H04W12/69

KEY EXCHANGE WITH SMALL ENCRYPTED PAYLOAD
20220394464 · 2022-12-08 ·

Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices.

SYSTEM FOR NETWORK SECURITY AND USER AUTHENTICATION VIA NETWORK AUGMENTATION

Aspects of the subject disclosure may include, for example, a device that includes a first wireless network transceiver; a second wireless network transceiver; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a wireless network connection to an access point via the first wireless network transceiver, wherein the access point provides a temporary network name for the wireless network connection, wherein the temporary network name is different from an original network name; providing wireless networking services via the second wireless network transceiver using the original network name; adjusting a coverage area of the wireless networking services; and connecting a network device in the coverage area to the wireless networking services via the second wireless network transceiver. Other embodiments are disclosed.

SYSTEM FOR NETWORK SECURITY AND USER AUTHENTICATION VIA NETWORK AUGMENTATION

Aspects of the subject disclosure may include, for example, a device that includes a first wireless network transceiver; a second wireless network transceiver; a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of establishing a wireless network connection to an access point via the first wireless network transceiver, wherein the access point provides a temporary network name for the wireless network connection, wherein the temporary network name is different from an original network name; providing wireless networking services via the second wireless network transceiver using the original network name; adjusting a coverage area of the wireless networking services; and connecting a network device in the coverage area to the wireless networking services via the second wireless network transceiver. Other embodiments are disclosed.

COLLABORATIVE DEVICE ADDRESS ROTATION
20220386110 · 2022-12-01 ·

Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.

COLLABORATIVE DEVICE ADDRESS ROTATION
20220386110 · 2022-12-01 ·

Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.

Firewall service insertion across secure fabric preserving security group tags end to end with dual homed firewall

Systems, methods, and computer-readable media for preserving source host context when firewall policies are applied to traffic in an enterprise network fabric. A data packet to a destination host from a source host can be received at a first border node instance in an enterprise network fabric as part of network traffic. The data packet can include a context associated with the source host. Further, the data packet can be sent to a firewall of the enterprise network fabric and can be received at a second border node instance after the firewall applies a firewall policy to the data packet. The data packet can then be selectively encapsulated with the context associated with the source host at the second border node instance for applying one or more policies to control transmission of the network traffic through the enterprise network fabric.

Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
11516014 · 2022-11-29 · ·

A system for cryptographic wireless detection and authentication of fluids includes a computing device configured to receive, from a transmitter attached to a container, a unique identifier associated with a fluid contained in the container, locate, at an immutable sequential listing, at least an identifier-specific record using the unique identifier, and a lot identifier associated with the unique identifier, retrieve, from the immutable sequential listing, at least a lot-specific record using the lot identifier, capture, from the container, at least a secondary datum describing the container, generate an authenticity probability score as a function of the at least an identifier-specific record, the at least a lot-specific record, and the at least a secondary datum, and display to a user an output based on the authenticity probability score.

Surveillance camera setting method, method of controlling an installation of a surveillance camera and surveillance camera system

A method of setting a surveillance camera includes the steps of recognizing a readable object in an image captured by the surveillance camera, updating a set value of one or more set items of the surveillance camera associated with the readable object, and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom.

Surveillance camera setting method, method of controlling an installation of a surveillance camera and surveillance camera system

A method of setting a surveillance camera includes the steps of recognizing a readable object in an image captured by the surveillance camera, updating a set value of one or more set items of the surveillance camera associated with the readable object, and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom.

Identity authentication method and system, and computing device
11509485 · 2022-11-22 · ·

Identity authentication method, system, and computing device are disclosed. The method includes: an identity authentication method is provided, which includes: a first device establishing a communication connection with a second device, and obtaining encrypted information through the Internet, where the first device is a device that is allowed to access the Internet, and the second device is a device that is not allowed to access the Internet; the first device encrypting identity information of an account that is logged into the second device by using the encrypted information, and sending the encrypted identity information to the second device; and the first device receiving a verification result that is returned by the second device, wherein the second device verifies the encrypted identity information based on verification information.