H04L63/0442

Method and system for data tasking and receipt
11588795 · 2023-02-21 · ·

A tasking network system comprising a client system configured to send a tasking order and providing instructions for operating a remote device anonymously. An operations center including configured to receive an incoming tasking order and processor handling the incoming tasking order without receiving the client ID from the client. A security tag is associated with the tasking order which may be correlated in a remote server.

Terminal device and non-transitory computer-readable recording medium storing computer readable instructions for terminal device
11589223 · 2023-02-21 · ·

A terminal device may determined whether the terminal device has been established a wireless connection with an access point. In a case where it is determined that the terminal device has been established the wireless connection with the access point, the terminal device may send first connection information to the communication device, the first connection information being for establishing a wireless connection between the communication device and the access point. In a case where it is determined that the terminal device has not been established the wireless connection with the access point, the terminal device may communicate second connection information with the communication device, the second connection information being for establishing a wireless connection between the terminal device and the communication device not via the access point.

SYSTEMS AND METHODS FOR GROUP MESSAGING USING BLOCKCHAIN-BASED SECURE KEY EXCHANGE

A system described herein provide for the secure maintaining and providing of information, such as public keys used in Public Key Infrastructure (“PKI”) techniques or other techniques, using a secure distributed ledger (e.g., “blockchain”) system. A first entity may generate an asymmetric key pair that includes a public key and a private key, and may provide the public key, along with a key identifier, to a blockchain system for retrieval by multiple other entities. For example, the entities may be engaged in a secure group communication session, in which communications are encrypted and may be decrypted using one or more keys, including the public key. The other entities may identify the public key, as recorded to the blockchain system, based on the key identifier. Participants may be added to or removed from the secure group communication session.

SYSTEMS AND METHODS FOR COLLABORATIVE BLOCKCHAIN ESTABLISHMENT FOR BLOCKCHAIN-BASED SECURE KEY EXCHANGE

A system described herein provides for the secure maintaining and providing of information, such as public keys used in Public Key Infrastructure (“PKI”) techniques or other techniques, using a distributed ledger (e.g., “blockchain”) system. A first device may output a first request to a second device to establish a communication session between the first device and the second device, where the request includes a first value. The first device may receive a second request from the second device, including a second value, to establish the communication session between the first device and the second device. The first device may determine, based on a comparison of the first and second values, that the first device should initiate an establishment procedure of a blockchain associated with the communication session between the first device and the second device, and may accordingly output a blockchain establishment message to a set of devices.

MODULAR SECURE REMOTE WORK PLATFORM
20220368687 · 2022-11-17 ·

There is disclosed a system for secure remote work. An associated client computer may receive a login attempt from a user, provide login credentials received from a user to a remote computing device for authentication. The client computer may then receive confirmation of authentication along with a request for security protocol testing in conformity with security requirements for access to a secure remote work environment, perform security protocol testing on the client computing device, and provide security protocol test results generated by the security protocol testing to the remote computing device. Thereafter, the remote client may access to the secure remote work environment upon confirmation that the security protocol test results pass the security protocol testing.

Operating system with automatic login mechanism and automatic login method

An operating system with automatic login mechanism and an automatic login method are provided. The operating system includes a first electronic device, a second electronic device and a server device. The second electronic device includes a biometric sensor. When a login event of the first electronic is triggered, the first electronic device sends a login request to the second electronic device directly or via the server device, so that the second electronic device performs a biometric verification by the biometric sensor according to the login request. When the biometric verification is passed, the second electronic device sends a first login credential to the first electronic device directly or via the server device, so that the first electronic device performs an automatic login operation of the first electronic device according to the first login credential.

System and method for securing a content creation device connected to a cloud service

A certified application is installed onto a content creation device and a mobile certified application is installed onto a mobile device, the applications establish first and second trust relationships with the cloud service. The certified application and mobile certified application establish the third trust relationship via a proximity network. The mobile certified application generates a first ephemeral key pair having a private part. The certified application generates a second ephemeral key pair having a private part. The mobile certified application requests a service from the content creation device involving the transfer of data between the content creation device and the cloud service. The data is protected by at least one of the first and second ephemeral key pairs in response to invocation of the service. The service results in the data being stored at the cloud service and/or rendered at the content creation device.

Electronic apparatus and controlling method thereof

An electronic apparatus includes a communication interface, a memory; and a processor. The memory is configured to store a hypervisor. The processor is configured to obtain an authentication key for performing authentication of an external device. The processor is also configured to encrypt the authentication key based on a key pre-stored in the memory using the hypervisor and store the encrypted authentication key in the memory. Based on a request for information that is stored in the memory being received from the external device, the processor is configured to perform authentication of the external device using the hypervisor. Based on the authentication of the external device being completed, the processor is configured to control the communication interface to transmit the stored information to the external device.

Network services in a mesh network
11589233 · 2023-02-21 · ·

A method including receiving, by a first device from a second device in a mesh network, an access request from the second device to access a network service available to the first device, the request being received via a meshnet connection between the first device and the second device; and transmitting, by the first device to the second device, access information associated with accessing the network service based at least in part on receiving the access request, the access information being transmitted via the meshnet connection. Various other aspects are contemplated.

Service processor and system with secure booting and monitoring of service processor integrity

A service processor is provided that includes a processor, a memory coupled to the processor and having instructions for executing an operating system kernel having an integrity management subsystem, secure boot firmware, and a tamper-resistant secure trusted dedicated microprocessor. The secure boot firmware performs a secure boot operation to boot the operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of the tamper-resistant secure trusted dedicated microprocessor. The operating system kernel enables the integrity management subsystem. The integrity management subsystem records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.