Abstract:
A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A user provides a communication to the trusted device via the secure interface. A processor of the isolated environment encrypts the communication and transmits the encrypted communication to a read file of the host interface. A host device connected to the trusted device via the host interface receives the encrypted communication. The host device transmits the encrypted communication to a second host device that is connected to a second trusted device via a second host interface. The second host device transmits the encrypted communication to a write file of the second host interface. A processor in an isolated environment of the second trusted device decrypts the communication and provides the decrypted communication to a second user via a secure interface of the second trusted device.
Abstract:
To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example.
Abstract:
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).
Abstract:
Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between headsets worn by the user and the user devices. As information passes from the headset toward a corresponding user device, an encryption relay device may encrypt the information before the information reaches the user device so that the user device transmits encrypted call information to the other user participating in the call. When encrypted information is received, and travels from the user device to the headset, the encryption relay device may decrypt the information before it reaches the headset. Thus, the techniques described herein provide an end-to-end encryption solution to telephone calls.
Abstract:
Provided is a system and apparatus employing an extremely secure method of encrypting both wireless internet connections and wireless peripherals to a computer, cellphone, tablet, TV, stereo, or any other wireless device. The method differs from other techniques in that it generates more unique random seeds from which to generate incredibly long security keys between two or more devices. The system also acts as a filter between computers and devices so that infected devices cannot infect the host when generating keys. It uses secure data cables which generate no electromagnetic fields. It can also detect an attempt to tap into the line to snoop on the keys created. It also generates private/private security keys for wireless/internet use.
Abstract:
A method and apparatus for initializing a radio frequency identification tag are disclosed. For example, the method receives an optical signal having a unique identifier and an encryption key from a display by a radio frequency identification repeater associated with the radio frequency identification tag, wherein the radio frequency identification repeater comprises an optical reader. The method then transmits a communication comprising radio frequency identification information associated with the radio frequency identification tag and the unique identifier via the radio frequency identification repeater to a wireless access point, wherein the communication is encrypted using the encryption key.
Abstract:
A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new cryptographic device or a new device function via an application on the mobile device. The central server system transmits program code and a public key used to identify the cryptographic device to the mobile device, which functions as a pass-through conduit for the information, storing it until the devices are synced. A NFC communication channel is created, and the mobile device authenticates the cryptographic device by cross-referencing the public key received from the central server system with the public key transmitted by the cryptographic device once the communication channel is established. Upon authentication, the cryptographic device is synced with the mobile device, and the mobile device passes the program code to the cryptographic device.
Abstract:
Systems, methods, and computer-readable media for securely pairing a secure element and a processor of an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter cilia, deriving a key using a processor of the electronic device, sharing the derived key with a commercial entity subsystem, and receiving the shared key from the commercial entity subsystem at a secure element of the electronic device, where the received key may be leveraged for enabling a secure communication channel between the processor and the secure element. Additional embodiments are also provided.
Abstract:
The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes.
Abstract:
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. An image can be generated to reflect a result of the assessment, so as to enable an image analysis to be performed to decode the assessment result.