H04L9/0833

COMMUNICATION APPARATUS AND METHOD FOR SECURE LOW POWER TRANSMISSION
20230148178 · 2023-05-11 ·

The present disclosure provides a communication apparatus comprising a cryptographic circuitry which, in operation, uses a shared cryptographic secret Key and a cryptographic salt to generate a cryptographically encoded Message Integrity Code (MIC) that is computed over the 0address field of a Wake Up Radio (WUR) frame; and a transmission signal generator which, in operation, generates a secure WUR signal by replacing the address field of the WUR frame with the MIC; and a transmitter which, in operation, transmits the secure WUR signal.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM

[Object] To provide an information processing apparatus, an information processing method, a program, and an information processing system, which are capable of enhancing safety of authentication when unlocking.

[Solution] Provided is an information processing apparatus including: a communication unit configured to receive an unlocking request and first information generated on the basis of a first secret key, from a first communication terminal; and a determination unit configured to determine whether or not to cause a locking unit to unlock, on the basis of a first public key corresponding to the first secret key and the generated first information.

PRIVACY PRESERVING MACHINE LEARNING FOR CONTENT DISTRIBUTION AND ANALYSIS
20230205915 · 2023-06-29 ·

This disclosure relates to systems and techniques that can be implemented by content platforms to optimize (a) demographic-based digital component distribution used to categorize each user into a particular demographic so as to appropriately target that user for purposes of maximizing the efficacy of digital components shown to that user, and (b) demographic reporting used to report to digital component providers the effectiveness of the digital component.

COMMUNICATION METHOD AND RELATED APPARATUS
20230208625 · 2023-06-29 ·

Embodiments of the present disclosure provide a communication method and apparatus, applied to nodes supporting short-range communication, for example, Bluetooth nodes or nodes in an in-vehicle short-range communication system. The method includes receiving an association request message from a second node and determining a group key of a first communication group. The first communication group is a communication group to which the second node belongs. The method further includes encrypting the group key of the first communication group, based on a shared key between a first node and the second node, to obtain a first protection key and sending a first association establishment message to the second node. The first association establishment message includes a first protection key.

NETWORK DEVICE SELECTIVE SYNCHRONIZATION

Techniques for selectively synchronizing network devices to authenticate wireless device to access a network using a key. A system utilizing such techniques can include a unique pre-shared key assignment system and a network device selective synchronization system. A method utilizing such techniques can include unique pre-shared key assignment and selective synchronization management.

PAYLOAD AUTHENTICATION PRIOR TO COMPLETION OF PAYLOAD FULFILLMENT

An authentication device receives a unique fulfillment identifier from a client device prior to payload fulfillment. The unique fulfillment identifier corresponds to a unique payload identifier of a specific payload and a unique group identifier of a group of payloads including the specific payload. The authentication device authenticates the unique payload identifier based on the unique group identifier. In response to successfully authenticating the unique payload identifier based on the unique group identifier, the authentication device transmits an indication of successful authentication of the payload to the client device.

SECURE WIRELESS COOPERATIVE BROADCAST NETWORKS
20230198970 · 2023-06-22 · ·

Cryptographically secure data communications between layered groups of devices in a wireless cooperative broadcast network encrypts datagrams twice prior to transmission by a source device, first using an inner layer key that is shared by a first group of devices, and second using an outer layer key that is shared by a second group of devices; the devices of the first group being members of the second group. Received datagrams are recovered by first decrypting with the outer layer key and second decrypting with the inner layer key.

SECURITY FOR PROSE GROUP COMMUNICATION
20170359322 · 2017-12-14 · ·

A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device (31) which sends a request of a communication and a receiving device (32) which receives the request from the requesting device (31) and (32), the method including deriving session keys Kpc and Kpi from an unique key Kp at the requesting and receiving devices (31) and (32), using the session keys Kpc and Kpi for ProSe communication setup and direct communication between the requesting and receiving devices (31) and (32), starting the direct communication with the requesting and receiving devices (31) and (32). The key Kpc is confidentiality key and the key Kpi is integrity protection key.

METHODS, SYSTEMS, AND COMPUTER-READABLE STORAGE MEDIA FOR ORGANIZING AN ONLINE MEETING
20230198749 · 2023-06-22 ·

A method of organizing an end-to-end encrypted online meeting for a group of members including a creator. The method includes: maintaining, by each member in the online meeting including the creator, a group tree from which is derivable a group key required for communication between members in the online meeting; accessing, by the creator, a key package associated with a member of the group; adding to the online meeting, by the creator and based on the key package, the member associated with the key package; updating, by the creator, the group tree maintained by the creator; generating, by the creator and based on the updated group tree, one or more encrypted secret keys required for deriving the group key; and transmitting, by the creator and via a server, the updated group tree and the one or more encrypted secret keys to each other member in the online meeting.

Encrypted group communications

Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a request for secure communications with a second node to the remote management system using a control channel. The remote management system generates and encrypts a group encryption key usable by the first and second nodes and forwards the encrypted group encryption key to the first and second nodes using one or more control channels. The first and second communication nodes decrypt the group encryption key and use it to encrypt data transmitted between the nodes using a data transport network. In some implementations the securely communicating nodes may use encryption keys and/or techniques that prevent the remote management system from eavesdropping on the nodes' communications.