Abstract:
A subscriber station (110, 112) may be configured with a processing system having first and second security protocols (210, f2). The processing system uses the first security protocol (210) to generate a pseudo-secret key from a challenge received from a service provider, and uses the second security protocol (f2) to generate a response to the challenge from the pseudo-secret key.
Abstract:
An example method of asset tracking includes receiving, from each of one or more positioning devices, a corresponding position identification (ID) value, determining a tier value associated with each received position ID value, determining asset position information based on each received position ID value and each determined tier value, and transmitting the determined asset position information to a receiver.
Abstract:
A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
Abstract:
A method of obtaining information for locating an asset includes: listening, at an asset tag, for a first listen duration for landmark messages; receiving, at the asset tag during the first listen duration, at least one landmark message from each of one or more landmark tags; selecting a synched landmark tag from the one or more landmark tags; abstaining from listening, at the asset tag, for landmark messages until approximately a subsequent transmission time of a synched landmark message corresponding to the synched landmark tag; and waking up at approximately the subsequent transmission time of the synched landmark message to listen, at the asset tag, for landmark messages for a second listen duration such that the asset tag listens for the landmark messages during the subsequent transmission time; wherein the first listen duration is longer than the second listen duration.
Abstract:
Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
Abstract:
Various operations may be performed based on distance-related functions associated with two or more devices. For example, one or more distance-based functions may be used to control whether a device is allowed to request another device to perform one or more functions. Similarly, one or more distance-based functions may be used to control whether a device may perform one or more functions requested by another device. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
Abstract:
Mobile commerce authentication and authorization systems enable currently existing point-of-sale devices that are neither structurally nor systemically altered to conduct financial transactions with a customer using an access terminal across a wireless communications system. The point-of-sale devices receive an input from a payment instrument replacement, which identifies the transaction to the point-of-sale device as a transaction including an access terminal. Authentication of the user of the access terminal is achieved at least by application of position and/or location determinable features of the access terminal, the position and/or location of a point-of-sale device of a vendor or merchant where the customer seeks to purchase goods or services, and the payment sum entered on the point-of-sale device. A payment matching server may assist in processing the location data and the payment sum amount across communications network.
Abstract:
A secure seeding and reseeding scheme is provided for pseudorandom number generators by using a pre-stored initialization seed. This scheme initializes a pseudorandom number generator into an unknown state even when entropy collection is unavailable. A primary seed file and a shadow seed file are maintained with initialization seed information in a secure file system. If the primary seed file is corrupted, the pseudorandom number generator is seeded with the content of the shadow seed file. Additionally, a trusted timer or clock may be mixed with the pre-stored initialization seed to add entropy even when the pre-stored seed information has been compromised.
Abstract:
A stream stretcher is provided for securely expanding a key stream to match the length of a data block to be encrypted and/or decrypted. A key stream is obtained having a length of L Z bits. A length LD corresponding to a data block to be encrypted/decrypted is obtained, where L D > L Z . L D -L Z new bits are recursively generated by combining at least two bits of the key stream. The L D -L Z new bits are appended to the key stream to generate a stretched key stream. The data block may then be encrypted/decrypted with the stretched key stream. The at least two bits are selected to have offsets that form a full positive difference set.
Abstract:
Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number and a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.