Patent classifications
H04L63/0869
Secure authentication of devices for Internet of Things
A computer-implemented system and method for secure authentication of IoT devices are disclosed. The method for secure authentication of IoT devices comprises establishing a network connection with a network operator server via a control channel, establishing identity of the network operator server using a pre-shared server key from one or more of pre-shared server keys, establishing identity of the IoT device using a pre-shared client key from one or more of pre-shared client keys and cryptographically generating a session key for a network session to allow secure data exchange between the network operator server and the IoT device. The cryptographically generated session key is used for securely authenticating application running on the authenticated IoT device.
Hands free interaction system and method
A method is disclosed. The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device. Then, the beacon device can initiate an interaction process with the user of the mobile communication device.
Monitoring encrypted network traffic
Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
Authentication translation
Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS
A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.
METHOD FOR SIGNING UP A USER TO A SERVICE FOR CONTROLLING AT LEAST ONE VEHICLE FUNCTIONALITY BY MEANS OF A USER TERMINAL
A method for signing up a user to a service for controlling at least one functionality in a vehicle (10) by means of a user terminal (20) comprises the following steps: —communicating a user identifier and an identifier associated with the vehicle (10) to a server (50); —having the server (50) authenticate an electronics unit (11) of the vehicle (10); —in the event of successful authentication, registering the user identifier and the identifier associated with the vehicle (10) in association with one another in the server (50).
CCTV MONITORING SYSTEM FOR REGISTERING CAMERA AND MANAGING PERMISSION AND CONTROL METHOD THEREOF
The present invention provides a CCTV monitoring system for registering a camera and managing permission, and a control method of the system. In other words, according to the present invention, a manager having an installer terminal granted with temporal authority over the camera, can install the relevant camera, check whether the camera operates, and then, entrust/set authority over the camera to a terminal of an end-user through cooperation among the installer terminal, the terminal of the end-user, and a service server. Accordingly, convenience for a user can be improved and it is possible to more efficiently manage an installed camera.
Verifying whether a device is communicating with a server
A server provides activities and/or services to a player through a device. In response to a request from the device, information known to a player is determined and sent to the device via the server. In this fashion, verification can be made that the device is communicating with the server.
Delivery method for a traveling vehicle using a drone
A delivery method for a traveling vehicle using a drone includes: transmitting, by an orderer, first information including position information of a vehicle to a server and providing, by the server, a position and an inventory of service providers, which correspond to the first information including the position information of the vehicle, to the orderer; requesting, by the server, service provision to the service provider; transmitting, by the service provider, second information including article preparation information to the server; transmitting, by the server, third information including a plurality pieces of receipt position information, which corresponds to the first information including the position information of the vehicle and the second information including the article preparation information, to the orderer; transmitting, by the orderer, a value selected by receiving the third information including the plurality pieces of receipt position information to the server; transmitting, by the server, the selected value to a selected service provider; loading, by the selected service provider, an article of the orderer on a drone and instructing the drone to move to correspond to the third information including the plurality pieces of receipt position information; and receiving, by the orderer, the ordered article.
Fast unbreakable cipher
An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.