Patent classifications
H04W12/0471
KEY EXCHANGE WITH SMALL ENCRYPTED PAYLOAD
Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices.
ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE
An encrypted communication method is applied in a first electronic device, which includes a first processor communicating through encrypted channel of first Bluetooth, and a second processor communicating through unencrypted channel of second Bluetooth. The method includes: receiving, by the first processor, a key transmitted from a second electronic device, and transmitting the key to the second processor, the key being transmitted from the second electronic device to the first processor through the encrypted channel of the first Bluetooth; receiving, by the second processor in response to the first electronic device being switched to a system run by the second processor, a first ciphertext transmitted from the second electronic device, the first ciphertext being transmitted from the second electronic device to the second processor through the unencrypted channel of the second Bluetooth; and decrypting, by the second processor, the first ciphertext with the key to obtain the first plaintext.
METHOD FOR PROXIMITY COMMUNICATION BETWEEN TERMINALS AND APPARATUS THEREOF
A communication method according to an embodiment of the present disclosure includes establishing, by a second terminal, a connection with a first terminal through a first communication channel that uses a first protocol, receiving, by the second terminal, a first message including a public key of the first terminal from the first terminal through the first communication channel, storing, by the second terminal, the public key of the first terminal, transmitting, by the second terminal, a second message including a public key of the second terminal to the first terminal through the first communication channel, and generating a first secret key.
METHOD FOR PROXIMITY COMMUNICATION BETWEEN TERMINALS AND APPARATUS THEREOF
A communication method according to an embodiment of the present disclosure includes establishing, by a second terminal, a connection with a first terminal through a first communication channel that uses a first protocol, receiving, by the second terminal, a first message including a public key of the first terminal from the first terminal through the first communication channel, storing, by the second terminal, the public key of the first terminal, transmitting, by the second terminal, a second message including a public key of the second terminal to the first terminal through the first communication channel, and generating a first secret key.
INFORMATION PROCESSING SYSTEM, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM
An information processing system includes a first external apparatus, a second external apparatus, an information processing apparatus, and an image forming apparatus. The information processing system further includes an issuance unit configured to issue, in the first external apparatus, an access token for accessing a cloud service, a first registration unit configured to receive the access token and register the access token in the second external apparatus in association with an identifier, a display unit configured to display a reauthorization instruction object on a browser of the information processing apparatus, and a second registration unit configured to, in a case where the reauthorization instruction object is pressed and the access token is issued again, register the reissued access token in the second external apparatus in association with the identifier.
Apparatus and method for in-vehicle network communication
Disclosed herein are an in-vehicle network apparatus and method. The in-vehicle network apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program is configured to verify the integrity of software stored in advance in the executable memory, to generate a key table by sharing authentication information with a communication target, and to exchange an encrypted message with the communication target using the key table.
ELECTRONIC DEVICE AND METHOD FOR PERFORMING PEER TO PEER SERVICE IN ELECTRONIC DEVICE
An electronic device and a method for performing a peer to peer (P2P) service in the electronic device are provided. The electronic device includes a communication module, a processor, a memory, and a security module, wherein the memory may be configured to store instructions that, when executed, enable the processor to receive a public key from an external electronic device as a P2P service is requested, transmit, to the external electronic device, an authentication certificate chain generated on the basis of the received public key via the security module, verify an authentication certificate chain received from the external electronic device by using a root authentication certificate stored in the security module, receive encrypted information of the external electronic device from the external electronic device, decrypt the encrypted information of the external electronic device by using a shared key generated according to a result of the verifying of the received authentication certificate chain, and perform the P2P service with the external electronic device via the communication module, on the basis of the decoded information of the external electronic device.
ELECTRONIC DEVICE AND METHOD FOR PERFORMING PEER TO PEER SERVICE IN ELECTRONIC DEVICE
An electronic device and a method for performing a peer to peer (P2P) service in the electronic device are provided. The electronic device includes a communication module, a processor, a memory, and a security module, wherein the memory may be configured to store instructions that, when executed, enable the processor to receive a public key from an external electronic device as a P2P service is requested, transmit, to the external electronic device, an authentication certificate chain generated on the basis of the received public key via the security module, verify an authentication certificate chain received from the external electronic device by using a root authentication certificate stored in the security module, receive encrypted information of the external electronic device from the external electronic device, decrypt the encrypted information of the external electronic device by using a shared key generated according to a result of the verifying of the received authentication certificate chain, and perform the P2P service with the external electronic device via the communication module, on the basis of the decoded information of the external electronic device.
NON-ACCESS STRATUM SIGNALING OVER A NON-3GPP NETWORK
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a cellular modem may transmit, to an applications processor, an indication to use a non-Third Generation Partnership Project (non-3GPP) interworking function (N3IWF) for non-access stratum (NAS) signaling. Accordingly, the cellular modem may establish a first virtual interface with the applications processor. The cellular modem may further perform an Internet Key Exchange (IKE) procedure with a core network using the first virtual interface and the N3IWF and transmit a key generated during the IKE procedure to the applications processor. Numerous other aspects are described.
NON-ACCESS STRATUM SIGNALING OVER A NON-3GPP NETWORK
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a cellular modem may transmit, to an applications processor, an indication to use a non-Third Generation Partnership Project (non-3GPP) interworking function (N3IWF) for non-access stratum (NAS) signaling. Accordingly, the cellular modem may establish a first virtual interface with the applications processor. The cellular modem may further perform an Internet Key Exchange (IKE) procedure with a core network using the first virtual interface and the N3IWF and transmit a key generated during the IKE procedure to the applications processor. Numerous other aspects are described.