Patent classifications
H04L9/0872
TIME-BASED ENCRYPTION KEY DERIVATION
Techniques are disclosed securely communicating traffic over a network. In some embodiments, an apparatus includes a first circuit having a local clock configured to maintain a local time value. The first circuit is configured to determine a synchronized time value based on the local time value, the synchronized time value being an expected time value of a reference clock. The first circuit is further configured to generate a first encryption key by calculating a key derivation function based on the synchronized time value and encrypt a portion of a packet using the first encryption key, the portion of the packet being to be communicated to a second circuit. In some embodiments, the apparatus further includes a first network node coupled to the first circuit and configured to communicate the packet to a second network node coupled to the second circuit and to include the synchronized time value in the packet.
DEVICES AND METHODS UTILIZING SENSOR INFORMATION FOR INCREASED TRUST LEVEL
Various embodiments may include methods and systems for providing security on a system-on-a-chip (SoC). A method may include receiving, from a service requesting environment by a secure subsystem, a request to perform a cryptographic function, in which the secure subsystem stores a condition for performing the requested cryptographic function. The method may further include receiving, by the secure subsystem, an input from a sensing circuit that includes at least one indication relevant to the condition for performing the requested cryptographic function, determining, by the secure subsystem, whether the input indicates that the condition for performing the requested cryptographic function is satisfied, and performing the requested cryptographic function using a cryptographic key stored in the secure subsystem in response to determining that the condition is satisfied.
DATA ENCRYPTION AND DECRYPTION USING OBJECT-BASED SCREENS AND LOGIC BLOCKS
A plurality of data blocks are encrypted in accordance with an encryption scheme that transforms a data block into an encrypted data block by: performing a bit modification operation on the data block using one or more logic blocks generated for the data block to thereby generate a first intermediate state data block; performing a bit remapping operation on the first intermediate state data block using at least one encryption screen to thereby generate a second intermediate state data block; and performing a bit modification operation on the second intermediate state data block using one or more logic blocks generated for the data block to thereby generate the encrypted data block. The encrypted data blocks may then be decrypted in accordance with a decryption scheme that applies at least one decryption screen and the same logic blocks that were used in the encryption scheme.
APPARATUS AND METHOD FOR REGISTRATION AND AUTHENTICATION OF USER EQUIPMENT FOR CONTROLLING VEHICLE
A device for registering and authenticating a user device for vehicle control includes: a communication unit connected to the user device to receive an authentication request from the user device; an interface configured to communicatively connect with at least one antenna included in the vehicle and communicating with a FOB of the vehicle; and a processor configured to detect whether the user device is registered based on at least one of user information and device information included in the received authentication request, to detect whether a user of the user device has the FOB by using the at least one antenna, and to control a registration process of the user device which is set differently depending on whether the user has the FOB when the user device is not registered.
Contaminant Inhibition Pathway Control System
A system and method for contaminant control, often infection control, with multiple time and space domains that integrate active and passive infection control devices and processes that preferably feature infection control active additives with controllable dispassivation to limit post-consumption environmental impact. Additionally, the system executes the infection control devices and process transactions by controlling the dispatch of infection control tasks centered around a potential infection control incidence and/or cross-contamination locations from assets or personnel having probabilistic infection rates to increase compliance of infection control preventative measures.
Use Of Random Entropy In Cryptography
A system that uses a computing device to encrypt data by obtaining multiple series of random numbers, and then time-correlating these series to form a series of composite elements. By selecting a section of the series of composite elements, the computing device can obtain a key for encrypting data.
Public access hyperlocal information exchange
Localized content from at least one local merchant is provided to a user through a publicly accessible computer device. A server interfaces to one or more publicly accessible computer devices that are associated with a vendor. The computer devices interface to content sources through a network. A user access is detected and the identity of the user and the computer device is determined. These identities are provided to a server. The server then provides content to the computer device that is selected based on the identity of the user and the computer device. At least a portion of the content is advertising from a local merchant. Revenue is obtained from the local merchants and a portion is provided to the vendor associated with the particular computer device.
Cyber-physical context-dependent cryptography
A method for cryptographic key management for managing access control is provided. A key is divided into a plurality of portions of the key. Pre-encryption contextual data is received for each of a plurality of devices. The pre-encryption contextual data indicates at least one attribute of a respective device of the plurality of devices before an encryption of the plurality of portions of the key is performed. The plurality of portions of the key are encrypted based at least on the pre-encryption contextual data of the plurality of devices to make the plurality of the portions of the key dependent at least on contextual data corresponding pre-encryption contextual data. Each of the plurality of encrypted portions of the key is distributed to a respective device of the plurality of devices for storage and retrieval.
Security mechanism for wireless authentication devices
Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.
CROSS-REFERENCING DEVICE
To realize one-time password cross-referencing at low cost. A cross-referencing device includes a clock unit which keeps time by a built-in clock, and an authentication calculation unit which has a minor password FIFO capable of storing (N + 1) numerical values from a last written numerical value to a numerical value written N (N being a natural number) before and which generates a time-synchronized first cross-referencing one-time password at a time point having a predetermined time relationship with the current time at a predetermined first time interval on the basis of the time indicated by the clock, writes the same in the minor password FIFO, and determines that authentication is successful where an authentication target one-time password received in a first authentication request matches with any of the (N + 1) first cross-referencing one-time passwords in the minor password FIFO.