Patent classifications
H04L9/16
System for securing deployed security cameras
Example embodiments provide systems and methods for securing a deployed camera. A security apparatus is coupled to the deployed camera and accesses video content from the coupled camera. The security apparatus accesses video content from the coupled camera, splits the video content within a plurality of RTP packets, encrypts payloads of the RTP packets, embeds in a header of the encrypted RTP packets, at least two key identifications for decryption of the encrypted RTP packets, and transmits the plurality of RTP packets over a network to a video management system.
System for securing deployed security cameras
Example embodiments provide systems and methods for securing a deployed camera. A security apparatus is coupled to the deployed camera and accesses video content from the coupled camera. The security apparatus accesses video content from the coupled camera, splits the video content within a plurality of RTP packets, encrypts payloads of the RTP packets, embeds in a header of the encrypted RTP packets, at least two key identifications for decryption of the encrypted RTP packets, and transmits the plurality of RTP packets over a network to a video management system.
SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM
A secret share value [y]=[δx.sup.2+ax] is obtained through secure computation using a secret share value [x] of a real number x, and a secret share value [func(x)]=[y(ζy+b)+cx] of an elementary function approximation value z=func(x) of the real number x is obtained and output through secure computation using secret share values [x] and [y]. Here, x, y, and z are real numbers, a, b, c, δ, and ζ are real number coefficients, and a secret share value of .Math. is [.Math.].
USING INQ TO OPTIMIZE END-TO-END ENCRYPTION MANAGEMENT WITH BACKUP APPLIANCES
One example method includes receiving, by a backup appliance, a request concerning a dataset, performing, by the backup appliance, an inquiry to determine if end-to-end encryption is enabled for a volume of a target storage array, receiving, by the backup appliance, confirmation from the storage array that end-to-end encryption is enabled for the volume, and based on the confirmation that end-to-end encryption is enabled for the volume, storing the dataset in the volume without performing encryption, compression, or deduplication, of the dataset prior to storage of the dataset in the volume.
RELEASE OF CONDITIONAL PRIMARY SECONDARY CELL ADDITION/MODIFICATION CONFIGURATIONS
In a wireless terminal secondary cell group (SCG) configurations are invalidated upon change of a master key. The wireless terminal comprises processor circuitry and receiver circuitry. The processor circuitry is configured to establish, using a first master key, a first security context on a first radio connection with a master access node. The receiver circuitry is configured to receiver circuitry configured to receive a re-configuration message comprising one or more conditional secondary cell configurations and at least one counter. Each conditional secondary cell configuration may comprise an identity of a candidate primary secondary cell and at least one triggering condition, the candidate primary secondary cell being used for Dual-Connectivity (DC). The at least one counter and the first master key may be used for derivation of a second master key to be used for establishment of a second security context with one of the candidate primary secondary cells. The processor circuitry is further configured to invalidate one or more conditional secondary cell configurations upon a change of the first master key.
Method for automatically encrypting short message, storage device and mobile terminal
Disclosed are a method for automatically encrypting a short message, a storage device and a mobile terminal. The method comprises: matching a number and content of a short message respectively with a pre-set short message encryption number group and a key word database; if the matching succeeds, performing encryption processing on the short message; and distributing the short message to an application program having the authority to monitor the short message. The short message content is encrypted before the application program receives the short message, preventing important information from being maliciously stolen by the application program.
Method for automatically encrypting short message, storage device and mobile terminal
Disclosed are a method for automatically encrypting a short message, a storage device and a mobile terminal. The method comprises: matching a number and content of a short message respectively with a pre-set short message encryption number group and a key word database; if the matching succeeds, performing encryption processing on the short message; and distributing the short message to an application program having the authority to monitor the short message. The short message content is encrypted before the application program receives the short message, preventing important information from being maliciously stolen by the application program.
Method for protecting an electronic control unit
A method for operating an electronic control unit (ECU) includes a normal mode and a protected mode. In the protected mode a new security artifact is stored in a microcontroller. The security artifact is transferred from the microcontroller to a microprocessor, and, after having received the security artifact, the microprocessor uses the security artifact for authenticating a program.
Non-transitory computer-readable medium storing computer-readable instructions for terminal device and communication device
A terminal device may obtain a third public key of a communication device, in a case where the third public key is obtained, send a third authentication request in which the third public key is used to the communication device, receive a third authentication response from the communication device, and send third connection information to the communication device. The third connection information may include a first identifier and a second identifier, the first identifier for identifying a first wireless network in which a first access point operates as a parent station, and the second identifier for identifying a second wireless network in which a second access point operates as a parent station.
Dynamic security approach for WAIC baseband signal transmission and reception
Provided are embodiments for performing encryption and decryption. Embodiments include generating a random key address, obtaining a pre-stored key using the random key address, and re-arranging portions of the pre-stored key using the random key address and a first enable signal. Embodiments also include selecting a dynamic logic operation based on the random key address and a second enable signal, receiving data for encryption, and combining portions of the received data for encryption with the re-arranged portions of the pre-stored key using the dynamic logic operation to produce encrypted data. Embodiments include re-arranging portions of the encrypted data based on the random key address and a third enable signal, and combining the re-arranged portions of the encrypted data with the random key address into an encrypted data packet for transmission. Also provided are embodiments for a transmitter and receiver for performing the encryption and decryption.