Patent classifications
H04L63/0442
Electronic device and digital key provisioning method of electronic device
Disclosed are an electronic device and a method of performing digital key provisioning of an electronic device. The electronic device according to an embodiment includes a communication unit, a memory that stores programs and data for performing digital key provisioning, and a processor configured to, by executing the programs stored in the memory, perform device authentication on a target device by performing short-range communication with the target device, identify a digital key service access right of the target device through a server by obtaining user information, and control generation and storing of a digital key in response to a digital key generation request from the target device.
Email address with identity string and methods of use
A system for authentication having an authentication protocol to communicate with the hardware device, the authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, the key pair generated from the hardware key and the software key, used to encrypt the communication between the server and the client, an identity authentication service to assign a user of the hardware device to an identity string, and creates a unique user email address based on the identity string and an authentic email server domain, and a target service having a user identity data and comparing the user identity data to the email string, and if the user identity data and the email string match, then the target service accepts the unique user email address to send a service event communication to the hardware device.
NETWORK DEVICE AUTHENTICATION
A method for authenticating an origin of a network device. The method includes reading one or more encrypted parameters from a memory of the network device, decoding the one or more encrypted parameters, and determining whether one or more of the decoded parameters match parameters obtained from a trusted platform module (TPM) installed in the network device and/or a read only memory (ROM) of the network device. In response to a mismatch between the decoded parameters and the parameters obtained from the TPM or the ROM, at least one of suspending operation of the device or transmitting a report of an authentication failure across a network on which the device is operating.
Access revocation messaging mechanism
An access revocation system for removing user data from a service provider device includes a processing device and a memory storing instructions for performing an access revocation method. The method includes receiving user data from a user device via a data channel, storing the user data in a data storage module, and receiving an access revocation message via a request channel separate from the data channel. The method also includes decrypting the access revocation message and performing at least one action defined by the access revocation message, the at least one action including scrubbing of user data from the data storage module.
CRYPTOCURRENCY SYSTEM HAVING INTEGRATED ELECTRONIC DELIVERY FEATURES
A method includes conveying a cryptocurrency transaction to a peer-to-peer network, wherein said cryptocurrency transaction having encoded therein an email address and to convey goods or services embodied in an electronic form to the email address in response to receipt of said cryptocurrency transaction on said peer-to-peer network. The conveying of goods or services includes transmitting over the Internet in conformance with an email protocol. The goods or services includes event admission tickets, music recordings, video, text, game content, live event broadcast, software, encryption keys or passwords.
Intelligent service layer for separating application from physical networks and extending service layer intelligence over IP across the internet, cloud, and edge networks
A method of separating identity IPs for identification of applications from the locator IPs for identifying the route is provided. A virtual service layer (VSL) protocol stack uses the IP addresses assigned by network administrators to the application endpoints to support the TCP/IP stack as the identity IP addresses that are not published to the underlay network for routing. On the other hand, the VSL stack uses the IP addresses assigned by the underlay network to the VSL enabled endpoints and VSL enabled routers as the locator IP addresses for routing packets. The VSL stack formats application flow packets with identity headers as identity packet and encapsulates identity packet with the locator header to route the packet. The separation of the identity and locator identifications are used to eliminate the network middleboxes and provide firewall, load balancing, connectivity, SD-WAN, and WAN-optimization, as a part of the communication protocol.
Conflict resolution in a mesh network
A method including determining, by a first device during communication with a second device for establishing a meshnet connection between the first device and the second device, presence of a conflict as to which device, between the first device and the second device, is to operate as an initiating device that is responsible for transmitting an initiation communication for establishing the meshnet connection; and resolving, by the first device, the conflict based at least in part on adjusting operation of the first device to operate as a responding device, that is responsible for responding to the initiating communication, or based at least in part on transmitting a message to the second device indicating that the second device is to operate as the responding device. Various other aspects are contemplated.
SYSTEM AND METHOD FOR LOCATING WIRELESS ACCESSORIES
Embodiments described herein provide for system and methods to crowdsource the location of wireless devices and accessories that lack a connection to a wide area network. One embodiment provides for a data processing system configured to perform operations comprising loading a user interface on an electronic device, the user interface to enable the determination of a location of a wireless accessory that is associated with the electronic device, generating a set of public keys included within a signal broadcast by the wireless accessory, the signal broadcast during a first period, sending the set of public keys to a server with a request to return data that corresponds with a public key in the set of public keys, decrypting the location data using a private key associated with the public key, and processing the location data to determine a probable location for the wireless accessory.
PERIPHERAL COMPONENT INTERCONNECT (PCI) HOSTING DEVICE
Methods and systems are disclosed to aggregate traffic from multiple server devices through a peripheral component interconnect (PCI) hosting device. In one embodiment, the PCI hosting device comprises a network interface to couple the PCI hosting device to a network, a plurality of PCI interfaces, a processing circuit to forward packets, and a power supply to supply power to the PCI interfaces independently from the plurality of server devices. Each of the PCI interfaces is designed to be coupled to one server device to the PCI hosting device, which is registered as a first PCI board of a first server device through a first PCI interface and as a second PCI board of a second server device through a second PCI interface, and the PCI hosting device is designed to forward packets between the network interface and the first server device, and the network interface and the second server device.
CLUSTER-BASED ITEM LIFECYCLE TRACKER
The disclosure is related to monitoring integrity of cargo in a container on a trans-oceanic voyage and cargo on truck or trains. The method includes determining, by a trigger from at least one remote processor, that the system is activated by a change associated with a bio-element of at least one tag on cargo in a shipping process. At least one environment camera is activated to provide an environment media. At least one data retrieving component is activated to retrieve and to provide data associated with a tracking marker of cargo associated with the container. At least one satellite receiver is activated to receive location information for the at least one local processor. One or more of the environment media, the data, and the location information is packaged for a bit stream. The bit stream is communicated to a remote device.