Systems and methods for utilizing quantum entropy in single packet authorization for secure network connections

    公开(公告)号:US11095440B2

    公开(公告)日:2021-08-17

    申请号:US16699354

    申请日:2019-11-29

    Abstract: A device may receive, from a client device, a request with a single packet authorization (SPA) packet that includes data identifying a universal client device identifier (UID), a counter, a first one-time password generated based on a first shared key, the UID, and the counter. The device may generate a second shared key associated with the UID, and may compare the SPA packet to a comparison message authentication code (MAC) generated based on the second shared key, the UID, and the counter. The device may determine whether the SPA packet matches the comparison MAC, and may validate the client device when the SPA packet matches the comparison MAC. The device may provide a MAC associated with the SPA packet to the client device to enable the client device to validate the device for a secure communication based on establishing a pre-master key with the client device.

    Securing communication over a network using dynamically assigned proxy servers

    公开(公告)号:US10652226B2

    公开(公告)日:2020-05-12

    申请号:US15456442

    申请日:2017-03-10

    Abstract: The various embodiments described herein include methods, devices, and systems for providing secure access to network resources. In one aspect, a method is performed at a trust broker system. The method includes: (1) receiving, from a client system, a request to access network applications and resources hosted by a server system; (2) identifying a domain providing the requested network applications and resources; (3) determining whether the client system is authorized to access the domain; (4) identifying a particular server containing the domain; (5) identifying a proxy server assigned to the particular server; and (6) in accordance with a determination that the client system is authorized to access the domain: (a) transmitting an identification value for the client system to the identified proxy server; and (b) after transmitting the identification value to the identified proxy server, transmitting, to the client system, contact information for connecting to the identified proxy server.

    Systems and methods for utilizing quantum entropy for secure virtual private network connections

    公开(公告)号:US11153079B2

    公开(公告)日:2021-10-19

    申请号:US16694866

    申请日:2019-11-25

    Abstract: A device may establish a connection with a first server device based on a request to establish a peer-to-peer connection between a first client device, associated with the first server device, and a second client device associated with a second server device, and may generate a plurality of quantum random numbers based on establishing the connection with the first server device and based on the request to establish the peer-to-peer connection. The device may generate encryption keys for the first client device and the second client device based on the plurality of quantum random numbers, and may provide the encryption keys to the first client device and the second client device to cause an encrypted peer-to-peer connection to be established between the first client device and the second client device, via an interface provided between the first server device and the second server device.

    System and method for providing authenticated identity of mobile phones

    公开(公告)号:US10924928B1

    公开(公告)日:2021-02-16

    申请号:US17019559

    申请日:2020-09-14

    Abstract: Systems and methods validate that subscriber identity module (SIM) number of an end device connected to a network is the same number that was activated for that device. A network device in a network obtains a SIM number and a universal identifier (UID) for the end device during an activation procedure. The network device generates a unique SIM authentication code based on the SIM number, the UID, and a master key. The network device sends the unique SIM authentication code to the end device as part of the activation procedure. After activation, the network device receives, from the end device, an authentication message that includes a first one-time password (OTP), the UID, a time value, the SIM number, and the SIM authentication code. The network device generates a second OTP based on the UID, the time value, the SIM number, and the master key and validates a pairing of the end device and the SIM number when the two OTPs match.

Patent Agency Ranking