H04L9/083

Terminal device, key distribution management device, server-client system, communication method, and programs

To provide a terminal device that can share a session key for use in encryption communication with multiple terminal devices at a certain timing without relying on an existing server device. The terminal device includes: a list/request sending unit that, when the terminal device operates as an owner device, generates a key distribution request, signs the key distribution request, and transmits the key distribution request to a key distribution management device; a participation request sending unit that, when the terminal device operates as a general device, generates a participation request, signs the participation request, and transmits the participation request to the key distribution management device; a session key generating unit that executes an authentication-based multipoint key distribution algorithm of server-client type in cooperation with another terminal device participating in the session and with the key distribution management device to generate a session key; and a post-confirmation unit that, when the session key has been normally generated, transmits a success notice to the key distribution management device and receives a collective notice from the key distribution management device.

Localized traffic data collection

A system and method for collecting, processing, storing, or transmitting traffic data. A localized data collection module may retrieve, receive, or intercept traffic data through or from hardware installed in a traffic control cabinet adjacent an intersection or other roadway feature of interest. Data which may have previously been confined to a closed loop traffic control system may be remotely accessible for traffic operations control or monitoring via a network connected server and/or cloud architecture.

Secure digital communications

Disclosed in some examples are methods, systems, and machine readable mediums for secure end-to-end digital communications involving mobile wallets. The result is direct, secure, in-band messaging using mobile wallets that may be used to send messages such as payments, requests for money, financial information, or messages to authorize a debit or credit.

Efficient and secure distributed signing protocol for mobile devices in wireless networks

The techniques described herein may provide an efficient and secure two-party distributed signing protocol for the identity-based signature scheme described in the IEEE P1363 standard. For example, in an embodiment, a method may comprise generating a distributed cryptographic key at a key generation center and a first other device and a second other device and generating a distributed cryptographic signature at the first other device using the second other device.

Localized blockchain utilizing mesh networks for localized events

Techniques for providing a localized blockchain that uses a mesh network to facilitate transactions for a localized event are provided. An electronic device can receive data from a localized mesh network to establish the device as a node on the localized mesh network. The established node can generate a cryptocurrency wallet that can be loaded with an initial amount of localized cryptocurrency tokens from a total amount of localized cryptocurrency tokens. The total amount of localized cryptocurrency tokens can be previously mined by a central authority of the localized mesh network. The established node can conduct transactions within the localized mesh network utilizing the localized cryptocurrency tokens. The established node can receive a portion of a cryptocurrency token for transmitting transactional data to a next nearest node on the localized mesh network to help facilitate a transaction involving other nodes on the network.

SECURING CONFIDENTIAL CONTENT IN A VIRTUAL MEETING
20220377056 · 2022-11-24 ·

Systems and methods are described for securing confidential content in a virtual meeting. In an example, a host can create a meeting agenda that identifies attendees and access restrictions for the meeting. A server can generate encryption keys corresponding to different confidentiality levels of content identified in the agenda. The encryption keys can be provided to user devices of the attendees based on the access permissions of the attendees. As the virtual meeting takes place, the server can encrypt confidential portions of the content stream for the meeting using the encryption keys. In an example, the server can also apply a machine learning algorithm to identify any confidential content in the content stream not previously identified. The server can encrypt additional confidential content where appropriate using encryption keys corresponding to the confidentiality level of the content.

Detection and Remediation of Unauthorized Relocation of Storage Media

An apparatus includes a cryptographic key for encrypting content to be written to a storage media. The apparatus includes a control circuit configured to determine that the storage media has been physically moved, and, based on the determination that the storage media has been physically moved, erase the storage media by deleting the cryptographic key.

PRIVATE ANTI-THEFT PROTECTION IN A TRACKING DEVICE ENVIRONMENT
20220377562 · 2022-11-24 ·

A tracking device stores identification values unique to the tracking device for use in authenticating the tracking device. When activated, the tracking device provides a first identification value to a first owner and a different identification value to a tracking system. The identification of the tracking device can only be authenticated by combining the identification values given to the owner and tracking system. If a second owner resets the tracking device, the tracking device stores a second version the identification values for use in authenticating the tracking device. In the case that the second owner is illegitimate, (for instance, the tracking device is stolen by the second owner) the first owner can report the tracking device stolen. Upon being reported stolen, the identification value provided to the first owner is transmitted to the tracking system for use with the tracking system identification value to authenticate the first owner, enabling the first owner to locate and recover their stolen device.

Secure digital fingerprint key object database

A data store to store and access digital records is provided, and a key object record is initialized in the data store to store data associated with a physical key object. A digital fingerprint of the physical key object is stored in the key object record. Another digital record is created in the data store that is not the key object record. The digital record is linked to the digital fingerprint of the physical key object. The linking is arranged to provide secure control access to the linked digital record. A tendered access key is received via a programmatic interface or user interface, and the data store is queried based on the tendered access key to identify a matching digital fingerprint of a key object. In a case that the querying identifies the matching digital fingerprint of the key object within a prescribed level of confidence, access to the linked digital record secured by the key object is granted.

Quantum key distribution method and device, and storage medium

This application provide quantum key distribution methods, devices, and storage media. In an implementation, a method comprises: determining, based on a first mapping, a first quantum key of N first quantum keys corresponding to an i.sup.th node on a target routing path; determining, based on a second mapping, a second quantum key of N second quantum keys corresponding to the i.sup.th node; and generating, by the i.sup.th node based on the first quantum key corresponding to the i.sup.th node and the second quantum key corresponding to the i.sup.th node, a third quantum key corresponding to the i.sup.th node on the target routing path.