Patent classifications
H04L63/0492
METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF THE IDENTITY OF A DIGITAL ENTITY USING A CENTRALIZED OR DISTRIBUTED LEDGER
Methods and systems of providing verification of the identity of a digital entity are provided, including receiving information and a public key of the digital entity, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a record of transactions; deriving an attestation address using the information and the public key of the digital entity; verifying the existence of the attestation transaction at the attestation address in the centralized or distributed ledger and verifying that the attestation transaction has not been revoked; receiving at the processor associated with the user a cryptographic challenge nonce signed by the digital entity's private key; and verifying the digital entity's identity with the cryptographic challenge nonce signed by the digital entity's key.
Mobile device security using wearable security tokens
The claimed subject matter provides systems and/or methods that effectuates and establishes mobile device security. The system can include devices that detect point of sale mechanisms or secure token devices and based at least in part on the detection of secure token devices the system effectuates release of electronic funds persisted on a mobile device in order to satisfy a debt accrued at the point of sale mechanism.
Proximity check for communication devices
There is described a method of checking whether a transponder device (220) is in proximity of a reader device (210), the method comprising (a) transmitting a first command (331) from the reader device to the transponder device, (b) in response to receiving the first command at the transponder device, transmitting a first response (332) to the reader device, the first response including an expected transponder device response time (pubRespTime) which is stored in a memory (224) of the transponder device, (c) transmitting a second command (333) from the reader device to the transponder device, (d) in response to receiving the second command at the transponder device, transmitting a second response (334) to the reader device, (e) at the reader device, determining the transponder device response time as the difference in time between transmitting the second command and receiving the second response from the transponder device, and (f) determining whether the determined transponder device response time matches the expected transponder device response time included in the first response. There is also described a reader device (210), a transponder device (220), and a contactless communication system (200).
Secure transaction systems and methods
Systems and methods are described that use tag authentication and presence verification techniques in connection with a variety of transactions. In certain embodiments, an authentication device may verify the authenticity of a secure tag by determining whether the secure tag stores secret information provisioned by a trusted authority. In some embodiments, such an authentication process may be performed without exposing the secret information to the authentication device, thereby maintaining integrity of the secure tag. In other embodiments, insecure tags and/or tags that do not include secret information are used.
Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product
According to an aspect of the invention, a method for establishing secure communication between nodes in a network is conceived, wherein the network comprises a key manager which accommodates a key-manager-specific public key and a corresponding key-manager-specific private key; wherein a copy of the key-manager-specific public key is stored in an installation device; wherein the installation device provides a new node with the copy of the key-manager-specific public key; and wherein said new node is registered with the key manager by providing a node-specific public key and an identifier of said new node to the key manager, such that other nodes in the network may setup end-to-end secure connections with said new node by requesting the node-specific public key of said new node from the key manager.
Communication device capable of interacting with devices on a network
A system and method for seamless exchange and interaction of multimedia content between communication devices in a network are disclosed. The method can include the discovery and identification of devices within proximity of a sending device. The found devices can be authenticated through unique identifiers established during registration. Connection requirements can be determined based on the identifiers associated with the found devices and the sending device. In turn, the sender can establish a connection with the found devices using the connection requirements. The sending device can share or serve as a remote control to redirect and navigate the content, with a simple action or a gesture command, to the found device. The shared multimedia content, can either reside on the sender's mobile device or on a remote server within a connected network.
ADDRESSING METHOD AND ADDRESSING DEVICE
An addressing method is provided, including: determining, by a UE, configuration information of an uplink position signal; and transmitting, by the UE, the uplink position signal carrying an identifier of the UE to a network side in accordance with the determined configuration information, to enable the network side to determine addressing information of the UE in accordance with the identifier of the UE, and address the UE in accordance with the identifier and the addressing information of the UE in the case that it is necessary to address the UE.
Secure and Anonymized Authentication
An embodiment may involve receiving, by a computing system, a message from a wireless service provider system. The computing system may include one or more computing devices located, e.g., in the trusted cloud. The message may contain a service-provider-based identity of a client device, an indication that the service-provider-based identity has been authenticated by the wireless service provider, and a code that the client device obtained from a remote machine proximate to the client device. The computing system may generate an anonymized identity of the client device based on the service-provider-based identity. The computing system may verify that a task associated with the code is within the authorized capabilities of the anonymized identity. Possibly based on the code (and perhaps other information as well), the computing system may transmit an instruction to the remote machine. The instruction may direct the remote machine to perform the task.
INFORMATION PROCESSING SYSTEM, METHOD OF OBTAINING MONITOR INFORMATION, AND SENSOR DEVICE
An information processing system includes an information processing device including a processor, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.
NFC apparatus capable to perform a contactless tag reading function
An NFC device may include a first and second controller interfaces, a first communication channel coupled to the first controller interface, and a second communication channel connected to the second controller interface. A secure element may include a secure element interface connected to the first communication channel and encryption/decryption circuitry configured to encrypt data to be sent on the first communication channel for being framed into the encrypted frames and to decrypt encrypted data extracted from the encrypted frames and received from the first communication channel. The secure element may also include management circuitry configured to control the encryption/decryption circuitry for managing the encrypted communication with the NFC controller. A device host may include a host device interface coupled to the second controller interface and control means or circuitry configured to control the management circuitry through non-encrypted commands exchanged on the first and second communication channels.