H04L2463/081

Installation of a terminal in a secure system
10693848 · 2020-06-23 · ·

A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate key generation data, comprising at least one data seed; distribute the at least one seed to the terminal; generate key data and meta data based on said at least one seed and a function; store an identifier for the terminal along with the key data and the meta data for the terminal, wherein the terminal is arranged to receive the at least one seed from the server; generate key data and meta data based on said at least one seed and the same function; store the key data and the meta data, wherein the key data and the meta data stored in the terminal are the same as the key data and the meta data stored in the server.

Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
10686779 · 2020-06-16 · ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION

Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.

Method and apparatus for networking unmanned aerial vehicle and system for controlling unmanned aerial vehicle
10674549 · 2020-06-02 · ·

The present application provides a method and an apparatus for networking an unmanned aerial vehicle and a system for controlling an unmanned aerial vehicle. The method for networking an unmanned aerial vehicle includes: generating a service set identifier and a password; sending the generated service set identifier and password to a control end by means of short-distance wireless communication; judging the status of a connection to the control end; when the connection is disconnected, returning to the step of generating a service set identifier and a password, where the service set identifier and the password that are generated each time are both different from the previously generated service set identifier and password; and when the connection is not disconnected, continuing to judge the status of the connection to the control end.

CHAT SESSION DYNAMIC SECURITY
20200169543 · 2020-05-28 ·

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining chat session data of a chat session having a first participant provided by a patron user and a second participant provided by an enterprise user; detecting, subsequent to a connectivity failure, that a network connection supporting the chat session has been restored; presenting in response to the detecting a prompt to the first participant, the prompt being in dependence on the chat session data; deciding an authentication action in dependence on a received response of the first participant in response to the presented prompt; and performing the authentication action in accordance with the deciding.

Loading and unloading data at an external storage location

A command to load or unload data at a storage location is received. In response to the command, a storage integration object associated with the storage location is identified. The storage integration object identifies a cloud identity object that corresponds to a cloud identity that is associated with a proxy identity object corresponding to a proxy identity granted permission to access the storage location. The data is loaded or unloaded at the storage location by assuming the proxy identity.

Cryptography method and system for securing data via electronic transmission

Provided are QR Codes configured with a Transactional Cryptopgrahy (TC) component and methods for using thereof in a secure manner without the need for specialized hardware. By using software-defined security, QR codes can be used for a wider array of purposes without the additional expense and maintenance of separate hardware platforms for secure information.

Instanced web servers for displaying custom content in a secure context
11882171 · 2024-01-23 · ·

Systems and methods receiving an indication that a domain has been blocked. A temporary web server is created that has network address that is different from the network address associated with the blocked domain. Content is created that indicates the blocked domain, and optionally, a reason for the blocking. The network address of the temporary web server is returned to a requesting browser application, which can display the content without providing a security warning.

ESTABLISHING AN AD-HOC SECURE CONNECTION BETWEEN TWO ELECTRONIC COMPUTING DEVICES USING A SELF-EXPIRING LOCALLY TRANSMITTED INFORMATION PACKET
20200067914 · 2020-02-27 ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

Establishing an Ad-Hoc Secure Connection Between Two Electronic Computing Devices Using a Self-Expiring Locally Transmitted Information Packet
20200053072 · 2020-02-13 ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.