H04L63/062

PREVENTION OF RACE CONDITIONS IN A DUAL-SERVER STORAGE SYSTEM FOR GENERATION OF ENCRYPTION KEY
20230070163 · 2023-03-09 ·

A first node and a second node are configured in a storage system, wherein the first node and the second node are communicatively coupled to a key server. One or more nodes of a set comprising the first node and the second node initiate a process to generate an encryption key to be shared between the first node and the second node in the storage system. A request for the encryption key is transmitted to the key server, from the one or more nodes of the set comprising the first node and the second node, in response to securing a common lock that is available.

Method and apparatus for portably binding license rights to content stored on optical media
11636182 · 2023-04-25 · ·

There is provided a method for use by a playback system to play back encrypted content associated with a first globally unique identifier (ID). The method includes storing an encrypted content in a memory being under control of a memory controller having a second globally unique ID, storing the first globally unique ID, transmitting a request from the memory controller to a license server, the request comprising the first globally unique ID, the second globally unique ID and a request for a content license to play back the encrypted content, receiving the content license enabling a right for the playback of the encrypted content, the content license including content keys and being encrypted to be decryptable according to a memory controller secret associated with the second globally unique ID, decrypting the content license, according to the memory controller secret to recover the content keys to a playback module.

Method and system for updating certificate issuer public key, and related device

A method includes receiving, by an embedded universal integrated circuit card (eUICC), first information from a local profile assistant (LPA), where the first information includes a first certificate issuer (CI) public key identifier, and the first CI public key identifier is a CI public key identifier that the eUICC does not have. The method further includes sending, by the eUICC, second information to an OPS, where the second information includes the first CI public key identifier. The method further includes receiving, by the eUICC, a patch package from the OPS, where the patch package includes at least a first CI public key corresponding to the first CI public key identifier. The method further includes updating, by the eUICC, a CI public key of the eUICC by using the first CI public key.

Network enabled control of security devices

Examples described herein provide network enabled control of a security device. Examples include determining that a client device is connected to a network, receiving a request from the client device to instruct a security device to perform an action, wherein the request comprises a key, authenticating the key received from the request, and based on the determination that the client device is authorized to connect to the network, and based on the authentication of the key, sending, by a network device, a signal to instruct the security device to perform the action.

Blockchain based vehicle control

A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.

Configuring a remote electronic device by a peer electronic device in a networked environment
11637745 · 2023-04-25 · ·

A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.

Systems and methods for configuring a secure communication link in an electric power distribution system

A control system of an electric power distribution system includes processing circuitry and a memory having instructions that, when executed by the processing circuitry, cause the processing circuitry to perform operations that include receiving an indication of a profile, generating a connectivity association key (CAK) based on the profile, distributing a copy of the CAK to a device of the electric power distribution system, and establishing a connectivity association with the device in accordance with the profile based on a verification that the device possesses the copy of the CAK.

Blockchain settlement network

An example operation includes one or more of transferring, via a blockchain, a digital value from a sender to a receiver, the digital value representing an off-chain transfer of value, monitoring a message flow between the sender and the receiver, detecting a settlement of the off-chain transfer of value based on message content within messages of the message flow, and returning, via the blockchain, the transferred digital value from the receiver to the sender based on the detected settlement.

Data encryption key management system

A data encryption key management system includes an application layer with a hypervisor and a virtual machine, a host operating system coupled to the application layer and including a key management agent, and a Baseboard Management Controller (BMC) device coupled to the host operating system and including a BMC storage device providing a key vault. The BMC device receives a first stored data encryption key that was generated by the hypervisor for the virtual machine from the key management agent, and stores the first stored data encryption key in the key vault provided by the BMC storage device. The BMC device subsequently receives a stored data encryption key request from the key management agent and, in response, retrieves the first stored data encryption key from the key vault provided by the BMC storage device, and transmits the first stored data encryption key to the key management agent.

Authentication of intelligent electronic devices (IEDs) using secure association keys (SAKs)

An intelligent electronic device (IED) includes memory and a processor operatively coupled to the memory. The processor is configured to establish, over a communication network of a power system, a communication link according to a media access control security (MACsec) Key Agreement (MKA). The TED receives a plurality of access control secure association keys (SAKs) via the communication link. The TED receives one or more checked-out SAKs indicating a request to access the TED The TED allows access based on the one or more checked-out access control SAKs matching at least one of the plurality of access control SAKs.