the mobile application, to complete the authentication.

Control Method, Apparatus, and System
20220272077 · 2022-08-25 ·

A first device and a home hub have a same TEE platform, and a second device and the home hub have different TEE platforms. A control method includes the home hub receiving an identity credential of the second device and public key information of the first device from the second device. The home hub controls an IoT device based on the identity credential of the second device. The home hub receives private key information that is of the first device and that is from the first device. The home hub forms an identity credential of the first device based on the public key information of the first device and the private key information of the first device to control the IoT device.

Federated messaging

The present disclosure describes a method, system, and non-transitory computer readable medium that includes instructions that permit users of different secure communication networks to exchange secure communications. A secure communication platform includes a user database that allows users from different secure communication networks to access keys for recipients outside of their network. Additionally, the secure communication platform provides a high degree of trust regarding the sender's identity, allowing the receiving network to trust the sender.