H04L63/0414

Systems and methods to enable network coordinated MAC randomization for Wi-Fi privacy
11196709 · 2021-12-07 · ·

This disclosure describes systems, methods, and apparatus related to receiving, at an access point and from a wireless communication station, a media access control (MAC) address of the wireless communication station; assigning, at the access point, a prefix to the MAC address of the wireless communication station; receiving, at the access point and from the wireless communication station, a frame comprising the prefix and a random MAC address; replacing, at the access point and using the prefix, the random MAC address in the frame with the MAC address of the wireless communication station, thereby resulting in a processed frame; and transmitting, at the access point and to a destination device, the processed frame.

Classical implementation of quantum entanglement in datacenter network design
11196713 · 2021-12-07 · ·

Quantum mechanics provides several features useful for datacenter networking. The no cloning theorem, which states that it is impossible to mate a duplicate of an arbitrary, unknown quantum state, can be used to detect eavesdroppers. Entanglement allows two parties to have common knowledge of a shared state. These properties are being used today for quantum key exchange and quantum computing, but they are currently too expensive for general use. Fortunately, we can use classical mechanisms to get a close enough approximation of these quantum properties to solve some important problems in distributed computing. Nothing we describe here is quantum mechanical. Rather, we show that it is possible to use classical mechanisms to emulate some properties of quantum mechanics, which enable us to address interesting problems in distributed computing. The engineering insight, is that we can get closer to achieving these properties than might be expected through conventional thinking. The key to obtaining the properties we desire is to make the inherently asynchronous system temporarily locally synchronous for the operations we need. In this patent, we describe how to classically emulate the parts of the no cloning theorem and entanglement that we need for datacenter networking. We then demonstrate how those approximations to quantum behavior can be used to solve important problems in distributed computing, such as ‘exactly-once’ semantics in an environment where failures occur and can be healed without applications needing to know.

SECURE PROVISIONING AND MANAGEMENT OF DEVICES

Systems, methods and devices are provided for provisioning a computerized device. The system may include a distributor computer that is connected to the computerized device and is operable to receive a first digital asset and transmit it to the computerized device, and a server that is connected to the distributor computer, and that transmits the first digital asset to the distributor computer when a first authorizing condition is met, the first digital asset being configured to cause the computerized device to become partially provisioned, wherein the server transmits a second digital asset to the computerized device, and the computerized device is functional after the second digital asset is transmitted to the computerized device.

PRIVATE WEB SYSTEMS AND USES THEREOF
20210377227 · 2021-12-02 ·

Provided herein is a system for protecting the privacy of internet users. The system is supported by a distributed internet service technology and has an application module with a group of decentralized applications and an online access portal, a data module for handling user privacy data between application and the internet, and a cloud module that supports all applications, middleware, data and online access services across all user-designated personal online devices.

CREATING A PSEUDONYM FOR REQUESTING A NETWORK SLICE

A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.

Distributed entity counting with inherent privacy features
11368465 · 2022-06-21 · ·

Systems and methods provide an entity identifier (EID) for use in distributed systems, where the entity identifier includes inherent privacy features and where an estimate of the distinct count of the entity identifiers in a distributed system can be determined. A unique identifier (e.g., a GUID) for an entity is received. A hash value can be generated for the unique identifier using a hash function that is not guaranteed to generate unique values. An EID is created using a portion of the bits of the hash value and stored in a database. An estimated distinct count of entities based on a count of EIDs in the database can be determined based on the count of EIDs in the database and the size of the EID space.

Methods and Systems for Efficient Encrypted SNI filtering for Cybersecurity Applications
20220191171 · 2022-06-16 ·

A packet-filtering system described herein may be configured to filter packets with encrypted hostnames in accordance with one or packet-filtering rules. The packet-filtering system may resolve a plaintext hostname from ciphertext comprising an encrypted Server Name Indication (eSNI) value. The packet-filtering system may resolve the plaintext hostname using a plurality of techniques. Once the plaintext hostname is resolved, the packet-filtering system may then use the plaintext hostname to determine whether the packets are associated with one or more threat indicators. If the packet-filtering system determines that the packets are associated with one or more threat indicators, the packet-filtering system may apply a packet filtering operation associated with the packet-filtering rules to the packets.

Secure device relay

Embodiments of the present invention disclose a method, a computer program product, and a computer system for providing a secure device relay between a data collection device and a server using a smart device. The present invention comprises transmitting to a server a unique identifier corresponding to a data collection device and a digital signature corresponding to a smart device. In addition, the present invention provides for receiving from the server a key pair and an exchange configuration defining access control to data stored on the data collection device. Moreover, the present invention includes transmitting to the data collection device a public key of the received key pair and the exchange configuration.

System and method for decentralized internet traffic filtering policy reporting
11363062 · 2022-06-14 · ·

A system and method to filter potentially unwanted traffic from trackers, third-party cookies, malicious websites or other sources and present the aggregated results of said filtering to the VPN user. One of the embodiments enables a VPN user to opt-in or opt-out from the filtering activities while being able to access the aggregated information about filtering. In another embodiment, the user can choose to customize the filtering parameters to add or remove specific targets from the filtering policies.

Identity Authentication Method and Apparatus
20220182825 · 2022-06-09 ·

A method comprises generating, based on identity information of a user by an identity management server, a temporary privacy identity identifier of a terminal device, receiving, from the terminal device, a network access request comprising the temporary privacy identity identifier, generating an authentication key of the temporary privacy identity identifier based on the temporary privacy identity identifier and a primary identity authentication key of a domain to which the terminal device belongs, generating a first message based on the temporary privacy identity identifier and the authentication key, sending the first message to the terminal device, receiving a second message from the terminal device based on the first message, performing authentication on the second message based on the temporary privacy identity identifier and the authentication key, and allowing access to a network device by the terminal device after the authentication succeeds.