Secure host communications
    71.
    发明授权
    Secure host communications 有权
    安全主机通信

    公开(公告)号:US09537833B2

    公开(公告)日:2017-01-03

    申请号:US14587669

    申请日:2014-12-31

    Applicant: GOOGLE INC.

    Abstract: A trusted device includes a secure interface and a host interface, the secure interface being isolated from the host interface by an isolated environment. A user provides a communication to the trusted device via the secure interface. A processor of the isolated environment encrypts the communication and transmits the encrypted communication to a read file of the host interface. A host device connected to the trusted device via the host interface receives the encrypted communication. The host device transmits the encrypted communication to a second host device that is connected to a second trusted device via a second host interface. The second host device transmits the encrypted communication to a write file of the second host interface. A processor in an isolated environment of the second trusted device decrypts the communication and provides the decrypted communication to a second user via a secure interface of the second trusted device.

    Abstract translation: 受信任的设备包括安全接口和主机接口,安全接口通过隔离环境与主机接口隔离。 用户通过安全接口向可信设备提供通信。 隔离环境的处理器加密通信,并将加密的通信传送到主机接口的读取文件。 通过主机接口连接到可信设备的主机设备接收加密的通信。 主机设备经由第二主机接口将经加密的通信发送到连接到第二可信设备的第二主机设备。 第二主机设备将加密的通信传送到第二主机接口的写入文件。 第二可信设备的隔离环境中的处理器解密该通信,并且经由第二可信设备的安全接口向第二用户提供经解密的通信。

    Method for the encryption of data
    72.
    发明授权
    Method for the encryption of data 有权
    数据加密方法

    公开(公告)号:US09525674B2

    公开(公告)日:2016-12-20

    申请号:US14300527

    申请日:2014-06-10

    Applicant: Appbyyou GmbH

    Abstract: To improve known encryption methods for communication in non-secured wireless networks, the invention proposes using an active key for encryption, in each instance, and sending along a new key in the messages, in each instance, which key, after it has been received completely, becomes the key used, and, once again, another new key is exchanged. This allows dynamic encryption, which allows an interception-proof connection, starting from a secure initial exchange of keys, for example.

    Abstract translation: 为了改进用于非安全无线网络中的通信的已知加密方法,本发明提出在每个实例中使用活动密钥进行加密,并且在每个实例中,在消息中沿着新密钥发送哪个密钥,在它被接收之后 完全成为使用的关键,并再次交换另一个新钥匙。 这允许动态加密,其允许例如从密钥的安全初始交换开始的拦截防御连接。

    CALL ENCRYPTION SYSTEMS AND METHODS
    74.
    发明申请
    CALL ENCRYPTION SYSTEMS AND METHODS 有权
    电话加密系统和方法

    公开(公告)号:US20160366115A1

    公开(公告)日:2016-12-15

    申请号:US14734939

    申请日:2015-06-09

    Abstract: Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between headsets worn by the user and the user devices. As information passes from the headset toward a corresponding user device, an encryption relay device may encrypt the information before the information reaches the user device so that the user device transmits encrypted call information to the other user participating in the call. When encrypted information is received, and travels from the user device to the headset, the encryption relay device may decrypt the information before it reaches the headset. Thus, the techniques described herein provide an end-to-end encryption solution to telephone calls.

    Abstract translation: 本文描述的技术可以用于加密用户之间的电话呼叫。 用户设备(例如,智能电话)可以连接到作为用户佩戴的耳机与用户设备之间的中继的加密中继设备。 当信息从耳机向相对应的用户设备传递时,加密中继设备可以在该信息到达用户设备之前对该信息进行加密,以便用户设备将加密的呼叫信息发送给参与呼叫的其他用户。 当接收到加密信息并从用户设备传送到耳机时,加密中继设备可以在该信息到达耳机之前解密该信息。 因此,本文描述的技术提供了电话呼叫的端到端加密解决方案。

    METHOD, SYSTEM, AND APPARATUS FOR SECURE WIRELESS CONNECTION GENERATION
    75.
    发明申请
    METHOD, SYSTEM, AND APPARATUS FOR SECURE WIRELESS CONNECTION GENERATION 审中-公开
    用于安全无线连接生成的方法,系统和装置

    公开(公告)号:US20160359820A1

    公开(公告)日:2016-12-08

    申请号:US15131495

    申请日:2016-04-18

    Inventor: Andrew L. Bender

    Abstract: Provided is a system and apparatus employing an extremely secure method of encrypting both wireless internet connections and wireless peripherals to a computer, cellphone, tablet, TV, stereo, or any other wireless device. The method differs from other techniques in that it generates more unique random seeds from which to generate incredibly long security keys between two or more devices. The system also acts as a filter between computers and devices so that infected devices cannot infect the host when generating keys. It uses secure data cables which generate no electromagnetic fields. It can also detect an attempt to tap into the line to snoop on the keys created. It also generates private/private security keys for wireless/internet use.

    Abstract translation: 提供了一种采用将计算机,蜂窝电话,平板电脑,电视,立体声或任何其它无线设备的无线互联网连接和无线外围设备加密的非常安全的方法的系统和装置。 该方法与其他技术不同之处在于,它生成更独特的随机种子,从而在两个或多个设备之间产生令人难以置信的长安全密钥。 系统还充当计算机和设备之间的过滤器,以便感染的设备在生成密钥时不会感染主机。 它使用不产生电磁场的安全数据电缆。 它还可以检测到尝试在创建的密钥上窥探线。 它还生成用于无线/互联网使用的私人/私人安全密钥。

    Re-programmable secure cryptographic device
    77.
    发明授权
    Re-programmable secure cryptographic device 有权
    可重新编程的安全加密设备

    公开(公告)号:US09516006B2

    公开(公告)日:2016-12-06

    申请号:US14061727

    申请日:2013-10-23

    Applicant: GOOGLE INC.

    Abstract: A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new cryptographic device or a new device function via an application on the mobile device. The central server system transmits program code and a public key used to identify the cryptographic device to the mobile device, which functions as a pass-through conduit for the information, storing it until the devices are synced. A NFC communication channel is created, and the mobile device authenticates the cryptographic device by cross-referencing the public key received from the central server system with the public key transmitted by the cryptographic device once the communication channel is established. Upon authentication, the cryptographic device is synced with the mobile device, and the mobile device passes the program code to the cryptographic device.

    Abstract translation: 可重新编程的无线加密设备可以安全地存储数据并使用近场通信(NFC)来通过移动设备从中央服务器系统交换功能数据和/或程序代码。 用户通过移动设备上的应用请求新的加密设备或新的设备功能。 中央服务器系统将用于识别加密设备的程序代码和公钥传送到移动设备,该移动设备用作信息的直通管道,存储它,直到设备被同步。 创建NFC通信信道,并且移动设备通过在建立通信信道之后,使用由密码设备发送的公开密钥从中央服务器系统接收到的公共密钥交叉参考来认证密码设备。 在认证时,加密设备与移动设备同步,并且移动设备将程序代码传递给密码设备。

    SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE
    78.
    发明申请
    SECURE PAIRING OF A PROCESSOR AND A SECURE ELEMENT OF AN ELECTRONIC DEVICE 审中-公开
    处理器的安全配对和电子设备的安全元件

    公开(公告)号:US20160344710A1

    公开(公告)日:2016-11-24

    申请号:US14475308

    申请日:2014-09-02

    Applicant: Apple Inc.

    CPC classification number: H04L63/061 H04L63/0492

    Abstract: Systems, methods, and computer-readable media for securely pairing a secure element and a processor of an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter cilia, deriving a key using a processor of the electronic device, sharing the derived key with a commercial entity subsystem, and receiving the shared key from the commercial entity subsystem at a secure element of the electronic device, where the received key may be leveraged for enabling a secure communication channel between the processor and the secure element. Additional embodiments are also provided.

    Abstract translation: 提供了用于安全地配对电子设备的安全元件和处理器的系统,方法和计算机可读介质。 在一个示例实施例中,一种在电子设备处的方法包括使用电子设备的处理器导出密钥,使用商业实体子系统共享导出的密钥,以及从商业实体子系统接收共享密钥 电子设备的安全元件,其中可以利用所接收的密钥来实现处理器和安全元件之间的安全通信信道。 还提供了另外的实施例。

    Short-range device communications for secured resource access
    80.
    发明授权
    Short-range device communications for secured resource access 有权
    用于安全资源访问的短距离设备通信

    公开(公告)号:US09489787B1

    公开(公告)日:2016-11-08

    申请号:US14592590

    申请日:2015-01-08

    Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. An image can be generated to reflect a result of the assessment, so as to enable an image analysis to be performed to decode the assessment result.

    Abstract translation: 短距离连接的通信是为了便于是否允许访问资源。 例如,当通过蓝牙低能量连接通过另一设备发现电子用户设备和电子客户端设备中的一个设备时,与用户设备或帐户相关联的访问使能代码可以被评估为有效性和适用性 涉及一个或多个特定资源规范。 可以生成图像以反映评估结果,以便执行图像分析以解码评估结果。

Patent Agency Ranking