Patent classifications
H04L9/3271
QUANTUM AUTHENTICATION FOR WIRELESS USER EQUIPMENT (UE)
A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, quantum circuitry selects polarization states for qubits, generates and transfers the qubits, exchanges cryptography information with edge quantum circuitry, generates cryptography keys based on polarization states and cryptography information, and transfers the cryptography keys to network authentication circuitry. The edge quantum circuitry receives and process the qubits, determines the polarization states for the qubits, exchanges the cryptography information with the network quantum circuitry, generates the cryptography keys based on the polarization states and cryptography information, and transfers the cryptography keys to the wireless UE. The wireless UE generates authentication data based on the cryptography keys and wirelessly transfers the authentication data for delivery to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and responsively authenticates the wireless UE.
SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.
SYSTEMS AND METHODS FOR CONTACTLESS CARD COMMUNICATION AND MULTI-DEVICE KEY PAIR CRYPTOGRAPHIC AUTHENTICATION
Systems and methods for authentication may include an authenticator. The authenticator may include a processor and a memory. The processor may be configured to: receive one or more challenges; generate a first instruction, the first instruction including a request to retrieve a first Fast Identity Online (FIDO) key; transmit the first instruction; receive the first FIDO key; sign the one or more challenges using the first FIDO key; and transmit one or more signed challenges for validation using a second FIDO key.
BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITY
Secure pairing of computing devices, such as a field tool and a battery-powered device (BPD), may include generating by the BPD a challenge message including a randomly-generated challenge, and receiving at the field tool a challenge message from the BPD via a Bluetooth low-energy (BLE) advertisement message. The challenge message can include a randomly-generated challenge and can be issued in a scannable undirected advertising message. The challenge key can be calculated via a secure hash algorithm (SHA) to obtain a response solution. The response solution can be sent by the field tool to the advertising device in response to the challenge message. The response solution can be verified by the BPD using a cryptographic message authentication code such as an HMAC, and the BPD sends a confirmation message to the field tool indicating that the response solution is verified as correct.
Authentication System and Method for Controlling Authentication System
An authentication system includes: an information processing apparatus including a first processor; and an authentication server connected to the information processing apparatus through a network and including a second processor. The first processor acquires user registration information stored in a first memory based on an instruction operation of the user, generates an authentication request including data encrypted based on an encryption key included in the acquired user registration information and identification information included in the acquired user registration information, and transmits the authentication request to the authentication server. The second processor acquires the encryption key included in the authentication registration information stored in a second memory in correspondence with the identification information included in the authentication request received from the information processing apparatus, decrypts the data encrypted based on the acquired encryption key and transmits an authentication result to the information processing apparatus.
Transceiver system
A first-transceiver for communicating with a second-transceiver is disclosed. The first and second-transceivers are vehicle-access-system transceivers. The transceivers include a cipher-module configured to generate a cipher-code using a cipher key and an input value, an encryption-module configured to generate encrypted-payload-data from payload-data using the cipher-code, a hashing-module configured to hash the payload-data to generate hashed-payload-data using the cipher-code, and a transmitter configured to transmit the encrypted-payload-data and the hashed-payload-data to the second-transceiver. A vehicle including the first-transceiver is also disclosed. Access to one or more systems of the vehicle are controlled in accordance with a validation state.
Method for operating a touch-sensitive, planar input device of a complete device, and complete device
An approach for operating at least one touch-sensitive, flat input device of a complete device, the input device being connected via a message-based bus connection to a control device of the complete device, and messages containing touch datasets describing touch data events being transmitted to the control device, which evaluates the messages for input information for an application program implemented by the control device, wherein when a security function in the control device that queries sensitive input information is accessed, the touch datasets are transmitted from the input device to the control apparatus via the bus connection in encrypted form until the associated input process has ended.
Digital credentials for step-up authentication
The system comprises an interface and a processor. The interface is configured to receive a request from an application for authorization to access, wherein access to the application is requested by a user, and receive a task request from the application for authorization to access a task, wherein access to the task is requested by the user. The processor is configured to authenticate the request from the application for authorization to access, determine that the task comprises a sensitive task, determine a user authentication device, provide a challenge for a digital credential to the user authentication device, wherein the digital credential is backed by data stored in a distributed ledger, receive a response from the user authentication device, determine the response is valid, and provide an authorization to access the sensitive task.
Determining data availability
Determining data availability is disclosed, including: performing a data availability challenge with respect to a claimer node to determine whether the claimer node stores at least some elements included in a base layer in a digital tree corresponding to a data entity; and publishing a first set of elements associated with the base layer of the digital tree and the data availability challenge. Furthermore, encoding auditing is disclosed, including: obtaining a first set of elements associated with a base layer of a digital tree corresponding to a data entity; and generating an encoding validity determination of the digital tree based at least in part on whether the first set of elements is usable to recover a second set of elements associated with the base layer of the digital tree.
RESILIENCY ARCHITECTURE FOR IDENTITY PROVISIONING AND VERIFICATION
Identity access and management (“IAM”) systems with resiliency features and methods related to the same are provided. Two or more identity provider (“IDP”) systems each have a matching copy of user authentication data for users authorized to access the system of an organization. An identity proxy is interposed between user systems and each of the two or more IDP system. The identity proxy routes authentication requests, challenges, and responses between the user systems and the IDP systems based on availability.