Patent classifications
H04L2463/062
Secure scalable link key distribution using bootsrapping
An electronic device (such as an IoT controller) that distributes a link key is described. During operation, while an administrator is logged in, the electronic device may receive the link key using a secure widget, where the link key may facilitate secure communication via a link. Then, the electronic device may generate an access key, and may generate an encrypted version of the link key based at least in part on the access key and the link key, where the access key enables access to the link key based at least in part on the encrypted version of the link key. Next, the electronic device may store the link key, the access key and/or the encrypted version of the link key in a trusted envelope or partition in the memory with encryption. Moreover, when the administrator logs out, the electronic device may disable access to the trusted envelope.
FRAMEWORK FOR MIGRATING APPLICATIONS ACROSS PUBLIC AND PRIVATE CLOUDS
Discussed herein are techniques for migrating an application from a source cloud environment (SCE) to a target cloud environment (TCE). Responsive to a request received by an application migration service (AMS) to migrate an application executed in a first compute instance in the SCE to a second compute instance in the TCE, the AMS authenticates credentials of a user with respect to the SCE. Upon the credentials being successfully authenticated, the AMS generates a public key and a private key. The public key is transmitted to a service manager that injects the public key in the application executed in the first compute instance and the private key is assigned to a source agent. The source agent obtains one or more artifacts and configuration information that enable execution of the application based on the private key, which are installed by a target agent in the second compute instance in the TCE.
DISTRIBUTED SECURITY IN A SECURE PEER-TO-PEER DATA NETWORK BASED ON REAL-TIME GUARDIAN PROTECTION OF NETWORK DEVICES
In one embodiment, a method comprises: securing, by a security agent executed within a network device, first secure data structures for secure storage in the network device and second secure data structures for secure communications in a secure peer-to-peer data network; monitoring, by the security agent, a corresponding mandatory lifecycle policy for each of the first secure data structures; and cryptographically erasing one of the first secure data structures in response to expiration of the corresponding mandatory lifecycle policy.
Secure communication session resumption in a service function chain
A method for resuming a Transport Layer Security (TLS) session in a Service Function Chain comprising a plurality of Service Function nodes coupled to a Service Function Forwarder. A request is received at a first Service Function node to establish a TLS session, and a Pre-Shared Key (PSK) and a PSK identifier that uniquely correspond to the first Service Function node and the TLS session are generated. The PSK identifier is forwarded to one or more of the Service Function Forwarder and the plurality of Service Function nodes. A request to resume the TLS session is received from a client device that previously disconnected. It is determined that the connection request contains the PSK identifier, a second Service Function node is selected, and the TLS session is re-established between the client device and the second Service Function node using the same PSK as the prior TLS session.
Emergency lockdown in a local network of interconnected devices
Systems, methods, and devices are described herein for executing a lockdown of electronic locks deployed in a local network of interconnected devices. In example implementations, each electronic lock is provided with a unique encryption key specific to that electronic lock and is provided with a shared encryption key. To execute a lockdown of all electronic locks in the local network, a server generates a locking instruction and encrypts it using the shared encryption key. The server then transmits the encrypted locking instruction to the gateway devices of the local network which, in turn, transmit it to each of the electronic locks. Upon receipt of the encrypted locking instruction, the electronic locks attempt to decrypt it using the shared encryption key. Upon successful decryption of the encrypted locking instruction, an electronic lock toggles to a lock state.
DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT
In order to improve security upon distributing a group key, there is provided a gateway (20) to a core network for a group of MTC devices (10_1-10_n) communicating with the core network. The gateway (20) protects confidentiality and integrity of a group key, and distributes the protected group key to each of the MTC devices (10_1-10_n). The protection is performed by using: a key (Kgr) that is preliminarily shared between the gateway (20) and each of the MTC devices (10_1-10_n), and that is used for the gateway (20) to authenticate each of the MTC devices (10_1-10_n) as a member of the group; or a key (K_iwf) that is shared between an MTC-IWF (50) and each of the MTC devices (10_1-10_n), and that is used to derive temporary keys for securely conducting individual communication between the MTC-IWF (50) and each of the MTC devices (10_1-10_n).
SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.
SYSTEM AND METHOD FOR GENERATING AND DISTRIBUTING WEB FORM FOR COLLECTING DATA
The present disclosure describes method and system for generating and distributing a web form for securely collecting data. The system provides an interactive and visualized tool to add, edit, distribute web form and collect and analyze one or more response to the web form. Users of the system may edit the forms in a way that what you see is what you get. The system also automatically generates the data structure that can be easily transferred to and stored in the database, which only require minimal input from the user in terms of the data structure. The stored web form and the received responses are encrypted so as to be only available to the user. In some aspects, the system manages all the projects and workflow and allows for real time monitoring of this process through dashboard.
Encryption scheme for making secure patient data available to authorized parties
A sharing package data structure for the secure maintenance and sharing of information relating to a person with one or more parties is described. The data structure comprises: (1) a version of the data that has been encrypted in such a way that a data decryption key is needed to decrypt it; (2) a hash on the data decryption key; and (3) access control list entries each containing a version of the data decryption key that has been encrypted with a public key associated with a different party authorized to access the data. The contents of the data structure are usable to provide access to a decrypted version of the data to a party that is able to decrypt the encrypted data decryption key stored in one of the access control entries.
Information-centric network namespace policy-based content delivery
Systems and techniques for information-centric network namespace policy-based content delivery are described herein. A registration request may be received from a node on an information-centric network (ICN). Credentials of the node may be validated. The node may be registered with the ICN based on results of the validation. A set of content items associated with the node may be registered with the ICN. An interest packet may be received from a consumer node for a content item of the set of content items that includes an interest packet security level for the content item. Compliance of the security level of the node with the interest packet security level may be determined. The content item may be transmitted to the consumer node.