Abstract:
According to a first aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: encrypting, by a source node in the network, a cryptographic key using a device key as an encryption key, wherein said device key is based on a device identifier that identifies a destination node in the network; transmitting, by said source node, the encrypted cryptographic key to the destination node. According to a second aspect of the present disclosure, a corresponding non-transitory, tangible computer program product is provided. According to a third aspect of the present disclosure, a corresponding system for facilitating secure communication in a network is provided.
Abstract:
An example network communication device include a communication circuit and a processing circuit. The communication circuit securely communicates over a network using a rotating code and the processing circuit enter a sleep mode at which time values of the rotating code are unknown by the network communication device. The processing circuit enters the sleep mode by requesting another network communication device of the network to authorize entering the sleep mode, and entering the sleep mode responsive to an indication verifying that the network communication device and the other network communication device agree on a set of secure parameters that is created pseudo-randomly, wherein the processing circuit enters the sleep mode with the set of secure parameters as stored for awakening but without storage of the values of the rotating key.
Abstract:
According to a first aspect of the present disclosure, a relay device for use in near field communication (NFC) transactions is provided, said relay device comprising a communication unit, wherein said communication unit comprises an NFC controller and a wireless communication controller which are operatively connected to each other through a physical interface, said NFC controller being arranged to establish communication with an NFC-enabled device that is external to the relay device, and said wireless communication controller being arranged to establish communication with a wireless device that is external to the relay device, wherein the communication unit is arranged to relay transaction data between the NFC-enabled device and the wireless device. According to a second aspect of the present disclosure, a corresponding method for facilitating near field communication (NFC) transactions is conceived. According to a third aspect of the present disclosure, a corresponding non-transitory, tangible computer program product is provided.
Abstract:
There is disclosed a security token for use in a transaction execution system, the security token being connectable to a user interface device and to a host device, the security token being arranged to: receive a transaction verification input from the user interface device; process the transaction verification input and generate a corresponding transaction verification result; transmit the transaction verification result to the host device, and the security token comprising a secure element which is arranged to facilitate processing of the transaction verification input. Furthermore, a method for executing a transaction using a security token is disclosed, as well as a corresponding computer program product.
Abstract:
According to an aspect of the invention, an electronic lock is conceived, being adapted to harvest energy from a radio frequency (RF) connection established between a mobile device and said electronic lock, further being adapted to use the harvested energy for processing an authorization token received via said RF connection from the mobile device, and further being adapted to use the harvested energy for controlling an unlocking switch in dependence on a result of said processing.
Abstract:
There is disclosed a method for facilitating transactions carried out by a mobile device, wherein: the mobile device executes a smart card application; the smart card application receives a cryptographic algorithm from a transaction server external to the mobile device; the smart card application further receives transaction data from said transaction server; the cryptographic algorithm encrypts said transaction data and stores the encrypted transaction data in a storage unit of the mobile device. Furthermore, a corresponding computer program product and a corresponding mobile device for carrying out transactions are disclosed.
Abstract:
A method and apparatus for updating an encryption key for performing encrypted communication over a communications network. The method comprises, within a timestamp distribution node, transmitting a message to at least one timestamp reception node of the communications network containing a timestamp value. The method further comprises, within the at least one timestamp reception node, receiving the message from the timestamp distribution node and extracting the timestamp value. Wherein, within each of the timestamp distribution node and the at least one timestamp reception node, the method comprises generating at least one updated encryption key for performing encrypted communication based at least partly on the extracted timestamp value.
Abstract:
An apparatus comprising an authentication processor configured to, based on received firmware and predetermined cryptographic authentication information, provide for cryptographic based authentication of the received firmware to control execution of the received firmware by any one of a plurality of processors. Each processor of the plurality of processors is uniquely addressable by a boot sequencer.
Abstract:
According to an aspect of the invention, an electronic lock is conceived, being adapted to harvest energy from a radio frequency (RF) connection established between a mobile device and said electronic lock, further being adapted to use the harvested energy for processing an authorization token received via said RF connection from the mobile device, and further being adapted to use the harvested energy for controlling an unlocking switch in dependence on a result of said processing.
Abstract:
According to a first aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: encrypting, by a source node in the network, a new cryptographic key using a current cryptographic key as an encryption key; transmitting, by said source node, the encrypted new cryptographic key to a destination node in the network. According to a second aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: receiving, by a destination node in the network, an encrypted new cryptographic key from a source node in the network; decrypting, by said destination node, the encrypted new cryptographic key using a current cryptographic key as a decryption key. According to a third aspect of the present disclosure, corresponding computer program products are provided. According to a fourth aspect of the present disclosure, a corresponding source node is provided. According to a fifth aspect of the present disclosure, a corresponding destination node is provided.