摘要:
A method of sharing secure content in a group may include receiving a one-time pad (OTP) key. The method may include encrypting content using the OTP key. The encrypting may include generating intermediate codes from the content and the OTP key. The encrypting may also include adding a first common constant to each of the intermediate codes to generate a corresponding encrypted code that includes a predetermined number of digits. The method may include sending encrypted content that includes encrypted codes corresponding to the intermediate codes.
摘要:
A method of generating a Personal Identification Number (PIN) between a first device and a second device in a network is provided. The method includes securely receiving information of input choices of the second device and random numbers assigned to the input choices at the first device. At the first device, the PIN is generated from the random numbers, and instructions are provided directing an entry of the input choices on the second device. At the second device, the input choices are entered. The second device is operable to generate the PIN from the input choices and the random numbers if the input choices are entered as instructed.
摘要:
A method and system includes the ability for individuals to set up an ad hoc digital and voice network easily and rapidly to allow users to coordinate their activities by eliminating the need for pre-entry of data into a web or identifying others by name, phone numbers or email. This method is especially useful for police, fire fighters, military, first responders or other emergency situations for coordinating different organizations at the scene of a disaster to elevate conventional communication problems either up and down the chain of command or cross communication between different emergency units. The method and system provides that the users are only required to enter a specific Server IP address and an ad hoc event name, a password and perhaps the name of the particular unit.
摘要:
Systems, methods and apparatus to join a network are disclosed. An example method includes receiving a manual user action at a zone player that is unconfigured for a first network, the action initiating automatic establishment of a connection to the first network by the zone player; transmitting, by the zone player responsive to the manual user action, a first message over a second network to be received by a device configured for the first network, wherein the first message indicating that the zone player is available to join the first network; receiving, over the second network by the zone player, a second message from the device, the second message generated responsive to receipt of the first message and including a security parameter to join the first network; and establishing a connection to the first network by the zone player using the security parameter without further input by any user via either the zone player or the device.
摘要:
Methods, devices, and systems are described to enable generating and securely distributing a common network key in a wireless network. For example, instead of each station of the wireless network generating a station-specific group network key, a particular station may generate and securely transmit a common network key to be used by multiple stations in the wireless network to decrypt group messages from multiple stations in the wireless network.
摘要:
The present invention relates to a security management method and an apparatus for group communication when a terminal interacts and communicates with a mobile communication system. The security management method for group communication performed in a server, which manages the group communication in the mobile communication system according to one embodiment of the present invention, includes the steps of: generating a session security key for session protection in the group communication, and mapping the session security key to a group identifier for identifying a specific group to which a terminal using the group communication belongs; transmitting the group identifier and the session security key to the terminal; and generating a traffic key for protecting traffic and transmitting the group identifier and the traffic key to the terminal.
摘要:
A system for executing a virtual machine instance is provided. An executing environment (11) is arranged for creating a virtual machine instance (10). The virtual machine instance (10) comprises an instance authorization unit (1) for receiving an instance authorization credential, wherein the instance authorization credential is uniquely associated with the virtual machine instance (10). A data key unit (2) is arranged for generating a request for a data key, based on the instance authorization credential associated with the virtual machine instance (10). A decryption unit (3) is arranged for decrypting a data item (7) based on the data key. A key server system (6) is arranged for issuing keys to a virtual machine instance (10). An instance authorization providing unit (22) is arranged for providing the instance authorization credential to the virtual machine instance (10).
摘要:
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.
摘要:
Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
摘要:
Aspects of the present disclosure are directed to methods and systems dynamic trust federation. In one aspect, a computer implemented method may include a security token that enables sign-on into a group applications based on applicable trust criteria. In one aspect, when a user interacts with one application in the group, the trust is elevated through the application internal authentication application program interface (API). The trust may be included in the security token to make available to other applications in the group. Applications can be in multiple groups with variable level of authentication based on location and other transactions variables.