H04W12/047

Support for increased number of concurrent keys within multi-key cryptographic engine
11531772 · 2022-12-20 · ·

A server includes a processor core including system memory, and a cryptographic engine storing a key data structure. The data structure is to store multiple keys for multiple secure domains. The core receives a request to program a first secure domain into the cryptographic engine. The request includes first domain information within a first wrapped binary large object (blob). In response a determination that there is no available entry in the data structure, the core selects a second secure domain within the data structure to de-schedule and issues a read key command to read second domain information from a target entry of the data structure. The core encrypts the second domain information to generate a second wrapped blob and stores the second wrapped blob in a determined region of the system memory, which frees up the target entry for use to program the first secure domain.

Authenticating and creating accounts on behalf of another user

Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.

ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE
20220382886 · 2022-12-01 ·

An encrypted communication method is applied in a first electronic device, which includes a first processor communicating through encrypted channel of first Bluetooth, and a second processor communicating through unencrypted channel of second Bluetooth. The method includes: receiving, by the first processor, a key transmitted from a second electronic device, and transmitting the key to the second processor, the key being transmitted from the second electronic device to the first processor through the encrypted channel of the first Bluetooth; receiving, by the second processor in response to the first electronic device being switched to a system run by the second processor, a first ciphertext transmitted from the second electronic device, the first ciphertext being transmitted from the second electronic device to the second processor through the unencrypted channel of the second Bluetooth; and decrypting, by the second processor, the first ciphertext with the key to obtain the first plaintext.

COMMUNICATION SYSTEM, APPARATUS, METHOD FOR CONTROLLING APPARATUS, AND METHOD FOR MANUFACTURING MOBILE DEVICE

A communication system includes a mobile device and an apparatus. The apparatus obtains unique data from the mobile device by using a common key while the common key is stored in the mobile device, generates a unique key by using the obtained unique data, stores the generated unique key as a service key in the apparatus, and transmits the generated unique key to the mobile device. When the mobile device receives the unique key from the apparatus while the common key is stored in the mobile device, the mobile device rewrites a service key stored in the mobile device from the common key to the unique key.

Vehicle distributed computing for additional on-demand computational processing
11588797 · 2023-02-21 · ·

Systems and techniques for vehicle distributed computing for on-demand computational capacity. Systems and techniques described herein enable distribution of discrete computational work requests to other vehicle systems through generation and awarding of smart contracts to locally positioned other vehicle systems bidding for the smart contracts. Data for processing the requests is encrypted and send to the vehicle winning the smart contract, which processes the request and returns the completed work product. Completion of the smart contract initiates transfer of value to the processing vehicle as incentive for processing the work load.

Verification Method and Apparatus
20230102561 · 2023-03-30 ·

A verification method and apparatus are provided. The method includes: performing Bluetooth authentication with a terminal based on Bluetooth authentication information; after the Bluetooth authentication with the terminal succeeds, obtaining RFID authentication information, where the RFID authentication information includes label information and authorization information of an RFID label, and the authorization information is used to indicate an association relationship between the RFID label and the terminal; and performing RFID authentication based on the RFID authentication information, and being in a controllable state after the RFID authentication succeeds. This can effectively prevent a relay attack and improve security of a controlled device.

Verification Method and Apparatus
20230102561 · 2023-03-30 ·

A verification method and apparatus are provided. The method includes: performing Bluetooth authentication with a terminal based on Bluetooth authentication information; after the Bluetooth authentication with the terminal succeeds, obtaining RFID authentication information, where the RFID authentication information includes label information and authorization information of an RFID label, and the authorization information is used to indicate an association relationship between the RFID label and the terminal; and performing RFID authentication based on the RFID authentication information, and being in a controllable state after the RFID authentication succeeds. This can effectively prevent a relay attack and improve security of a controlled device.

CROSS PLATFORM CREDENTIAL SHARING

The present application relates to devices and components including apparatus, systems, and methods to share a credential for accessing a secured entity between an origination device and a recipient device. In some embodiments, the sharing may be cross platform where the recipient device executes a different platform than the origination device.

Online service providing system and application program

When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.

Online service providing system and application program

When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.