H04W12/0471

Network key recovery, network key recovery management, network key provision, terminal, server and access point implementing same
11589221 · 2023-02-21 · ·

A method for recovering a network key of an access point to a network, implemented by a terminal. The network key allows the terminal to be associated with the access point upon a first connection of the terminal to the access point. The network key recovery method includes: receiving, by the terminal, a network key provided by the access point on a server following a request, by the terminal to the server, for the network key of the access point, the request including an identifier of the access point and having been relayed by the server to the access point associated with the identifier of the access point in the request. Thus, as the access point does not transmit the network key directly to the terminal, but to a server on which the terminal will recover it, this limits intrusions into the network linked to the vulnerability of the Wi-Fi network.

System and Method for Dynamic Temporary Payment Authorization in a Portable Communication Device

A system for issuing a dynamic temporary credential to a portable communication device for use in a transaction with an electronic control point. The system receives the current geo-location of the portable communication device and transmits a dynamic temporary credential to the portable communication device from the centralized computer. The system further scores the risk in authorizing a transaction associated with an electronic control point using the dynamic temporary credential it issued. The system may prevent the transmission of the dynamic temporary credential until the end user has been authenticated, which may include verifying one or more of a manually input passcode, the unique digital signature of the portable communication device, and know your customer queries. The system may further include a validation mapping gateway operably connected to one or more issuers that substitutes legacy payment data for the dynamic temporary credential in a payment transaction before sending the payment transaction along with the risk score to the issuer associated with the legacy payment data.

System and Method for Dynamic Temporary Payment Authorization in a Portable Communication Device

A system for issuing a dynamic temporary credential to a portable communication device for use in a transaction with an electronic control point. The system receives the current geo-location of the portable communication device and transmits a dynamic temporary credential to the portable communication device from the centralized computer. The system further scores the risk in authorizing a transaction associated with an electronic control point using the dynamic temporary credential it issued. The system may prevent the transmission of the dynamic temporary credential until the end user has been authenticated, which may include verifying one or more of a manually input passcode, the unique digital signature of the portable communication device, and know your customer queries. The system may further include a validation mapping gateway operably connected to one or more issuers that substitutes legacy payment data for the dynamic temporary credential in a payment transaction before sending the payment transaction along with the risk score to the issuer associated with the legacy payment data.

KEY REFRESHMENT WITH SESSION COUNT FOR WIRELESS MANAGEMENT OF MODULAR SUBSYSTEMS

A wireless interface includes: network formation circuitry configured to establish a wireless network between a primary node and a secondary node; data exchange circuitry configured to perform data exchanges between the primary node and the secondary node using secure sessions; and key refreshment circuitry configured to derive a new network key for the network based on a pre-shared key and a current network key concatenated with a session count. The new key is derived during at least one of the secure sessions.

KEY REFRESHMENT WITH SESSION COUNT FOR WIRELESS MANAGEMENT OF MODULAR SUBSYSTEMS

A wireless interface includes: network formation circuitry configured to establish a wireless network between a primary node and a secondary node; data exchange circuitry configured to perform data exchanges between the primary node and the secondary node using secure sessions; and key refreshment circuitry configured to derive a new network key for the network based on a pre-shared key and a current network key concatenated with a session count. The new key is derived during at least one of the secure sessions.

Enclave Interactions

Aspects of the disclosure provide various methods relating to enclaves. For instance, a method of authentication for an enclave entity with a second entity may include receiving, by one or more processors of a host computing device of the enclave entity, a request and an assertion of identity for the second entity, the assertion including identity information for the second identity; using an assertion verifier of the enclave entity to determine whether the assertion is valid; when the assertion is valid, extracting the identity information; authenticating the second entity using an access control list for the enclave entity to determine whether the identity information meets expectations of the access control list; when the identity information meets the expectations of the access control list, completing the request.

Facilitation of authentication management for autonomous vehicles
11496895 · 2022-11-08 · ·

Secure communication for autonomous vehicles can be increased by performing authentication steps before the nodes (e.g., vehicles, roadside equipment (RSE), base stations, etc.) are within communications range. For example, a digital certificate management system for mobile nodes, specifically for moving vehicles, can facilitate ultra fast communications between vehicles and other nodes. In some embodiments, the RSE can propagate vehicle node data (e.g., direction, speed, estimated time of arrival, etc.) to other vehicles and/or other RSEs. Consequently, this propagation of data prior to the communication between nodes can facilitate a for efficient authentication system.

Secure accelerator device pairing for trusted accelerator-to-accelerator communication

Technologies for secure device configuration and management include a computing device having an I/O device. A trusted agent of the computing device is trusted by a virtual machine monitor of the computing device. The trusted agent executes an attestation algorithm to generate a first secure attestation for the first I/O device and a second secure attestation for the second I/O device, obtains a peer-to-peer communication key, and forwards the peer-to-peer communication key to the first I/O device and a second I/O device to enable secure peer-to-peer communication between the first I/O device and the second I/O device over a communication link secured by the peer-to-peer communication key. Other embodiments are described and claimed.

DIRECTIONAL SECURE COMMUNICATIONS

Methods, apparatuses, and computer-readable medium for directional security are provided. An example method may include receiving, from a wireless device, a configuration for a set of shared keys. The example method may further include receiving, from a second UE, at least one message or signal including a location of the second UE, the received at least one message or signal being associated with an angle of arrival. The example method may further include configuring a key from the set of shared keys based on at least one of the received configuration, the location of the second UE, the AoA of the received at least one message or signal, or a location of the first UE. The example method may further include generating one or more ranging signals based on the configured key, the one or more ranging signals being directionally secure based on the location of the second UE.

DIRECTIONAL SECURE COMMUNICATIONS

Methods, apparatuses, and computer-readable medium for directional security are provided. An example method may include receiving, from a wireless device, a configuration for a set of shared keys. The example method may further include receiving, from a second UE, at least one message or signal including a location of the second UE, the received at least one message or signal being associated with an angle of arrival. The example method may further include configuring a key from the set of shared keys based on at least one of the received configuration, the location of the second UE, the AoA of the received at least one message or signal, or a location of the first UE. The example method may further include generating one or more ranging signals based on the configured key, the one or more ranging signals being directionally secure based on the location of the second UE.