摘要:
Approaches for implementing quantum secure direct communication (QSDC) with mutual authentication are described. In an example, an encoded sequence of single-qubit states corresponding to bits within a bit string message may be prepared. The sequence of the single-qubit states in turn are prepared based on a randomly selected arbitrary basis. The encoded sequence once prepared may be transmitted to a receiving system over a quantum communication channel.
摘要:
An execution environment has a deployed virtual machine image. The virtual machine image provides a service that is identified by a role. The execution environment generates a measurement of the virtual machine image and provides it to a key service to request role keys that enable operation of the virtual machine image in the execution environment. The key service determines whether the virtual machine image is mapped to the role and, if so, returns the role keys to the requesting execution environment.
摘要:
Embodiments of a method and apparatus for securing and accessing files are generally described herein. In some embodiments, the method includes adding a communication portion to the file. The communication portion may communicate with an authentication agent on the first computing device. The method may include encrypting data of the file using a first key received through the communication portion from the authentication agent. The first key may be generated based on identification information of a second computing device in a trusted network of computing devices with the first computing device. The method may include saving the file to a remote file storage location.
摘要:
An apparatus, system, and method are disclosed for secure data transmissions. A method includes receiving a request for data that is encrypted according to a first encryption scheme, and determining a first public IP address associated with the request. The first public IP address identifies a remote client that created the request and is located in a field of a data packet that includes the request. The method includes determining a second public IP address associated with the request that identifies a sender of the request and is determined dynamically when the request is received. The method includes verifying an authenticity of the request in response to the first public IP address of the remote client matching the second public IP address of the sender. The method includes encrypting the requested data according to a second encryption scheme, and transferring the data to the remote client.
摘要:
This is a peer-to-peer system for controlling and restricting access (reading, writing, creating, deleting, manipulating, and control) to data and data representations of processing engines through the use of secure containers, an access processing engine, and cryptographic keys.
摘要:
Techniques are disclosed for provisioning Internet of Things (IoT) devices in accordance with a state machine model. More particularly, collections of IoT devices may be organized into enclaves, groups or “shoals” that operate as autonomous or semi-autonomous groups of devices functioning as a collective having a common objective or mission. IoT devices participating in a shoal may be provisioned with shoal-specific context information as part of their device-specific provisioning activity. By way of example, a shoal context object can include a current state variable and a target next state variable. The shoal's target next state variable establishes a goal (e.g., for provisioning activity) without dictating how the individual shoal members (IoT device) are to achieve that goal. This mechanism may be used to drive a shoal's separate devices through their individual provisioning state machines until the shoal itself is made operational.
摘要:
An asset bundle package is created with asset bundle package records for at least two user types and from one or more mobile phone service operators. The asset bundle package and asset bundle record selection criteria are installed on a mobile computing device. A boot routine uses the asset bundle record selection criteria to select asset bundle records required to configure the mobile computing device for at least one of the two user types.
摘要:
Exemplary embodiments of the present invention disclose a method for securing a message published to a topic by a publisher in a publish-subscriber messaging system with a topic policy for the topic. In a step, an exemplary embodiment establishes a topic policy for a topic. In another step, an exemplary embodiment associates a message published to the topic with a topic policy. In another step, an exemplary embodiment signs a message published to the topic by a publisher with a private key of the publisher if the topic policy directs. In another step, an exemplary embodiment provides a public key of a subscriber if the topic policy directs that the subscriber receive a message in encrypted form. In another step, an exemplary embodiment encrypts a message for a subscriber specified in a topic policy to receive the message encrypted with a public key of the subscriber.
摘要:
Electronic electricity meter with integrated digital-certification mechanism for secure communication, comprising current sensors 1(a), voltage sensors (b), electronic circuit (c) for conditioning the current signals and voltage signals in the electrical levels required by the processing unit (d), processing unit (d) able to continuously sample the current signals and voltage signals provided by the circuit (c) and that reflect, using a known ratio, the real value of the current and voltage delivered to the meter connection terminals, the processing unit (d) calculates the active and passive through energy and determines the energy values to be counted, and a communication unit (e), linked to the processing unit (d), which uses a digital data protocol and a physical interface to communicate with the world outside the meter, and a processing unit with digital certification functions (f) located between the processing unit (d) and the communication unit , in which the processing unit with digital verification functions (UPFCD) is intended to encrypt and sign all of the data made available, using the data protocol of the communication unit , to the outside world, such that the electronic relationship with the meter in terms of data communication is governed by the use of the digital certification technique natively and non-separable.
摘要:
A method for generating an identifier of a key includes that: when a user equipment (UE) transfers from an evolved UMTS terrestrial radio access network (EUTRAN) to a universal terrestrial radio access network (UTRAN) or a global system for mobile communications (GSM), or an enhanced data rate for GSM evolved radio access network (GERAN), an identifier of a system key after transfer is generated by mapping an identifier KSIASME for an access security management entity, and a mobile management entity generates an identifier of a ciphering key (CK) and an integrity key (IK) by mapping the KSIASME, and then sends the generated identifier to a serving GPRS support node (SGSN), when the UE transfers from the EUTRAN to the UTRAN, the SGSN stores the ciphering key, the integrity key and the identifier thereof, and when the UE transfers from the EUTRAN to the GERAN, the SGSN assigns the value of the identifier of the ciphering key and the integrity key to an identifier of a ciphering key of the GERAN.
摘要翻译:一种用于产生密钥标识符的方法包括:当用户设备(UE)从演进的UMTS陆地无线电接入网络(EUTRAN)转移到通用地面无线电接入网络(UTRAN)或全球移动通信系统(GSM )或用于GSM演进无线电接入网络(GERAN)的增强数据速率,通过映射用于接入安全管理实体的标识符KSIASME生成传输后的系统密钥的标识符,并且移动管理实体生成加密的标识符 (CK)和完整性密钥(IK)的映射,然后,当UE从EUTRAN转移到UTRAN时,将生成的标识符发送到服务GPRS支持节点(SGSN),SGSN存储加密密钥, 完整性密钥及其标识符,当UE从EUTRAN转移到GERAN时,SGSN将加密密钥的标识符和完整性密钥的值分配给th的加密密钥的标识符 e GERAN。