摘要:
Aspects of the present disclosure address systems, methods, and devices for enabling secure communication between electronic control units (ECUs) in a vehicle. The system may include a first and second ECU from a plurality of ECUs in the vehicle. The first ECU is to enable secure communication between the plurality of ECUs by performing operations that include provisioning the second ECU with authentication data for authenticating messages exchanged with a third ECU and provisioning the third ECU with a set of security keys to enable the third ECU to securely exchange messages with the second ECU. The second ECU receives, from the third ECU, a secure message that is cryptographically signed using a security key from the set of security keys provisioned to the third ECU, and the second ECU authenticates the secure message by comparing the authentication data with an authentication signal.
摘要:
A data transfer system is configured to transfer data from a data transmitting site to a data receiving site. The data transfer system includes a low-side network, at least one high- side network, and a one-way data (OWD) link. The OWD link is configured to perform unidirectional data transfer from the low-side network to the at least one high-side network. The OWD link continuously synchronizes the low-side network with the at least one high- side network while continuously transferring data through the OWD link.
摘要:
A method for authenticating a counterparty to a digital transaction includes obtaining, at a mobile terminal from a unverified counterparty, characteristic content associated with the digital transaction to be displayed in a trusted user interface provided by the mobile terminal, sending, by the mobile terminal, data associated with the characteristic content to an authentication server; and obtaining, from the authentication server, a result of an authentication judgment by the authentication server, the authentication judgment based on the data associated with the characteristic content and an item of reference content.
摘要:
A computer-implemented method is described. The method includes generating, for display on a computing device, an identification rendering viewable on a display of the device, the identification rendering including an authority indicator and a digital image of a person. The method further includes the device triggering an interactive effect associated with the identification rendering. The triggering occurs in response to the device receiving a trigger input and the trigger can be from any input or communications sensor of the computing device. The triggered interactive effect includes an authority indicator and a freshness indicator that enables an individual viewing the display to validate the identity of the person associated with the digital image. Validation can be based on at least one of a characteristic of the interactive effect and attributes of the person or the authority indicator.
摘要:
A method and system of detecting a security threat within a network of connected devices that share a ledger of transactions between them under the form of exchanged blockchain messages (50). Enhanced blockchain messages are built by adding all forked chains (51) to the blockchain messages (50). Forked chains in such enhanced blockchains are then inspected to detect any anomaly. When an anomaly is detected in a forked chain, all transactions of the ledger in the forked chain (51) and the blockchain message (50) leading up to the network attack entry point are reviewed to identify the source of the security threat.
摘要:
A distributed key/value store system using asynchronous messaging systems is provided. A plurality of instances in a cloud computing environment each execute software that enables reading from and writing to a respective local cache, and that enables sending messages through a messaging queue to a cloud environment operating system. When a configuration value is updated locally at an instance, the instance sends a message to the cloud environment operating system, instructing it to update a database and broadcast the update to other instances through each instance's messaging queue. In some embodiments, each instance may read and write to the database directly, and may publish updates to the queues of other instances directly. In some embodiments, a managed encryption key service is used to encrypt sensitive information, securely distribute via distributed key/value store systems, and authenticate and decrypt it by instances of the distributed key/value store systems.
摘要:
Disclosed is a platform for providing computational resources at and/or near a mobile network perimeter. The platform may be used to provide computational resources adjacent a small cell radio via at least one Mobile Edge Compute ("MEC") Appliance and at least one MEC Controller. The MEC Appliance can serve as the data plane to support data flow traffic. The MEC Controller can provide a micro-services architecture designed for resiliency, scalability, and extensibility. The platform can be used to de-centralize the mobile network operator's core network and/or associated macro-cell network topologies, generating a platform with enhanced flexibility, reliability, and performance. The platform can include a security architecture for effective privacy and access within a distributed topology of the network at and/or near the edge of the mobile network perimeter.
摘要:
An electronic communication device of a telecommunications system receives a message containing an integrity mode bit and an integrity protection bit from another electronic communication device, and determines whether the integrity protection bit indicates that a Frame Check Sequence, FCS, field of the message has been replaced by a Medium Access Control, MAC, field. Responsive to determining that the integrity protection bit indicates that the FCS field has been replaced by the MAC field, the device determines whether the MAC field is valid. Responsive to determining that the MAC field is not valid and the integrity mode bit having a first defined value, the message is discarded. Responsive to determining that the MAC field is not valid and the integrity mode bit having a second defined value, content of the message is provided to a higher network protocol layer for processing.
摘要:
In an example, there is disclosed a computing apparatus having: a network interface to communicate with a second device; a contextual data interface to receive and store contextual data; and one or more logic elements comprising a contextual security agent, operable to: receive a contextual data packet via the network interface; compare the contextual data packet to stored contextual data; and act on the comparing. The contextual data packet may optionally be provided out of band, and may be used to authenticate a substantive data packet, such as a patch or update.
摘要:
According to an example aspect of the present invention, there is provided an apparatus comprising memory configured to store information characterizing at least one run-time behavioural pattern, at least one processing core configured to perform a behavioural determination based at least partly on the stored information, concerning a network node, and to verify, as a response to a result of the behavioural determination, whether the network node is comprised on a list of valid network nodes.