Abstract:
L'invention concerne une technique de détermination d'une clé destinée à sécuriser une communication entre un équipement utilisateur (10) et un serveur applicatif (40). Un serveur d'authentification (20) d'un réseau de communication mobile et l'équipement utilisateur génèrent une clé maître secrète au cours d'une procédure d'authentification. L'équipement utilisateur envoie au serveur d'authentification une demande de clé pour communiquer avec le serveur applicatif et reçoit un aléa. Le serveur d'authentification et l'équipement utilisateur calculent la clé demandée au moyen d'une fonction de dérivation de clé appliquée à au moins l'aléa, un identifiant d'utilisateur et un identifiant du serveur applicatif en utilisant la clé maître.
Abstract:
The present invention relates to a method to self-personalize a machine-to-machine connected device (Di), comprising the steps of, during manufacturing process, flashing the device (Di) with a same embedded information including a secret as for a batch of other devices using a same flash image, and then, at testing phase, use said secret to generate an authentication material to be used in authentication with a dedicated server (SV) and delete said secret.
Abstract:
The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. In addition, the technology disclosed relates to monitoring and controlling enterprise information stored on a cloud computing service (CCS). It includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API.
Abstract:
Methods, apparatus, and systems for authenticating a user taking into account measurement values of characteristics of the purported environment of the user are described.
Abstract:
In one aspect, a system for managing data processes in a network of computing resources is configured to: receive, from an instructor device, a parent request for execution of at least one parent data process executable by a plurality of computing resources at least one computing resource; generate at least one child request for execution of at least one corresponding child data process for routing to at least one corresponding destination device, each of the at least one child data process for executing at least a portion of the at least one parent data process, and each of the at least one child request including a respective destination key derived from at least one instructor key; and route each of the at least one child request to the at least one corresponding destination device. The at least one child request can be obtained by a supervisor server via the routing.
Abstract:
In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
Abstract:
One Time Credentials for Secure Automated Bluetooth Pairing Various communication devices may benefit from one time credentials applied in secure automated pairing to improve the security of pairing. For example, certain unattended communication devices capable of implementing mechanisms used for Bluetooth pairing to authenticate with each other may benefit from one time credentials applied in secure automated Bluetooth pairing. A method may include initiating Bluetooth pairing from a first device to a second device. The method may also include querying the second device for a sequence value before pairing is initiated. The method may further include computing a personal identification number/passkey of the first device for the pairing with an arbitrary algorithm. The method may also include pairing, with the personal identification number/passkey, the first device with the second device. The personal identification number/passkey can be determined based on at least one arbitrary shared secret between the first device and the second device, and the sequence value.
Abstract:
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a user equipment, a new packet data convergence protocol (PDCP) entity for a service group wherein a service group is identified by a destination identifier (ID), determining if any PDCP entity of the service group exists or not, generating a new proximity service (ProSe) traffic key (PTK) from a ProSe group key (PGK) corresponding to the service group associated with the new PDCP entity, initializing a new packet counter associated with the service group to zero if the new PDCP entity is a first PDCP entity associated with the service group, generating a ProSe encryption key (PEK) from the PTK and encrypting data packets mapped to the new PDCP entity using the PEK and a packet counter associated with the service group.