H04L2463/062

METHOD AND APPARATUS FOR PROTECTING CONFIDENTIAL DATA IN AN OPEN SOFTWARE STACK

A method is provided for securely providing data for use in a consumer electronics device having a processor performing instructions defined in a software image. The method includes receiving the data encrypted according to a global key, further encrypting the data according to a device-unique hardware key, storing the further encrypted data in a secure memory of the consumer electronics device, providing the global key to a whitebox encoder for encoding according to a base key to generate a whitebox encoded global key, and transmitting the software image to the consumer electronics device for storage in an operating memory of the consumer electronics device, the software image having a whitebox decoder utility corresponding to the whitebox encoder and the whitebox encoded global key.

SYSTEM AND METHOD FOR PROVIDING A UNIVERSAL SHOPPING CART ACROSS MULTIPLE SEARCH PLATFORMS
20200402138 · 2020-12-24 ·

Systems and methods are disclosed that provide for a linking of a product database across different search platforms and then managing payments by a generalized search entity such that users are not transitioned to a merchant site from advertisements or search results. A method includes establishing, at a generalized search entity, a link to a product database of a merchant, offering, by the generalized search entity and based on a correlation of search terms to the product database of the merchant, search results across at least a first search platform and a second search platform and receiving, from a user, a confirmation of a payment for a product associated with a search result presented on the first search platform by the generalized search entity. The generalized search entity processes the payment for the product without transitioning the user to a site operated by the merchant.

Methods and systems for presenting video feeds
10867496 · 2020-12-15 · ·

The disclosed embodiments include a computing system with a display, processor(s), and memory. The computing system displays a video monitoring user interface. The user interface includes a first region for displaying live and/or recorded video from a video camera of a smart home environment, and a second region for displaying an event timeline. The event timeline includes event indicators corresponding to respective events detected within the smart home environment. The video monitoring user interface includes a live video affordance for displaying live video from the video camera. In response to a user selection of an event indicator, the computing system: (1) requests a video feed of the corresponding detected event; and (2) displays the requested video feed in the first region. In response to a user selection of the live video affordance, the computing system: (1) requests the live video; and (2) displays the live video in the first region.

Systems And Methods Encrypting Messages Using Multiple Certificates
20200389447 · 2020-12-10 ·

This disclosure includes techniques for using multiple cryptographic certificates for a secure connection. One embodiment is a method including: receiving by a client N public encryption keys over a network from a server, wherein N is an integer greater than 1; generating N session keys in response to receiving the N public encryption keys; encrypting each of the N session keys with a respective one of the N public encryption keys; subsequent to encrypting each of the N session keys, sending the N session keys encrypted over the network to the server; encrypting, with a first one of the N session keys, a first portion of a payload associated with a first message; encrypting, with a second one of the N session keys, a second portion of the payload associated with the first message; and sending the first message, comprising the payload encrypted, to the server from the client.

Message-based database replication

A networked device communication system can configure network devices (e.g., a primary and secondary database) to send and receive sequences of messages, such as replicated data, using one or more keypairs and wrapping keys. The sequences of messages can include an initial set of messages that are encrypted by a wrapping key, and further include another set of messages that are encrypted by a replaced staggered key. The sequence of messages can be configured to be decrypted without exporting keys of hardware security modules.

Message-based database replication

A networked device communication system can configure network devices (e.g., a primary and secondary database) to send and receive sequences of messages, such as replicated data, using one or more keypairs and wrapping keys. The sequences of messages can include an initial set of messages that are encrypted by a wrapping key, and further include another set of messages that are encrypted by a replaced staggered key. The sequence of messages can be configured to be decrypted without exporting keys of hardware security modules.

REMOTELY MANAGED TRUSTED EXECUTION ENVIRONMENT FOR DIGITAL-RIGHTS MANAGEMENT IN A DISTRIBUTED NETWORK WITH THIN CLIENTS
20200380092 · 2020-12-03 ·

A client device receives media content from a server remote from the client device. During playback of the media content, the client device transmits, to a player proxy remote from the client device, a play position of the media content. The play position of the media content is used by the player proxy at the application server to continue providing the media content. The play position is transmitted repeatedly to the player proxy while playback of the media content continues. The client device transmits the media content for display at a display device that is coupled to the client device.

ETHERNET SWITCH AND METHOD OF CONTROLLING THE SAME
20200382446 · 2020-12-03 ·

An Ethernet switch for a vehicle, a method of controlling the Ethernet switch are provided. The method includes detecting a first connection between a connector of the diagnostic device and a first port of the Ethernet switch and establishing a second connection with the diagnostic device by referring to a virtual local area network identifier (VLAN ID) table. A third connection is established between the controller and an electronic control unit (ECU) of the vehicle by referring to the VLAN ID table. A certificate-based secure access procedure is performed between the diagnostic device and the controller. A mode of the Ethernet switch is switched from a lock mode to an unlock mode and a fourth connection is established between the diagnostic device and the ECU by referring to the VLAN ID table.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIUMS FOR SECURELY ESTABLISHING CREDENTIAL DATA FOR A COMPUTING DEVICE
20200382500 · 2020-12-03 ·

Methods, systems, and computer readable mediums for securely establishing credential data for a computing device are disclosed. According to one example, a method includes assigning, by a credential manager, credential set data to a computing device and mapping the credential set data to a device identifier key associated with the computing device in a credential data store accessible by the credential manager. The method further includes receiving, from a provisioning service client, a credential set request message including the device identifier key by the credential manager in response to an activation of the computing device at a customer location site and sending, by the credential manager to the provisioning service client, the credential set data for authenticating the computing device at the customer location site.

System and Method for Providing a Social Media Shopping Experience
20200382480 · 2020-12-03 ·

Disclosed are a system and process of providing social networking purchasing processes. A method includes receiving, from a posting entity and at the social networking entity, a posting or a submission of a text, an image or a video. When the submission is associated with a product within a product catalog of the posting entity, the social networking entity presents in a newsfeed of users or otherwise on the social networking entity, the text, image or video with an associated option to buy. The option to buy might be presented through a messenger application or as the user browses the posting. When there is a correlation between the posting and the product catalog, and when the user makes a purchase of the product, the user is not transitioned away from the social networking entity. Initiating a payment process occurs within the social networking entity.