NETWORK SECURITY SYSTEMS AND METHODS
    2.
    发明公开
    NETWORK SECURITY SYSTEMS AND METHODS 审中-公开
    NETZWERKSICHERHEITSSYSTEME在全球范围内

    公开(公告)号:EP3105888A4

    公开(公告)日:2017-02-22

    申请号:EP15749529

    申请日:2015-02-17

    摘要: This disclosure relates to systems and methods for managing connected devices and associated network connections. In certain embodiments, trust, privacy, safety, and/or security of information communicated between connected devices may be established in part through use of security associations and/or shared group tokens. In some embodiments, these security associations may be used to form an explicit private network associated with the user. A user may add and/or manage devices included in the explicit private network through management of various security associations associated with the network's constituent devices.

    摘要翻译: 本公开涉及用于管理连接的设备和相关联的网络连接的系统和方法。 在某些实施例中,可以部分地通过使用安全关联和/或共享组令牌来建立在连接的设备之间传送的信息的信任,隐私,安全性和/或安全性。 在一些实施例中,这些安全关联可以用于形成与用户相关联的显式专用网络。 用户可以通过管理与网络的组成设备相关联的各种安全关联来添加和/或管理包括在显式专用网络中的设备。

    SECURE TRANSACTION SYSTEMS AND METHODS
    3.
    发明公开
    SECURE TRANSACTION SYSTEMS AND METHODS 审中-公开
    SICHERE TRANSAKTIONSSYSTEME UNDERVERHREN

    公开(公告)号:EP2973285A4

    公开(公告)日:2016-03-30

    申请号:EP14779911

    申请日:2014-03-12

    IPC分类号: H04L29/06 H04L9/32

    摘要: Systems and methods are described that use tag authentication and presence verification techniques in connection with a variety of transactions. In certain embodiments, an authentication device may verify the authenticity of a secure tag by determining whether the secure tag stores secret information provisioned by a trusted authority. In some embodiments, such an authentication process may be performed without exposing the secret information to the authentication device, thereby maintaining integrity of the secure tag. In other embodiments, insecure tags and/or tags that do not include secret information are used.

    摘要翻译: 描述了使用与各种事务有关的标签认证和存在验证技术的系统和方法。 在某些实施例中,认证设备可以通过确定安全标签是否存储由可信管理机构提供的秘密信息来验证安全标签的真实性。 在一些实施例中,可以执行这种认证过程,而不将秘密信息暴露给认证设备,从而保持安全标签的完整性。 在其他实施例中,使用不包括秘密信息的不安全标签和/或标签。