H04L63/0442

System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
11574379 · 2023-02-07 · ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

METHOD FOR ROLE-BASED DATA TRANSMISSION USING PHYSICALLY UNCLONABLE FUNCTION (PUF)-BASED KEYS
20230100052 · 2023-03-30 ·

A method includes encrypting a first message that contains a first public key of a first peer, by using a second public key of a second peer; and decrypting a second message sent from the second peer by using a first private key paired with the first public key. The second message may be encrypted at the second peer by using the first public key, and may contain an encrypted data encrypted by the second peer using the second public key and hashed by using a secret key of the first peer. The first public key, the second public key, the first private key and the secret key may be physically unclonable function (PUF)-based keys.

METHOD FOR OPERATING A CONTROL ARRANGEMENT FOR AN ENERGY NETWORK, AND CONTROL ARRANGEMENT
20230094465 · 2023-03-30 ·

A method for operating a control arrangement for an energy network. The control arrangement has a cloud infrastructure with data processor resources and data storage resources. A first group of software modules is executed on the cloud infrastructure, and a second group of software modules is locally executed on a server computer arrangement. The first group and the second group are connected for data communication via interfaces. The interfaces utilize a public key infrastructure (PKI) for encryption.

Method for performing distance measurement and authentication concurrently and electronic device thereof

A first electronic device, second electronic device, and a method are disclosed herein. The first electronic device includes communication circuitry and a processor that implements the method, including transmitting, using the communication circuit, a distance measurement signal including the first secure preamble to the second electronic device, receiving a response signal through the communication circuit including a second secure preamble generated by the second electronic device from the external electronic device, authenticating the response signal based on the second secure preamble, and based on successful authentication, determining a distance to the second electronic device based on a transmission time of the distance measurement signal and a reception time of the response signal.

Method for Performing Secure Boot Based on Redundant Cryptographic Algorithm and Device
20230095143 · 2023-03-30 ·

This application discloses a method for performing secure boot based on a redundant cryptographic algorithm and a device. The method includes: obtaining first indication information and second indication information, and updating first baseline information based on the first indication information and the second indication information. The first indication information uniquely identifies a first cryptographic algorithm, the second indication information is used to instruct a network device to update the first cryptographic resource baseline information stored in a secure storage entity, and the first cryptographic resource baseline information is used to perform integrity verification on a first cryptographic resource used by the network device in a secure boot process.

Systems and methods for secure provisioning of SSH credentials

Embodiments relate to systems and methods for securely provisioning login credentials to an electronic device on a network, e.g., a consumer premises device (CPE) device, such as, among other devices, a modem. The login credential may be used, for example, for securely provisioning and configuring a CPE device.

Centralized management of private networks

Described herein are systems, methods, and software to manage private networks for computing elements. In one example, a computing element may obtain credential information associated with a user and generate a public-private key pair for the computing element. The computing element may further communicate the public key from the pair with metadata to a coordination service to register the computing element at the coordination service. Once registered, the computing element may receive communication information associated with one or more other computing elements that permit the computing element to communicate with the other computing elements.

SINGLE LOGOUT

Systems and methods for a single logout between two independent systems are described herein. The system includes a first access control system having a first login protocol. The first access control system includes at least one first processor, and a memory comprising a plurality of instructions executable by the at least one first processor. The system includes a second access control system. The second access control system has a second login protocol independent of the first login protocol. The first access control system can receive a logout request from a user at the first access control system, logging the user out of the first access control system, and utilizing a trust mechanism to log the user out of the second access control system.

METHOD AND ELECTRONIC VEHICLE SYSTEM FOR PROCESSING V2X MESSAGES
20230094360 · 2023-03-30 ·

A method for processing V2X messages by an electronic vehicle system, including receiving a V2X message by a verification device of a V2X communication device, determining whether the V2X message should be verified by the verification device and if no verification of the V2X message is to be carried out: forwarding the unverified V2X message or at least a part of the message content of the unverified V2X message to a processing device, wherein the processing device determines whether an action should be initiated on the basis of the part of the message content; verifying the V2X message if it is determined that an action should be initiated. The disclosure also relates to a corresponding electronic vehicle system and a vehicle, including the vehicle system.

Authentication of Networked Devices Having Low Computational Capacity

Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.