H04L63/126

Endpoint and protocol for trusted digital manufacturing

An endpoint for trusted fabrication, the endpoint including at least one secure controller configured for connection to a wide area network; and at least one untrusted controller configured for local communication, wherein the endpoint is configured for connection to a fabricator and further configured to receive digitally-signed data specifying at least one item for manufacture; verify the digitally-signed data; and direct the fabricator to manufacture the at least one item after verifying the digitally signed data. A method for trusted on-demand manufacturing, the method including receiving, at an endpoint connected to a fabricator, digitally signed data describing at least one item for manufacture; verifying, at the endpoint, the digitally signed data; and manufacturing the at least one item using the digitally signed data after verifying the digitally signed data, wherein the endpoint comprises at least one secure controller and at least one untrusted controller.

ISSUING VERIFIABLE PAIRWISE CLAIMS
20230050460 · 2023-02-16 ·

Generating a verifiable pairwise claim. Receiving a request for issuing a verifiable claim that is associated with a subject entity and is verifiable by one or more verifying entities. The request includes at least an encrypted portion using a particular type of encryptography. Verifying that the subject entity is associated with a subject of the verifiable claim based on decrypting the encrypted portion using the particular type of cryptography. In response to verifying that the subject entity is associated with the subject of the verifiable claim, issuing the verifiable claim that is structured to be verifiable only by the one or more verifying entities.

COMMUNICATIONS DEVICE, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AN AUTHENTICATION EVENT

A communications device for managing an authentication event is provided, which is configured to generate location data indicative of a geolocation associated with the communications device, retrieve, from a key that is obfuscated and stored in the communications device, the key, sign the location data with the retrieved key, and transmit request data to a communications server apparatus for requesting the authentication event, the request data comprising the signed location data. A method and a communications system for managing an authentication event are also provided.

Method for Authentic Data Transmission Between Control Devices of a Vehicle, Arrangement with Control Devices, Computer Program, and Vehicle

A method is disclosed for authentic data transmission between control devices of a vehicle in which messages which are sent from a first control device to a receiver control device and are provided with a first cryptographic key for authentication, and messages that are sent from a second control device to the receiver control device are provided with a second cryptographic key for authentication. First status information provided with a third cryptographic key is sent from a monitoring module of the first control device to the receiver control device and second status information provided with the second cryptographic key is sent from the second control device to the receiver control device. The first status information and second status information are received by the receiver control device. The received first and second status information is evaluated to detect a manipulation of the first control device.

SECURITY NEGOTIATIONS BETWEEN DIFFERENT VERSIONED PROTOCOL DEVICES TO ENABLE BACKWARD COMPATIBILITY
20230051133 · 2023-02-16 ·

A system and method of performing communications over a communications network that uses a communication protocol having multiple different versions, provides for backwards compatibility when devices that support a higher or more secure version of the communication protocol are added to a network having devices that only support a lower or less secure version of the communication protocol. The system and method includes a technique of negotiating and establishing security procedures to be implemented in a communication connection between two devices on the network based on initial session request messages that indicate the version of the communication protocol supported by one or both of the devices. This system and method enable higher and lower protocol version devices (i.e., devices that conform to or that use the same communication protocol but that have different versions of the protocol installed therein) to communicate with one another in the most secure manner, thereby making higher version devices added to a network backward compatible with lower version devices already within the network.

Browser extension for validating communications

A computing device comprising a secure browser extension for a web browser monitors for satisfaction of one or more operating conditions to identify whether one or more unauthorized applications are intercepting web browser communications. Based on satisfaction of at least one operating condition, the secure browser extension of the computing device sends an HTTPS request to a known service via the web browser. The secure browser extension receives an HTTPS response to the HTTPS request via the web browser. The secure browser extension determines whether the certificate included in the HTTPS response is trusted by the secure browser extension. Based on determining the certificate is not trusted, the secure browser extension terminates the web browser session and generates a notification for display at the computing device that indicates web browser communications are compromised.

Malicious website discovery using legitimate third party identifiers

An author of a malicious websites campaign (scam or phishing) likely uses a legitimate third-party service to facilitate the malicious campaign. An example includes legitimate CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) services to conceal the malicious campaign from automated security scanners. A security service/platform can employ a detection pipeline that leverages use of CAPTCHA keys across websites of a malicious websites campaign. Websites that use CAPTCHA keys found in known malicious websites can at least be identified as suspect and communicated to firewalls.

Centralized validation of email senders via EHLO name and IP address targeting
11582263 · 2023-02-14 · ·

A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information of a sender of an email. The DNS server extracts the identifying information of the email sender from the DNS query and identifies one of a plurality of delivering organizations from the information. The DNS server determines whether the identified delivering organization is authorized to deliver email on behalf of the email domain. In response to determining that the identified delivering organization is authorized to deliver email on behalf of the email domain, the DNS server generates a target validation record based on the identity of the authorized delivering organization and the email domain, the target validation record including one or more rules indicating to the receiving email system whether the delivering organization is an authorized sender of email for the email domain.

Systems and methods to timestamp and authenticate digital documents using a secure ledger
11582044 · 2023-02-14 · ·

Systems and methods to timestamp and authenticate digital documents using a secure ledger are described. Some implementations can include computer-implemented method to timestamp and authenticate electronic documents. The method can include receiving, by a timestamp and authentication server and from a user device, a unique hash value that is generated at the user device based on a source document and a device identifier of the user device, and verifying, by the timestamp and authentication server, the device identifier. The method can also include, upon verifying the device identifier, inserting, by the timestamp and authentication server, the hash value and the device identifier into a secure ledger, and upon successful insertion into the secure ledger, transmitting, from the timestamp and authentication server to the user device, a success status message including a location in the secure ledger where the hash value was inserted.

Securing network access at edge sites using trusted network devices

Techniques are described for securely managing computing resources in a computing environment comprising a computing service provider and a remote computing network. The remote computing network includes computing and network devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The network devices include a trusted network device that includes a root of trust. The trusted network device detects that a new device is communicatively coupled to a port on the trusted network device. The trusted network device determines that the new device is not authorized to access computing resources at the remote computing network. The port is isolated at the trusted network device.