Patent classifications
H04L2463/081
Cryptographic key creation using optical parameters
A cryptographic key generator for a first optical transceiver includes a photodetector that receives a continuous wave light beam received via an optical channel from a second optical transceiver. The generator samples and quantizes signals from the photodetector during a plurality of intervals to generate respective samples representing respective numbers of photons incident on the photodetector during each of the plurality of intervals. The generator creates a first cryptographic key from the plurality of digital values. The second optical transceiver receives a continuous wave light beam from the first transceiver and performs the same functions to create a second cryptographic key. Due to the reciprocal nature of the channels, the first and second cryptographic keys match.
AUTHENTICATION DEVICE, NETWORK DEVICE, COMMUNICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.
Method and device of processing ICN interest messages in a DTN scenario
A method of processing information centric networking (ICN) interest messages in a delay tolerant networking (DTN) scenario, wherein ICN data mules receive interests for content from end-users and disseminate content to end-users based on the interests and/or during encounters with other ICN data mules, includes performing a popularity estimation of content; appending, by a first end-user when forwarding an interest for given content to a data mule, a nonce to the interest; and employing, by a first data mule, the appended nonce according to predefined rules to maintain and/or record a counter for interests for the given content. The counter functions as a popularity indicator for the given content.
Secure circuit for encryption key generation
Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.
Secure Circuit For Encryption Key Generation
Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.
Smart device identity recognition method and system, electronic device, and storage medium
A smart device identity recognition method and system, an electronic device, and a storage medium, are described. The method includes determining a first data randomness degree of inter-packet difference data in a network data packet sent by a smart device to be identified; and determining the identity of said smart device according to a comparison result between the first data randomness degree and a second data randomness degree, and the second data randomness degree is the data randomness degree of inter-packet difference data in a network data packet sent by a identified smart device. According to the smart device identifying method and system, the electronic device, and the storage medium, identity recognition of a smart device can be realized by discrimination of network layer information that is not susceptible to counterfeiting, to ensure that an object served by a cloud server is legitimate and safe.
METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATION
A secure communication system is disclosed for communication between first and second party devices. An input interface is provided for receiving from an external host a unique host factor in addition to a user input interface for receiving from a user a unique PIN for a user and a selection input for selecting one of the plurality of stored entropy stores as a user selected entropy store A first private key generator is operable for generating a private key using a key generation algorithm requiring the selected entropy store, the host factor and the unique user PIN. The second party device includes a second storage device for storing a plurality of entropy stores. An input interface is provided for receiving the same unique host factor as received by the first party device. A communication interface facilitates communication with the first party device to receive from the first party device a user PIN and an indication of the user selected entropy store. A second private key generator is operable for generating a private key using the predetermined key generation algorithm with the received user PIN, the received host factor, and an extracted entropy store corresponding to user selected entropy store, wherein the private key generated by both the first and second private key generators are identical. The session is initiated to cause the generation of the identical private keys at both of the first and second private key generators and allow secure communication between the first and second devices. The private key at least one of the first and second devices is deleted at the end of the session.
Zero-Trust Cloud Development
Techniques for zero-trust cloud deployment are described herein. In accordance with various embodiments, a device including a processor and a non-transitory memory derives a key from deployment metadata of a virtual machine, where the deployment metadata change with each deployment of the virtual machine. The device then encrypts secrets using the key to bind the key to the virtual machine. The device further deploys the virtual machine in a cloud using the deployment metadata, including loading the encrypted secrets to the deployed virtual machine in the cloud.
AUTHENTICATION (AUTHN) AND AUTHORIZATION (AUTHZ) BINDING FOR SECURE NETWORK ACCESS
Techniques for combining independent sessions between application(s) and a VPN, proxy service, or similar system, including inner protocol sessions (e.g., such as QUIC, etc.), coming from a single device to form a single logical session, where the single logical session could share a single authentication/authorization token are described. The techniques include receiving, from a device within a network, a request for a first application to access a service associated with the proxy service or the VPN, sending, to the device, a first authentication request, and receiving, from the device, a message including a token. The techniques may further include authenticating, by the proxy service or the VPN, the token using a unique identifier associated with the device and enabling, by the proxy service or the VPN, the device to access the service via a first session flow.
Authentication device, network device, communication system, authentication method, and non-transitory computer readable medium
Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.