Abstract:
A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.
Abstract:
The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler.
Abstract:
A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate key generation data, comprising at least one data seed; distribute the at least one seed to the terminal; generate key data and meta data based on said at least one seed and a function; store an identifier for the terminal along with the key data and the meta data for the terminal, wherein the terminal is arranged to receive the at least one seed from the server; generate key data and meta data based on said at least one seed and the same function; store the key data and the meta data, wherein the key data and the meta data stored in the terminal are the same as the key data and the meta data stored in the server.
Abstract:
Systems and methods are provided for protecting identity in an authenticated data transmission. For example, a contactless transaction between a portable user device and an access device may be conducted without exposing the portable user device's public key in cleartext. In one embodiment, an access device may send an access device public key to a portable user device. The user device may return a blinded user device public key and encrypted user device data. The access device may determine a shared secret using the blinded user device public key and an access device private key. The access device may then decrypt the encrypted user device data using the shared secret.
Abstract:
If the related secure communication method is applied to the system which includes a plurality of the MTC devices, traffic in a network would increase in proportion to the number of MTC devices. A disclosed communication apparatus is connected to a network and a plurality of communication terminals, and includes: a group information sending unit for sending group information, which is received from the network; an access control unit for 1) receiving a reply from the communication terminal(s) which responded to the group information and 2) sending the reply to the network; and a temporary identifier and group key sending unit for sending a temporary identifier and a group key to the communication terminal which responded to the group information, when the communication apparatus received the temporary identifier and the group key from the network.
Abstract:
According to an arrangement, a communication apparatus (30) is connected to a bus (90) in which a second bit has higher priority than a first bit, and the communication apparatus (30) includes an acquisition unit (32), a generation unit (33), and transmission unit (34). In the communicaiton apparatus (30), the acquisition unit (32) is configured to obtain first information. The generation unit (33) is configured to generate second information in which the first information is set at a predetermined position and a predetermined bit string including the first bit is set at a position other than the predetermined position. The transmission unit (34) is configured to transmit communication data including the second information.
Abstract:
A software distribution processing device stores a common key for each ECU and a verification key for an electronic signature of software updating data, verifies an electronic signature of the updating data received from management server equipment by use of the verification key, attaches an electronic signature using the common key for each ECU to the updating data succeeded in verification of the electronic signature, and then transmits to each ECU the updating data attached with the electronic signature using the common key for each ECU.
Abstract:
The present invention relates to a system to provision flexible secure Internet of Things networks (Ni) owned by owners, said system comprising at least a device provisioning server (DPS), as many gateways (GWi) as loT networks (Ni), devices (Di) to be connected to loT network (Ni) and a configurator (CFG), said configurator (CFG) having connectivity adapted to connect to device provisioning server (DPS) using a certificate (CCFG) indicating its identity and its configuration function to get at least, for each loT network (Ni), an unique key (DK_LINK), gateway network information and identifier (GWi) and an upper level key (DK_DTLS) to be used to derive device keys (DDK_DTLS) to be sent to devices (Di) in order to enable them to communicate with the device provisioning server (DPS), said configurator (CFG) having a non-encrypted link layer enabling any device (Di) to connect to it any time to get parameters enabling them to get connectivity in a given network (Ni) of the system.
Abstract:
A technique for generating a cryptographic key (120) is provided. The technique is particularly useful for protecting the communication between two entities (202, 302; 204, 304) cooperatively running a distributed security operation. The technique comprises providing at least two parameters (106, 108), the first parameter (106) comprising or deriving from some cryptographic keys (110, 112) which have been computed by the first entity (202, 302) by running the security operation; and the second parameter (108) comprising or deriving from a token (116) having a different value each time the security (114) operation is initiated by the second entity (204, 304) for the first entity (202, 302). A key derivation function is applied to the provided parameters (106, 108) to generate the desired cryptographic key (120).
Abstract:
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.