Patent classifications
H04L2463/062
Dynamic passcodes in association with a wireless access point
A method includes receiving, at an access point, an access request from a first device after an expiration of a first passcode. The access request is encrypted based on the first passcode. The method includes making a determination by the access point before an expiration of a usage time of a first passcode usage list that an identifier of the first device is included in the first passcode usage list. The method also includes, in response to making the determination, generating, at the access point, data representing a second passcode by encrypting the second passcode using the first passcode; and sending the data representing the second passcode from the access point to the first device.
ELECTRONIC DEVICE AND CONTROL METHOD THEREFOR
The present invention relates to an electronic device and a method of controlling the same, and more specifically, to a network configuration technology for electronic devices to be registered in a home network system. An electronic device according to one embodiment includes a communicator configured to perform data communication with a new electronic device which is not registered in an access point (AP), a storage which stores authentication information for accessing the AP, and a controller configured to, when the controller receives device identification information of the new electronic device through the communicator, control the communicator to transmit the authentication information, which allows the new electronic device to access the AP, to the new electronic device based on the received identification information.
KEY ENCRYPTION KEY WRAPPING
In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.
METHOD AND SYSTEM FOR DATA SECURITY WITHIN INDEPENDENT COMPUTER SYSTEMS AND DIGITAL NETWORKS
A system and method for authentication, authorization, and access management based on personally identifiable information and data sets pertaining to individual identity and its attributes within independent computer systems and digital networks.
PROTECTION OF COMPUTER SYSTEMS AGAINST MANIPULATION AND FUNCTIONAL ANOMALIES
A system is provided for protecting a computer system and/or control system against manipulation and functional anomalies. The system includes a monitoring module, which has at least a first interface, a second interface, and at least one memory. The system is configured to receive information characterizing the system state of the computer system and/or control system via the first interface, receive an encrypted request for system state via the second interface and decrypt it using a request key stored in the memory, and generate a response to the request from at least a portion of the information received via the first interface.
The system is also configured to encrypt the response with a response key determined using the request and output it via the second interface, determine a new request key which is a shared secret also accessible to the sender of the request, and store this new request key in the memory.
METHODS AND SYSTEMS FOR SECURE DATA SHARING WITH GRANULAR ACCESS CONTROL
Methods and devices for secure data sharing with granular access control are described. A modified attribute-based encryption (ABE) scheme is used to perform cryptographically-enforced ABE using attributes of a file access policy. A sender sends to a receiver a file encrypted using a file encryption key, the file encryption key encrypted using ABE based on a file access policy set by the sender, and a set of private ABE keys decryptable using a key stored in a trusted execution environment (TEE) of the receiver. The private ABE keys are decrypted by the receiver TEE when the file is accessed, decrypting a file encryption key only when the attributes of the receiver access action satisfy the file access policy. The decrypted file encryption key grants access to the file contents via a trusted viewer application. A user password may also be required and cryptographically enforced as part of the ABE decryption.
Blockchain-Based Secure Email System
This patent describes a complete blockchain email system that supports both internal and cross-chain emails with the potential to interact with non-blockchain email systems. Through this method, as long as the sender or the recipient of the email is a blockchain mailbox, the email information will be recorded in the blockchain to ensure the authenticity of the email. Moreover, when blockchain mailboxes exchange messages, the email information will be encrypted and stored in distributed storage where only the recipient can obtain the unique cypher key and storage location of the email, thereby ensuring the security of email transmissions.
STORAGE SYSTEM WITH ENCRYPTED DATA STORAGE DEVICE TELEMETRY DATA
Systems and methods for encrypted storage device telemetry data are described. Storage device telemetry data may be collected for a telemetry message, such as a non-volatile memory express (NVMe) telemetry command, and encrypted using a first encryption key. The first encryption key may be encrypted using one or multiple second encryption keys and the encrypted first encryption key may be added to the telemetry message. A client system may receive the telemetry message, decrypt the encrypted first encryption key, and use the first encryption key to decrypt the encrypted storage device telemetry data.
Receiving an encrypted communication from a user in a second secure communication network
The present disclosure describes a method, system, and non-transitory computer readable medium that includes instructions that permit users of different secure communication networks to exchange secure communications. A secure communication platform includes a user database that allows users from different secure communication networks to access keys for recipients outside of their network. Additionally, the secure communication platform provides a high degree of trust regarding the sender's identity, allowing the receiving network to trust the sender.
Communication system using a random code as an encryption code
A communication system using a random code as an encryption code is disclosed. A first terminal transfers a request to the second terminal for providing a random code (rKey). The random code is used to encrypt commands in the proceeding communication process instead of using a master key (mKey) so as to avoid that the master key (mKey) is captured. The safety in data transmission is promoted greatly. In practical use, the encryption way can be used to a door access system which includes a mobile phone, a card reader, a door access controller, and a server program (such as ACX server program). The communication system using a random code as an encryption code assures that the communications between these devices are highly safe.