Patent classifications
H04L63/065
Secure group communication in a cluster of devices
The method is aimed at providing secure multicast communication between a plurality of devices forming a cluster of devices connected to one another by a local network. The method provides for electing a key distribution device and generating a group encryption key in said key distribution device. A secure communication channel is then established between the key distribution device and each device of a group of devices to be connected to the cluster. The group encryption key is transmitted from the key distribution device to the devices to be connected to the cluster and stored thereby. When all devices of the cluster have received the group encryption key, multicast communication among the devices of the cluster can start.
Grouping users by pre-shared key (PSK) in hospitality
Presented herein are techniques to manage a wireless local area network. A method includes defining a plurality of geographical zones corresponding to a geographical area that is serviced by a common service set identifier for a wireless local area network, assigning a pre-shared key to a mobile station based on the plurality of geographical zones, wherein the pre-shared key is associated with predetermined policies for a user of the mobile station, associating a media access control address of the mobile station with the pre-shared key, and controlling access of the mobile station to the wireless local area network based on the predetermined policies.
Methods and apparatus for encrypted communication
Aspects of the present disclosure relate to an apparatus comprising first interface circuitry to communicate with a first computing device and second interface circuitry to communicate with a second computing device. The first interface circuitry is configured to receive a handshake message from the first computing device. The second interface circuitry is configured to transmit the handshake message to the second computing device and to receive a handshake response message from the second computing device. The first interface circuitry is configured to transmit the handshake response message to the first computing device, whereby to establish a communication session between the first computing device and the second computing device. Apparatus comprises trusted execution environment circuitry to determine a cryptographic session key associated with said communication session, and use said session key to decrypt content of messages transmitted between the first and second computing devices via the apparatus, and analyse said decrypted content.
MESSAGE ENCRYPTION METHOD AND ELECTRONIC DEVICE
An electronic device is provided. The electronic device includes a communication module, a memory, and a server processor operably connected to the communication module and the memory. The server processor acquires, from the first electronic device, a first message encrypted based on first security information about the second electronic device, so as to transmit the first message to the second electronic device, acquires, from the second electronic device, a decryption failure signal for the first message so as to transmit the decryption failure signal to the first electronic device, acquires, from the second electronic device, second security information about the second electronic device so as to transmit same to the first electronic device, receives, from the first electronic device, a second message encrypted based on the second security information, and can transmit the received second message to the second electronic device.
Authentication method, authentication system, and controller
In an authentication method, a first controller generates a first group key, executes first mutual authentication with devices within a group, and shares the first group key with devices that have succeeded in the first mutual authentication. When a second controller joins the group, the first controller decides which coordinator manages a group key used in common. The first controller executes second mutual authentication with the coordinator, and shares the first group key with the coordinator when the second mutual authentication is successful. The coordinator performs encrypted communication within the group using the first group key, generates a second group key when the first group key valid time runs out and before updating the first group key, executes third mutual authentication with the devices and a third controller, and updates the first group key of the devices and the third controller that have succeeded in the third authentication.
Single channel multiple access communications system
A method for securely broadcasting information to a group of undisclosed recipients. The information in an information system is encoded by applying a hash function to a group of messages to form the information stream, wherein portions of the information in the information stream are intended for respective ones of the group of undisclosed recipients. The information is encoded such that that only an intended recipient can decode a portion of the information intended for the intended recipient. The information stream is broadcasted to the group of undisclosed recipients.
Enabling stateless accelerator designs shared across mutually-distrustful tenants
An apparatus to facilitate enabling stateless accelerator designs shared across mutually-distrustful tenants is disclosed. The apparatus includes a fully-homomorphic encryption (FHE)-capable circuitry to establish a secure session with a trusted environment executing on a host device communicably coupled to the apparatus; generate, as part of establishing the secure session, per-tenant FHE keys for each tenant utilizing the FHE-capable circuitry, the per-tenant FHE keys utilized to encrypt tenant data provided to an FHE-capable compute kernel of the FHE-capable circuitry; process tenant data that is in an FHE-encrypted format encrypted with a per-tenant FHE key of the per-tenant FHE keys; and store the tenant data that is in the FHE-encrypted format encrypted with the per-tenant FHE key of the per-tenant FHE keys.
Data security sharing method in multi-edge node collaboration mode under industrial cloud environment
Provided is a data security sharing method for multiple edge nodes to operate in a collaboration mode under an industrial cloud environment. The method includes: firstly, edge nodes that need collaborative computing separately applying for a shared key to an authority center; secondly, the authority center generating a shared key and issuing the key to each of the edge nodes applying for participation in the collaborative computing; again, the edge nodes combining industrial characteristics to generate an interference factor set, and adding different interference factors for different types of data; then, the data of the edge nodes is implemented with improved homomorphic encryption and is uploaded to an industrial cloud platform; and finally, the industrial cloud platform performing homomorphic analysis and computing on the data uploaded by each of the edge nodes, and issuing the data back to each of the edge nodes.
METHOD OF SECURED TRANSMISSION AND RECEPTION OF DISCOVERY MESSAGE IN A D2D COMMUNICATION SYSTEM
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). The various embodiments of the present invention disclose a method of secured transmission and reception of discovery message in device to device (D2D) communication system. According to one embodiment, a transmitting user equipment (UE) receives a ProSe group key (PGK) from a Prose function to perform a D2D communication in a D2D public safety group. The transmitting UE then derives a ProSe traffic key (PTK) using the PGK for transmitting data packets in the D2D communication. Using the PTK, the transmitting UE further derives a Prose integrity protection key (PIK) for securing a discovery message to discover one or more receiving UEs. The transmitting UE transmits the integrity protected discovery message using the derived PIK to the receiving UE. In turn, the receiving UE transmits a response message in a secure manner by deriving a PIK using PGK configured for the receiving UE. The various embodiments of the present invention disclose a method of a terminal. According to one embodiment, the method comprises of deriving a first traffic key and a second traffic key based on a group key, deriving a first security key for securing a discovery message based on the first traffic key and a second security key for securing data packets based on the second traffic key, and transmitting the discovery message generated based on the first security key.
Method and System for an Efficient Shared-Derived Secret Provisioning Mechanism
Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust.