Patent classifications
H04W12/77
Method and system for facilitating secure communication
According to a first aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: encrypting, by a source node in the network, a cryptographic key using a device key as an encryption key, wherein said device key is based on a device identifier that identifies a destination node in the network; transmitting, by said source node, the encrypted cryptographic key to the destination node. According to a second aspect of the present disclosure, a corresponding non-transitory, tangible computer program product is provided. According to a third aspect of the present disclosure, a corresponding system for facilitating secure communication in a network is provided.
CUSTOMER/MERCHANT INTERACTION SYSTEM FOR MERCHANT BRANDING AND PRODUCT INFORMATION
Apparatus and associated methods relate to securely transmitting, directly between two mobile devices, AES-256 encrypted file attachments which are decrypted within an application program (APP) using a decryption key that is available only to the APP. In an illustrative embodiment, the encrypted file may be attached to an e-mail. The e-mail may be transmitted directly to another mobile device via direct Wi-Fi, for example. The e-mail may be transmitted directly to another mobile device using Bluetooth, for example. In encrypted attachment may be deciphered only within the APP running on the receiving mobile device using a private key accessible to only the APP.
Communication device, method for controlling communication device, and program
A communication device determines whether an access point with which connection can be established using information for establishing connection based on a protocol different from Device Provisioning Protocol (DPP) supports the DPP. When it is determined that the access point supports the DPP, Connector for establishing connection with the access point based on the DPP is acquired.
Communication device, method for controlling communication device, and program
A communication device determines whether an access point with which connection can be established using information for establishing connection based on a protocol different from Device Provisioning Protocol (DPP) supports the DPP. When it is determined that the access point supports the DPP, Connector for establishing connection with the access point based on the DPP is acquired.
System and method for authentication across devices
An authentication approach simplifies the process of authentication across devices, while increasing security. An authentication code is supplied through non-traditional channels, such as audio and visual channels, allowing more complex codes to pass between two devices for authentication with increased security, while reducing user interaction.
Cargo monitoring
Systems, software, and methods are provided for accurate service, transaction, and cargo monitoring. An example system and/or method may include calibrating a wireless sensor, connecting a user device to a wireless sensor, obtaining initial information for a first process at least in part from the wireless sensor, obtaining subsequent information about at least the first process, and using a portion of the initial information about the first process and the subsequent information about the first process to create a dynamic report involving the first process.
Ad hoc networks and authentication services for verifying contactless deliveries
Verified deliveries are commonplace for various exchanges of goods, packages, and/or other items, but often require close proximity or contact between the exchanging parties or devices associated therewith—e.g., for digital or physical signature. To remedy this, system and methods described herein may leverage an ad hoc network established between a device of a provider and a device of a consumer for exchanging codes or tokens—that may be validated by an authentication service—to provide a verification process during an exchange between the parties. As a result, a safe distance may be maintained between the parties throughout the transaction—thereby avoiding exchange of germs while also increasing safety and security of both parties—and the verification process may be more reliable and secure.
Ad hoc networks and authentication services for verifying contactless deliveries
Verified deliveries are commonplace for various exchanges of goods, packages, and/or other items, but often require close proximity or contact between the exchanging parties or devices associated therewith—e.g., for digital or physical signature. To remedy this, system and methods described herein may leverage an ad hoc network established between a device of a provider and a device of a consumer for exchanging codes or tokens—that may be validated by an authentication service—to provide a verification process during an exchange between the parties. As a result, a safe distance may be maintained between the parties throughout the transaction—thereby avoiding exchange of germs while also increasing safety and security of both parties—and the verification process may be more reliable and secure.
METHOD, DEVICE AND SYSTEM FOR PAIRING A FIRST DEVICE WITH A SECOND DEVICE
A method for pairing a first device with a second device is disclosed. A salient idea is to generate a discriminant and visually differentiable visual representation from a unique identifier of a device, to make it available for example together with the unique identifier on a printed package of the device, and to regenerate it for display as part of the pairing process. A user checking the displayed visual representation matches the printed visual representation of the package can successfully terminate a pairing process.
COMPUTING DEVICE TO GENERATE A SECURITY INDICATOR
Aspects may relate to a computing device that comprises a processor operable in a secure mode and a memory. The processor may be configured to: obtain a first layer of graphics that includes image elements; obtain a second layer of graphics that includes image elements; randomly select an image element from the first layer of graphics; randomly select an image element from the second layer of graphics; and compose the selected image elements from the first and second layer of graphics to create a composed random image. Further, the processor may command the memory to store the composed random image.