Abstract:
A method and architecture uses a first Edge Termination Point (ETP) to receive an IP application flow, determine a requested fully qualified domain name (FQDN) associated with the IP flow, and determine whether the IP flow is a transport layer security (TLS) flow. The method and architecture further determine (406) whether the ETP has a hypertext transfer protocol (HTTPS) certificate corresponding to the FQDN. In response to a determination that the ETP has an HTTPS certificate, the ETP terminates the TLS session, extracting an HTTP stream using decryption, and forwarding the HTTP stream to a second ETP to establish a new TLS session with a server (408). In response to a determination that the ETP does not have an HTTPS certificate, the ETP maintains a TLS layer and routes an encrypted HTTP stream to the second ETP based on the FQDN to establish an end-to-end TLS session (407).
Abstract:
Provided is a computer system and method that enables delegated access to encrypted information for distributed messaging and queuing frameworks, or in general, to publish/subscribe architectures. In said frameworks and architectures, data is published by data producers and organized in channels or queues, which consumer applications can subscribe to, and that are managed by one or multiple broker entities.
Abstract:
The invention concerns a method for securely pairing a first device (1) and a second device (2) for exchanging secure data through a data communication channel (41, 42, 43) being is a wired or a wireless radio channel. The method comprises comprising, on an activation mobile device (3), generating a first secret (71) for coding data and establishing a first 5control communication channel (5) between the activation mobile device and the first device so as to transmit to it the first secret through said first control communication channel, the control communication channel being a wireless non-radio communication channel. Upon a reception of said first secret on said first device, data are coded 10using the secret and exchanged via the data communication channel.
Abstract:
A system for the maintenance and creation of security tunnels between IoT devices and IoT cloud servers, comprising the steps of receiving one or more packets from one or more IoT devices in a smart router, routing the one or more packets to an agent within the router, the agent performing one or more services on the one or more packets, routing the one or more packets to a WAN port of the router, and sending the one or more packets by a cloud secure tunnel to one or more IoT cloud servers. The system may have secure tunnels that are formed between the IoT devices using a unique password for each IoT device. The additional step of selectively stopping communication between the IoT devices and the router, wherein when the communication of one IoT device to the router is compromised, the remaining tunnels with unique passwords are integral.
Abstract:
Techniques to securely store and retrieve data are disclosed. In various embodiments, a process of retrieving secure data includes receiving a request, where the request includes a first secret data and a second secret data. The process further includes identifying a first encrypted data to retrieve based on the request, using the first secret data to decrypt the first encrypted data to generate a decrypted data, generating a second encrypted data, where the second encrypted data is encrypted using the second secret data. In response to the request, the second encrypted data is provided.
Abstract:
An intermediary network device receives a request for a secure communication session between an endpoint server and an endpoint client through the network device. The secure session between the endpoint server and the endpoint client is divided into a first session and a second session. The first session is between the endpoint server and the network device. The second session is between the network device and the endpoint client. The network device receives a first session ticket from the endpoint server. A session state of a proxy client in the first session, including the first session ticket, is determined. The network device also determines a session state of a proxy server in the second session. The combination of the session state of the proxy client, including the first session ticket, and the session state of the proxy server are encapsulated as part of a second session ticket.
Abstract:
본 문서는 보안 메시지 전송 장치 및 그 처리 방법에 관한 것이다. 본 문서의 한 실시 예에 따른 보안 메시지 처리 방법은 비보안 메시지 서비스부가 발신측 단말로부터 전송된 메시지를 수신하여 상기 메시지가 암호화된 메시지인지 판단하는 과정; 상기 메시지가 암호화된 메시지인 경우, 상기 비보안 메시지 서비스부가 상기 암호화된 메시지를 보안 메시지 서비스부로 전달하는 과정; 및 상기 보안 메시지 서비스부가 상기 암호화된 메시지를 복호화한 후, 상기 복호화된 메시지를 다시 암호화하여 수신측 단말로 전송하는 과정을 포함할 수 있다.
Abstract:
A gateway apparatus supports differentiated secure communications among heterogeneous electronic devices. A communication port communicates via communication networks of different types with two or more associated devices having diverse secure communication capabilities. The gateway logic selectively authenticates the associated devices for group membership into a Secure Communication Group (SCG), and selectively communicates Secure Communication Group Keys (SCGKs) to the devices having the diverse secure communication capabilities for selectively generating session keys locally by the associated devices for mutual secure communication in accordance with the group membership of the associated devices in the SCG.
Abstract:
Disclosed herein are techniques and systems for transmitting a multi-broadcast signal from a wireless broadcasting device (or beacon) as part of a beacon recognition process. Specifically, the multi-broadcast signal may be in the form of multiple packets that are broadcast from the beacon within a recognition time period. A process may include creating a first packet having a first identifier (ID) and a randomly generated value, broadcasting the first packet from the beacon, generating a second ID based at least in part on the randomly generated value included in the first packet, and broadcasting, within a period of time from the broadcast of the first packet, a second packet having the second ID and a device ID that uniquely identifies the beacon. A mobile device in proximity to the beacon may include logic to detect and interpret a multi-broadcast signal from the beacon.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of the methods includes receiving a first request to access a first resource hosted by a server outside the network, determining whether requests from the client device to access the first resource outside the network should be redirected to a second resource hosted by a proxy within the network, providing a redirect response to the client device, the redirect response including the second universal resource identifier, establishing a first encrypted connected between the client device and the proxy hosting the second resource, and a second encrypted connection between the proxy hosting the second domain and the server hosting the first resource, and decrypting and inspecting the encrypted communication traffic passing between the client device and the server hosting the first resource.