Patent classifications
H04L2463/081
METHOD AND DEVICE OF PROCESSING ICN INTEREST MESSAGES IN A DTN SCENARIO
A method of processing information centric networking (ICN) interest messages in a delay tolerant networking (DTN) scenario, wherein ICN data mules receive interests for content from end-users and disseminate content to end-users based on the interests and/or during encounters with other ICN data mules, includes performing a popularity estimation of content; appending, by a first end-user when forwarding an interest for given content to a data mule, a nonce to the interest; and employing, by a first data mule, the appended nonce according to predefined rules to maintain and/or record a counter for interests for the given content. The counter functions as a popularity indicator for the given content.
SECURED FILE TRANSFER MANAGEMENT ON AUGMENTED REALITY (AR) AND VIRTUAL REALITY (VR) DEVICES
In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions, in response to being executed by a processing circuit, cause the processing circuit to receive an eye gaze of a source user generated by a source augmented reality or virtual reality device (source AR/VR device) on a receiver AR/VR device and determine gazed content from the eye gaze of the source user using a password key phrase determination feature. The embodied program instructions also cause the processing circuit to generate a symmetric password key utilizing the gazed content according to a set of password determination rules and receive encrypted data from the source AR/VR device on the receiver AR/VR device. Additionally, the embodied program instructions cause the processing circuit to decrypt the encrypted data using the symmetric password on the receiver AR/VR device.
Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to initiate a password selection session on a source augmented reality or virtual reality device (hereafter the source AR/VR device). The logic is also configured to cause the processing circuit to generate a symmetric password key according to a set of password determination rules. Also, the logic is configured to cause the processing circuit to encrypt data using the symmetric password key prior to sending the encrypted data to a receiver AR/VR device. Moreover, the logic is configured to cause the processing circuit to send the encrypted data from the source AR/VR device to the receiver AR/VR device. The symmetric password key is not exchanged with any other device.
Authentication information processing method and apparatus and user terminal including authentication information processing method and apparatus
Disclosed are an authentication information processing method and apparatus and a user terminal including an authentication information processing method and apparatus. The authentication information processing method performed by the disclosed authentication information processing apparatus comprises the steps of: obtaining biometric information of a user; obtaining a unique key corresponding to the authentication information processing apparatus; and generating an authentication key by using at least a part of the biometric information and at least a part of the unique key.
SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION
Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.
AUTHENTICATION STICK
A communication adapter for authentication of a user includes a receiving unit for receiving encrypted credentials, a decryption unit for decrypting the encrypted credentials and an output unit for outputting the decrypted credentials to a terminal device.
METHOD FOR CERTIFICATION BY A CONTROL UNIT OF A VEHICLE
A method for performing certification by a control device of a vehicle including generating a first signed certificate, which has at least one public key, and generating an associated private key; single-time introduction of the first signed certificate and of the associated private key into the control device; producing a second certificate; signing a further public key in the control device, using the private key and the second certificate; and making available the signed further public key together with the first signed certificate.
METHOD FOR ACCESSING COMMUNICATIONS NETWORK BY TERMINAL, APPARATUS, AND COMMUNICATIONS SYSTEM
Embodiments of the present invention provide a method for accessing a communications network by a terminal, an apparatus, and a communications system, relate to the communications field, and can effectively reduce a resource waste on a network side that is caused when WLCP is triggered by a malicious application on a terminal. A first message sent by a second device is received, where the first message includes a second message and an authentication parameter, the authentication parameter is a token or a User Datagram Protocol UDP port number, and the second message includes the encrypted authentication parameter; or the first message includes a second message, and the second message includes an encrypted authentication parameter; or the first message includes a second message and an authentication parameter; and the second message is sent to a terminal.
Characteristics of Security Associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a WTRU, may request access to a service controlled by an access control entity (ACE). The user may be authenticated with a user authenticator and assertion function (UAAF), producing a result. A user assertion may be provided that includes the user authentication result, a user assurance level, and/or a user freshness level. The WTRU may be authenticated with a device authenticator and assertion function (DAAF), producing an associated result. A device assertion may be provided that may include the device authentication result, a device assurance level, and/or a device freshness level. The assertions may be bound together to receive access to a service or resource.
Secure server client interaction
A method of maintaining a secure relationship between a client device and a server is described. The client device receives a first challenge from the server and determines and provides a first response to the first challenge. A cookie is established associated with the secure relationship. This cookie is shared between the client and the server. To establish the secure relationship in a later interaction, the client provides the cookie to the server. The server then provides both the first challenge and a second challenge, to which the client determines a first response and a second response. The client then provides a composite response from which the first response and the second response are derivable by the server, allowing the server to be assured that the secure relationship exists. Each challenge uses a challenge function adapted to provide a fingerprint of the client device. Methods at both client and server, and suitably configured client and server, are also described.