Patent classifications
H04L63/0492
SECURE PASSWORD GENERATION AND MANAGEMENT USING NFC AND CONTACTLESS SMART CARDS
Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.
METHOD, ELECTRONIC DEVICE, AND PROGRAM PRODUCT IMPLEMENTED AT AN EDGE SWITCH FOR DATA ENCRYPTION
Embodiments of the present disclosure provide a method, an electronic device, and a program product implemented at an edge switch for data encryption. For example, the present disclosure provides a data encryption method implemented at an edge switch. The method may include receiving encryption and decryption information for an encryption operation or a decryption operation from a source device. In addition, the method may include encrypting a data packet received from the source device based on encryption information in the encryption and decryption information to generate an encrypted data packet. The method may further include sending the encrypted data packet to a target device indicated by the data packet. The embodiments of the present disclosure can reduce the computing loads of Internet of Things (IoT) devices, clouds, and servers while ensuring encryption performance, and can also reduce the time delay caused by encryption and decryption operations.
Secure RFID tag identification
A method, apparatus and system for secure one-way RFID tag identifications provided. The method comprising generating, at an RFID tag, an auxiliary identifier; generating, at an RFID tag, a secure representation based on the auxiliary identifier; transmitting, from the RFID tag and receiving at an RFID reader, one or more representations of the auxiliary identifier and the tag identifier including the secure representation; and verifying the identity of the RFID tag based on the received representations.
Method, device and computer program for transmitting and obtaining network credentials
Arrangements for transmitting network credentials from a user device to a second device to enable the second device to connect to a network are disclosed. At the user device, a user inputs network credentials for the second device to enable the second device to connect to a network. The user device transmits modulated light to the second device. The light is modulated so that the transmitted light is encoded with the network credentials. The second device has a photo sensor for receiving the modulated light from the user device and a processor for processing the modulated light to obtain the network credentials from the received modulated light.
Establishing connectivity between user devices
A computer-implemented method, computer program product, and computer system is provided for establishing connectivity between user devices. The computer-implemented method includes: broadcasting a message to running processes on an operating system of the first user device to indicate that a requesting application is looking for a live connection channel to attempt discovery with a second user device to ascertain virtual proximity of the first user device with the second user device. The computer-implemented method further includes receiving a response from a live connection channel and attempting to verify pairing via the live connection channel to confirm a virtual proximity of the second user device with the first user device. The pairing provides information for establishing a subsequent connection between the first and second user devices via the requesting application.
PARTIAL USES OF CLUSTERED ACCESS RIGHTS
Systems and methods are provided for communication networks and network operations for processing partial uses of clustered access rights. The communication networks may include channels such as short-range communication channels, such as Bluetooth, BTLE, and/or near-field communication (NFC) channels.
Proximity Boundary Based Communication Using Radio Frequency (RF) Communication Standards
Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined by a communication range of one of a first Short Range Communication (SRC) device and a second SRC device. The first SRC device and the second SRC device can be configured to communicate using near field magnetic induction (NFMI). A proximity signal can be communicated in the proximity boundary between the first SRC device and the second SRC device. A security permission can be provided to enable selected data to be communicated from one or more of the first SRC device or the second SRC device in the proximity boundary when the proximity signal is detected between the first SRC device and the second SRC device. The selected data can be communicated from one or more of the first SRC device or the second SRC device using a radio frequency (RF) communication standard.
SYSTEMS AND METHODS FOR SAFE OVER-THE-AIR UPDATE OF ELECTRONIC CONTROL UNITS IN VEHICLES
Systems and method for safe over-the-air (OTA) update of electronic control units in vehicles are provided. The OTA server determines whether an operator terminal is close to a vehicle and if so, sends a request to the operator terminal requesting confirmation for proceeding with completing a firmware update for an electronic control unit in the vehicle. In response to receiving the confirmation, the OTA server sends a request to a telematics device coupled to the vehicle to complete the firmware update.
Portable electronic authentication device
A portable electronic authentication device (10) for providing access to a website or a computer resource or a secure place. The portable electronic device includes a first communication unit (11) and a second communication unit (12) different from the first communication unit. The first communication unit is intended to receive an interrogation signal (S.sub.P) from a control device of a control system, which includes the portable electronic device. The second communication unit is intended to transmit a response signal (S.sub.L) which includes identification data of the portable electronic device to authenticate the portable electronic device in the control system and allow access to a website or a computer resource or a secured place.
Communication device and system
A communication device provides secure inter-device authentication that ensures certainty of processes. The communication device includes a control section configured to execute a process related to transmission or reception of a first authentication signal and a second authentication signal that are necessary for a first authentication process for authentication between the communication device and another communication device. The control section further controls a second authentication process for different authentication from the first authentication process, and starts a process related to transmission or reception of first information that is necessary for the second authentication process after transmission or reception of the second authentication signal.