H04L63/0435

IoT device and authentication method thereof, cloud server, processing device and readable medium

The present disclosure provides an authentication method of an IoT device, an IoT device, a cloud server, an IoT authentication system and a computer readable medium. The authentication method includes: calculating account information corresponding to the IoT device according to an identifier and preset attribute information of the IoT device; and sending the account information to a cloud server, to cause the cloud server to perform identity authentication on the IoT device according to the account information.

Blockchained media stored in a material exchange format file
11522710 · 2022-12-06 ·

Digital media that has been blockchained into a blockchain file format may be stored into a secondary file format like a Material eXchange Format (MXF) digital file by deconstructing the blockchain file and storing its subcomponent blockchain data and blockchain hash digests for each block within separate structures of the MXF digital file by generating a table for the blockchain hash digests that links to the blockchain data through data pointers. These separate structures of the MXF digital file are the generic container for a media file and a SDTI-CP (Serial Data Transport Interface—Content Package) compatible system item.

System on a chip (SoC) communications to prevent direct memory access (DMA) attacks

This disclosure describes system on a chip (SOC) communications that prevent direct memory access (DMA) attacks. An example SoC includes an encryption engine and a security processor. The encryption engine is configured to encrypt raw input data using a cipher key to form an encrypted payload. The security processor is configured to select the cipher key from a key store holding a plurality of cipher keys based on a channel ID describing a {source subsystem, destination subsystem} tuple for the encrypted payload, to form an encryption header that includes the channel ID, to encapsulate the encrypted payload with the encryption header that includes the channel ID to form a crypto packet, and to transmit the crypto packet to a destination SoC that is external to the SoC.

Safety network of things

An apparatus includes a first sensor, and a network interface that sends a registration request and receives a recording request. The registration request indicates an identity of the first sensor, an Internet address of the apparatus, and a physical address of the apparatus. The recording request identifies the first sensor. The first sensor records data to produce a recording, at least in part based on the recording request.

SECURE COMMUNICATION METHOD

A method for secure communication between a connected object and an entity, includes, for each access to each encrypted key in the memory of the connected object, a preliminary procedure of determining, by each connected object, an access key to its encrypted memory, from at least one fingerprint of a determined memory area and/or hardware of the connected object, and wherein the connected object performs, for each sending or receipt of an encrypted message during a communication with the entity: determining, by the connected object, the access key to its encrypted memory, accessing, in the memory of the connected object, a symmetric encrypted key suitable for encrypted exchanges between the connected object and the entity, symmetric encrypting of the message to be sent to the entity or of symmetric decrypting of the message received from the entity.

Secure access to encrypted data of a user terminal
11516215 · 2022-11-29 · ·

To allow access to encrypted data stored in the memory of a user terminal, the corresponding secret encryption key is stored in a secure element integrated into the user terminal and this secure element serves as a highly secure relay toward an access device to this data, used by a third party. To do so, a secure communication channel is established between the third party and the secure element. The EAC standard allows mutual authentication accompanied by the establishment of such a secure communication channel. The secure element performs an encryption conversion of the data so that the latter is protected by a session (or transport) key associated with the secure communication channel, and no longer by the initial secret key. The third party can thus access the encrypted data without even knowing the initial secret key.

Semiconductor device, update data-providing method, update data-receiving method, and program

A semiconductor device includes a memory, a random number generation circuit, and a control circuit. The memory stores key information, and the random number generation circuit generates first and second random number signals. The control circuit generates sixth and seventh random number signals from the first random number signal and the key information, generates encrypted update data from update data using the seventh random number signal, transmits the first and second random number signals as request signals to an external terminal device, receives, from the external device, first and second response signals as response signals in response to the request signals, generates an eighth random number signal using the first response signal, the second and the sixth random number signals as input signals, and provides the encrypted update data for the external terminal device when the second response signal coincides with the eighth random number signal.

Method of and system for secure data export from an automotive engine control unit

A method of secure data export from an automotive ECU to a requesting entity includes receiving a signed request, the request transmitting a first public encryption key. The signature is verified using a second public key stored in the automotive ECU. Further, the requesting entity is authenticated. Only upon successful verification and authentication the automotive ECU generates a random symmetric key for encrypting the data to be exported. The symmetric key is encrypted using the first public key received in the request, and unencrypted data is deleted. The encrypted data is exported to the requesting entity, which decrypts the symmetric key using a first private key associated with the first public key, and decrypts the data encrypted with the symmetric key.

HANDLING JOINING AND LEAVING OF PARTICIPANTS IN VIDEOCONFERENCING WITH END-TO-END ENCRYPTION
20220376895 · 2022-11-24 ·

One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.

MAINTAINING AND RECOVERING SECURE CLOUD CONNECTIONS
20220377060 · 2022-11-24 ·

A method enabling recovery of a terminated client-to-cloud processing sessions includes writing at least some data of cloud-based processing session between a cloud based server and a client device to the client device. Responsive to satisfaction of a session termination condition, the stored data is encrypted such that it can be recovered using suitable decryption techniques when the client-to-cloud-connection is subsequently re-established.