H04L2209/805

CONTINUOUS AUTHENTICATION FOR DIGITAL SERVICES BASED ON CONTACTLESS CARD POSITIONING
20230050991 · 2023-02-16 · ·

Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.

BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
20230049341 · 2023-02-16 ·

A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.

METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
20230052597 · 2023-02-16 ·

In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.

METHOD AND DEVICE FOR AUTHENTICATING PASSIVE RFID TAG
20230051005 · 2023-02-16 ·

A method for authenticating a passive RFID tag includes acquiring a tag fingerprint of a first tag as a first tag fingerprint, the first tag being the genuine tag; acquiring a tag fingerprint of a second tag as a second tag fingerprint, the second tag being the tag to be authenticated; comparing the first tag fingerprint with the second tag fingerprint: if the first tag fingerprint is consistent with the second tag fingerprint, determining that the second tag is a genuine tag, otherwise determining the second tag is a forged tag. The tag fingerprint is the persistence time enabling the passive RFID tag to operate normally during discharge after fully charging. The beneficial effects include being high in robustness to the change of environment and high in authentication accuracy and capable of being directly deployed on an existing commercial RFID device without modifying hardware of the tag and reader.

METHOD AND SYSTEM FOR POINT OF SALE PAYMENT USING A MOBILE DEVICE

To conduct a payment transaction at a merchant's point of sale using a mobile device, the mobile device initiates an authenticated communication session with a payment agent. The payment agent is an entity responsible for facilitating a payment transaction between the merchant and purchaser via their respective financial institutions. During the authenticated communication session, response to an input indicating the user of the mobile device wishes to make a payment, the mobile device generates a unique payment key that is based on at least one unique data of the mobile device. The mobile device transmits the payment key to the payment agent, and then transfers a copy of the payment key to the point of sale system. The merchant's payment system that transmits the payment key to the payment agent in a transaction request. The payment agent then verifies that the received payment key is the same as they received from the mobile device, and that the authenticated communication session is still valid, and then approves the transaction.

Electronic device for receiving data packet in Bluetooth network environment and method thereof

An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.

Authentication apparatus, system and methods using unclonable identifiers

An integrated circuit having Radio Frequency Identification components and circuitry used for authentication is discussed. The RFID components and circuitry include two or more coils and corresponding electrical circuits that are tuned to use two or more different resonant frequencies including: a first resonant RF used for power generation and a second resonant RF used for data communication. The integrated circuit contains a unique signature that is used for the authentication with two or more aspects including i) a first aspect that is a programmed password in a memory embedded on the integrated circuit, and ii) a second aspect that is a unique, randomly generated code based upon a physical characteristic of the integrated circuit.

Wireless security protocol

This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.

Automated monitoring of proximate devices

Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.

Method and an apparatus for onboarding in an IoT network

An apparatus and method for joining an Internet of Things (IoT) network are provided, the apparatus including a communicator configured to receive, from an electronic device, an encrypted auto-onboard configuration data associated with the IoT network, a sensor configured to detect a user command, and at least one processor configured to generate a decryption key based on features extracted from the user command, decrypt the encrypted auto-onboard configuration data using the decryption key, and join the IoT network.