Patent classifications
H04L63/0823
Method of enabling a secure communication to a target device over a network
A method for enabling a secure communication with a target device over a network includes: opening an unsecured OPC UA Endpoint by an OPC UA Server that runs on the target device; connecting to the OPC UA Server over the network by an OPC UA Client running on a first device, and requesting the initial device certificate; receiving the initial device certificate by unsecured communication over the network; validating, by the first device, the initial device certificate; establishing, by the first device, a device certificate; encrypting, by the first device, at least the device certificate; sending the encrypted data over the network; decrypting, by the target device, the encrypted data using an initial device private key associated with the initial device certificate to obtain at least the device certificate; storing the device certificate on the target device; and opening a secured OPC UA Endpoint by the OPC UA Server.
Browser extension for validating communications
A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are intercepting web browser communications. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTPS request to a known service via the web browser. The secure browser extension receives an HTTPS response to the HTTPS request via the web browser. The secure browser extension determines whether the certificate included in the HTTPS response is trusted by the secure browser extension. Based on determining the certificate is not trusted, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised.
Resource determination based on resource definition data
In one example, a computer implemented method may include retrieving resource definition data corresponding to an endpoint. The resource definition data includes adapter information and resource type information. Further, an adapter instance may be generated using the adapter information to establish communication with the endpoint. Furthermore, an API response may be obtained, via the adapter instance, from the endpoint by querying the endpoint using an API call. Further, the API response may be parsed. Further, a resource model corresponding to the resource definition data may be populated using the parsed API response. The resource model may include resource information and associated metric information corresponding to a resource type in the resource type information. Furthermore, a resource and/or metric data associated with the resource may be determined using the populated resource model. The resource may be associated with an application being executed in the endpoint.
Information search method, terminal, network device, and system
In an example information search method, if a first terminal performs a first search based on a first keyword, and does not obtain a result, the first terminal generates a request for performing a second search, and sends, to a network device, the request for performing the second search. The network device sends a second request to a second terminal. The second terminal performs the second search based on the first keyword, obtains a second search result, and sends the second search result to the first terminal. Through this technique, it can be effectively ensured that a user finds a search result corresponding to the first keyword, and that user privacy is also ensured.
Distributed database stored at an edge application
Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.
Securing network access at edge sites using trusted network devices
Techniques are described for securely managing computing resources in a computing environment comprising a computing service provider and a remote computing network. The remote computing network includes computing and network devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The network devices include a trusted network device that includes a root of trust. The trusted network device detects that a new device is communicatively coupled to a port on the trusted network device. The trusted network device determines that the new device is not authorized to access computing resources at the remote computing network. The port is isolated at the trusted network device.
Secure authentication of devices for Internet of Things
A computer-implemented system and method for secure authentication of IoT devices are disclosed. The method for secure authentication of IoT devices comprises establishing a network connection with a network operator server via a control channel, establishing identity of the network operator server using a pre-shared server key from one or more of pre-shared server keys, establishing identity of the IoT device using a pre-shared client key from one or more of pre-shared client keys and cryptographically generating a session key for a network session to allow secure data exchange between the network operator server and the IoT device. The cryptographically generated session key is used for securely authenticating application running on the authenticated IoT device.
Homomorphic encryption offload for lightweight devices
Disclosed are systems, methods, devices, and computer-readable media for offloading lattice-based cryptographic operations to hybrid cloud computing system. In one embodiment, a method is disclosed comprising receiving a first network request from a client device via a secure application programming interface (API), the request including unencrypted data; encrypting the unencrypted data using an algorithm that generates homomorphically encrypted data; issuing a second network request to a second API of a cloud platform, the second network request including the encrypted data; receiving a response from the cloud platform in response to the second network request; and transmitting, in response to the first network request, a result to the client device based on the response, the result obtained by decrypting an encrypted output returned by the cloud platform.
Zero-touch deployment (ZTD) of cellular IoT devices and associated trust model
In one embodiment, a service receives a device registration request sent by an endpoint device, wherein the endpoint device executes an onboarding agent that causes the endpoint device to send the device registration request via a cellular connection to a private access point name (APN) associated with the service. The service verifies that a network address of the endpoint device from which the device registration request was sent is associated with an integrated circuit card identifier (ICCID) or international mobile equipment identity (IMEI) indicated by the device registration request. The service identifies a tenant identifier associated with the ICCID or IMEI. The service sends, based on the tenant identifier, a device registration response to the endpoint device via the private APN.
TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS
A terminal device verification method and an apparatus are provided. The method includes: A first network device receives a first message from a first terminal device. Then, the first network device verifies a pairing relationship between the first terminal device and a second terminal device. After the verification on the pairing relationship between the first terminal device and the second terminal device succeeds, the first network device sends a second message to the first terminal device, where the second message include first indication information, and the first indication information is used to indicate a pairing result of the first terminal device and the second terminal device. The pairing relationship between the first terminal device and the second terminal device is verified, so that the first terminal device and the second terminal device can be securely paired, to improve use security of the first terminal device and the second terminal device.