Patent classifications
H04L63/067
Systems and methods for establishing a secure communication channel between an information handling system and a docking station
Embodiments of systems and methods are provided herein to establish a secure communication channel for communicating dock configuration actions from an administrator information handling system (IHS) to a docking station. One embodiment of such a system includes an administrator IHS configured to communicate dock configuration actions to a docking station, a host IHS configured to verify the validity of a dock certificate received from the docking station against a dock certificate authority server, and a docking station configured to verify the validity of an administrator certificate received from the admin IHS against a preconfigured list of valid administrator certificates stored within the docking station. If the validity of the dock certificate and the administrator certificate are respectively verified by the host IHS and the docking station, the host IHS and the docking station are further configured to establish the secure communication channel between the administrator IHS and the docking station.
Systems and methods for peer-to-peer communication
Systems, methods, and computer program products for transmitting data between devices are disclosed. A device may utilize a standardized communication system (“SCS”) to transmit data directly between devices including an SCS. The SCS may discover available devices. The SCS may determine available transmission paths between a first device and a second device. The SCS may select a transmission path between the first device and the second device, and the SCS may transmit data from the first device to the second device using a standardized communication protocol (“SCP”).
Generation of a persona key
Generating a persona key based on at least internet protocol session information associated with a user equipment and user data associated with the user equipment is disclosed. The disclosed subject matter can enable communication of the persona key to a capturing device to enable a portion of information from a user profile correlated to the persona key to be communicated to a receiving device. In some embodiments, the persona key can further be based on time, date, location, user input, etc. The persona key can be a dynamic representation of identification that can be more secure than conventional static representations. Additionally, the persona key can be communicated by optical, audio, or electromagnetic techniques that can avoid a user having to speak an account number, password, username, etc., to provide access to the portion of the information from the user profile.
Transaction device use of a dynamically generated value based on a next expected session key
A system, method, and computer readable medium (collectively, the “system”) are provided. The system may include a processor configured to perform operations and/or steps comprising receiving a wireless signal from a transaction device, wherein the wireless signal carries emulated track data for payment of a transaction; reading the emulated track data from the wireless signal; generating a transaction payload, wherein the transaction payload contains transaction account data and a dynamically generated digital signature value from the emulated track data of the wireless signal; transmitting the transaction payload to an authorization network server; receiving an authorization instruction from the authorization network server for handling payment of the transaction; and processing the payment of the transaction in accordance with the authorization instruction.
TAP TO COPY DATA TO CLIPBOARD VIA NFC
Various embodiments are generally directed to copying data to a clipboard of a mobile device from a contactless card using NFC. A mobile device may issue a request to read data from the contactless card. The contactless card may generate encrypted data in response to the request. The mobile device may receive the encrypted data via NFC and transmit the encrypted data to a server for verification. The server may verify the encrypted data and transmit an indication of an account number for the contactless card to the mobile device. The mobile device may then copy the account number to a clipboard of the mobile device.
CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.
SYSTEM AND METHOD FOR SECURELY CONNECTING A TEST AND MEASUREMENT INSTRUMENT TO A WEB SERVICE
A test and measurement system that allows a user to use an activation code coupled with a user-owned communication device to provide security credentials to cloud or web-based services with security enhancements or preferences. The test and measurement system includes a test and measurement instrument that can initiate the connection and a remote server which provide an activation code for a user to enter on the communication device to connect the test and measurement instrument to the cloud or web-based services.
Technique for downloading a network access profile
A technique for downloading a profile for access to a communication network by a security module. This access profile has been prepared by a network operator and is available from a server configured to provide this access profile by downloading to the security module. The security module obtains a first verification datum prepared by the network operator. A secure downloading session is established thereafter. During establishment, session keys are jointly generated between the server and the security module and the server is authenticated by the security module using a public downloading key. The security module verifies authenticity of the public downloading key by using the first verification datum enabling verification that the server uses a secret downloading key corresponding to that provided by the network operator during preparation of the first verification datum. When the public downloading key is not authentic, the security module interrupts downloading of the access profile.
SYSTEM FOR ENCRYPTING AND AUTHENTICATING COMMUNICATIONS WITH MUTUAL AUTHENTICATION OF THE COMMUNICATORS
SYSTEM FOR ENCRYPTING AND AUTHENTICATING COMMUNICATIONS WITH MUTUAL AUTHENTICATION OF THE COMMUNICATORS which can be used between two parties who exchange messages supported by a communication network in which the parties are unequivocally identified. The system includes processes supported by respective authentication applications available to each party on a hardware/software device, the applications comprising at least: an identifier (Id) of the authentication application (AA); an encryption key (CC) of each party; a random number generator for encrypting and authenticating messages Mx; and an encryption algorithm that is shared with the rest of the parties of the system, allowing them to encrypt and decrypt the sent/received messages.
ESTABLISHING CONNECTIVITY BETWEEN USER DEVICES
A computer-implemented method, computer program product, and computer system is provided for establishing connectivity between user devices. The computer-implemented method includes: broadcasting a message to running processes on an operating system of the first user device to indicate that a requesting application is looking for a live connection channel to attempt discovery with a second user device to ascertain virtual proximity of the first user device with the second user device. The computer-implemented method further includes receiving a response from a live connection channel and attempting to verify pairing via the live connection channel to confirm a virtual proximity of the second user device with the first user device. The pairing provides information for establishing a subsequent connection between the first and second user devices via the requesting application.