H04L2463/062

DISTRIBUTED MESSAGING AGGREGATION AND RESPONSE
20200366633 · 2020-11-19 · ·

A method of providing a distributed messaging system to aggregate particular types of messages regarding a client from customers of said client and for generating response and informational messages to the customers is provided. The method is performed in a distributed system comprising one or more processors executing computer instructions and one or more non-transitory computer readable media with computer executable instructions stored thereon executed by the one or more processors to provide the method. The method comprises the steps of: receiving and securely storing client account credentials of the client for a group of client determined user accounts comprising predetermined ones of social media and email accounts of the client; utilizing the client account credentials to access the user accounts; capturing all customer messages received at the user accounts; filtering all the captured messages for predetermined keywords; aggregating the filtered customer messages in a database; and determining severity, trust and validity of the filtered customer messages.

Key-ladder protected personalization data transcription for provisioning

A method and system is provided that simplifies the key management by allowing personalization data protected for one chip model to be used to provision device with another chip model with different global hardware root keys. The solution minimizes the changes needed to be performed on the device during provisioning and remains secure.

POLICY ENFORCEMENT AND INTROSPECTION ON AN AUTHENTICATION SYSTEM

An authentication system handles authentication requests to apply introspection and policy enforcement. A policy server obtains a client security policy and an authenticator security policy. The policy server obtains an encrypted credential request with client metadata from a client and determines whether the client metadata satisfies the client security policy. The policy server provides the encrypted credential request to an authenticator device and obtains an encrypted credential response with authenticator metadata in response. The policy server determines whether the authenticator metadata satisfies the authenticator security policy. The policy server processes the encrypted credential response, without decrypting the encrypted credential request or the encrypted credential response, based on a determination of whether the client metadata satisfies the client security policy and the authenticator metadata satisfies the authenticator security policy.

Perimeter enforcement of encryption rules

Rules are applied at a network perimeter to outbound network communications that contain file attachments. The rules may, in a variety of circumstances, require wrapping of an outbound file from the endpoint in a portable encrypted container. The network perimeter may be enforced locally at the endpoint, or at any network device between the endpoint and a recipient.

File sharing and policy control based on file link mechanism

A method, a computing system and a computer program product are provided. A link for use by a user to access a file is created. Content of the file is encrypted using a common key. The common key is encrypted using a public key of the user and is registered in the link. Access rights regarding the file are set for the user and registered in the link. The link includes information for use by the user to access the file when the access rights indicate that the user is authorized to access the file.

Automating verification using secure encrypted phone verification

A encrypted verification system and method includes detecting an attempt to access a service requiring multi-factor authentication from a first user computing device, requesting a trusted platform module (TPM) public key of a second user computing device, the second user computing device being coupled to the first user computing device, generating a nonce in response to receiving the TPM public key of the second user computing device, sending the nonce for signature by a TPM private key of the second user computing device, receiving a signed nonce, wherein the signed nonce is signed by the TPM private key and decrypted using the TPM public key of the second user computing device, and determining that a value of the signed nonce matches a value of the nonce to authenticate the first user computing device and allowing access to the service.

Systems and methods for authentication sharing

A first device may discover, using a short-range wireless communication protocol, an authentication service advertised by a second device, and may establish, with the second device, a connection using the short-range wireless communication protocol. The first device may display, after establishing the connection with the second device, a first identifier, and may provide to the second device a confirmation request including the first identifier to permit the second device to determine whether a second identifier, input by a user into the second device, matches the first identifier. The first device may receive, from the second device, encrypted credentials to authenticate the user to access a service based on the second device determining whether the second identifier matches the first identifier. The first device may decrypt the encrypted credentials to obtain credentials, and may authenticate, using the credentials, the user to access the service.

Establishment of secure Bluetooth connection to Internet of Things devices, such as electronic locks

Systems and methods are disclosed for managing secure connection between a mobile device and an Internet of things device, such as an electronic lock. In some instances, a mutual authentication process is performed, and public keys are exchanged. Once keys are exchanged, subsequent communication between the devices may be encrypted using a shared key generated using the exchanged keys.

KEY DISTRIBUTION METHOD AND SYSTEM, AND APPARATUS
20200351082 · 2020-11-05 ·

This application provides a key distribution method, an apparatus, and a system, includes: determining, by an identity management server based on AAA authentication information, whether AAA authentication on the terminal succeeds; if the AAA authentication succeeds, sending the ID of the terminal to a key management server; and generating, by the key management server, a private key of the terminal and returning the private key to the management server. After negotiating with the terminal to generate a first key, the identity management server encrypts the ID and the private key of the terminal, and sends an encrypted ID and an encrypted private key to the terminal. The terminal obtains the ID and the private key of the terminal. According to the key distribution method, apparatus, and system provided in this application, communication security performance of the terminal during ID-based registration authentication is improved.

SYSTEM AND METHOD FOR MANAGING CERTIFICATION FOR WEBPAGE SERVICE SYSTEM
20200351088 · 2020-11-05 ·

A managing system and a managing method, according to the invention, are for managing certification for a webpage service system. When a user operates a data processing apparatus to execute a browser application to link to the webpage service system, a security agent device randomly generates a key in accordance with at least one characteristic data associated with the data processing apparatus, encrypts an original cookie data into an encrypted cookie data by using the key, writes the encrypted cookie data into an HTTP information to replace the original cookie data, and then transmits the HTTP information including the encrypted cookie data to the browser application.