H04L9/0822

AIR CONDITIONER CONNECTION SYSTEM
20180004920 · 2018-01-04 ·

An air conditioner connection system includes an air conditioner having a first device connected via a power line in a communication-capable manner, and a second device capable of performing radio communication with the air conditioner. The air conditioner includes an authentication process control unit that controls the first device to perform an authentication process when a starting request of the authentication process for performing power carrier communication is received from the second device, the first device includes an authentication process unit that performs the authentication process under the control of the air conditioner, and the second device includes an authentication start process unit that transmits the starting request of the authentication process to the air conditioner.

PERIMETER ENCRYPTION
20180007014 · 2018-01-04 ·

Encryption keys for an enterprise are stored at a perimeter device such as a gateway, and rules are applied at the network perimeter to control whether and how these keys are used for cryptographic processing of communications passing through the perimeter device. The encrypted status of communications, e.g. whether and how files are encrypted with the encryption keys, may also be used to assist in selecting appropriate security handling and routing of the communications.

METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING PICTURE, AND DEVICE
20180007019 · 2018-01-04 ·

The present disclosure relates to the field of computer technologies and it discloses a method for encrypting a picture performed at a sending device, the method including: obtaining, by a sending device raw data of a to-be-encrypted picture, a first key, a second key, and location information that is used for adding disturbance data to the raw data; generating the disturbance data, and adding the disturbance data to the raw data according to the location information, to obtain first data; encrypting the first data by using the first key, to obtain the second data, and encrypting the first key and the length of the disturbance data by using the second key, to obtain first encrypted data; and sending the second data, the first encrypted data, and the second key to a receiving device.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

Systems and methods for generation of secure indexes for cryptographically-secure queries

Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.

DATA TRANSMISSION METHOD AND APPARATUS

A data transmission method and apparatus are disclosed that resolves a technical problem where an existing data encryption algorithm offers poor security during transmission of data. The solution includes obtaining, by a first terminal, a data transmission request sent by a second terminal, the data transmission request at least carrying first encrypted data that is obtained by encrypting first exchange key of the second terminal by using a private key of the second terminal. The solution further includes decrypting, by the first terminal, the first encrypted data by using a public key of the second terminal to obtain the first exchange key, and obtaining a shared key of the first terminal and the second terminal according to the first exchange key. The solution further includes encrypting, by the first terminal, to-be-transmitted data by using the shared key to obtain encrypted to-be-transmitted data, and sending the encrypted to-be-transmitted data to the second terminal.

RECORDING DATA AND USING THE RECORDED DATA

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A private key corresponding to the public key is not recorded in the recording medium.

Communication apparatus, control method, and recording medium
11711610 · 2023-07-25 · ·

A communication apparatus includes a first communication unit for unencrypted communication compliant with a first standard for communication, and a second communication unit for encrypted communication compliant with a second standard for communication, In a case where connection information used for the second communication unit to perform encrypted communication with an external apparatus has been received from the external apparatus via the first communication unit, a control unit records the connection information on a recording medium. In a case where connection with the external apparatus has been established via the first communication unit, the control unit determines whether the connection information is currently recorded on the recording medium, and, in a case where it has been determined that the connection information is not currently recorded on the recording medium, the control unit causes a notification unit to issue a notification indicating that the connection information is not currently recorded.

CRYPTOGRAPHY USING RF POWER MEASUREMENT
20180013553 · 2018-01-11 · ·

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. The information may only be determined by the devices. Each device determines the information without communicating key information related to the encryption key with the other. Channel characteristic reciprocity between the devices allows creation of identical keys in each device. Each device sends a signal to the other device at the same power level based on the distance between the devices. The power level may be set to result in a target receive power level at the other device. Each device samples the received signal, generates sampling results, creates a key based on the sampling results and a threshold power level, and utilizes the key. The threshold power level may be based on the target receive power level, or a median power determined from the sampling results.

Communicating securely with devices in a distributed control system

A method comprises a server generating a server nonce and transmitting a server public key, a key signature and the server nonce to a device, the device verifying the server public key, signing the server nonce with a device private key, generating a device nonce, and transmitting the server nonce, the server nonce signature, a device public key, a device key signature, and the device nonce to the server, the server verifying the server nonce and the device public key, generating a session key, encrypting the session key with the device public key, signing the device nonce and the session key with a server private key, and transmitting the device nonce, the signed device nonce and session key, and the encrypted session key to the device, and the device verifying the device nonce, decrypting the encrypted session key with the device private key, and verifying the decrypted session key.