APPARATUS, SYSTEM AND METHOD OF PROTECTING A SERVICE IDENTIFIER
    41.
    发明申请
    APPARATUS, SYSTEM AND METHOD OF PROTECTING A SERVICE IDENTIFIER 有权
    装置,系统和保护服务标识符的方法

    公开(公告)号:US20160127890A1

    公开(公告)日:2016-05-05

    申请号:US14582977

    申请日:2014-12-24

    Abstract: Some demonstrative embodiments include apparatuses, systems and/or methods of securing a service Identifier (ID). For example, a wireless device may include a Secure Service Identifier (SSID) processor to determine a SSID corresponding to a service, the SSID including an encrypted value being based on a service name key from a service provider of the service and a service name corresponding to the service; and a radio to transmit a wireless message including the SSID.

    Abstract translation: 一些演示实施例包括保护服务标识符(ID)的设备,系统和/或方法。 例如,无线设备可以包括安全服务标识符(SSID)处理器,用于确定与服务相对应的SSID,SSID包括基于来自服务的服务提供商的服务名称密钥的加密值和对应于服务名称的服务名称 服务; 以及用于发送包括SSID的无线消息的无线电装置。

    EFFICIENT KEY DERIVATION FOR END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    42.
    发明申请
    EFFICIENT KEY DERIVATION FOR END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 有权
    有效交付可视性的端到端网络安全的有效关键

    公开(公告)号:US20150188702A1

    公开(公告)日:2015-07-02

    申请号:US14557125

    申请日:2014-12-01

    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES 128(base_key_1, client_ID),   (1) client_key_LSB=AES 128(base_key_2, client_ID+pad), and   (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.

    Abstract translation: 端到端安全性和流量可见性可以由使用控制器的系统来实现,所述控制器基于在每个数据分组中传送的导出密钥和客户端标识符来导出每个客户端不同的密码密钥。 控制器将派生密钥分发到信息技术监控设备和服务器,以提供流量可视性。 对于较大的密钥大小,可以使用以下推导公式来导出密钥:client_key_MSB = AES 128(base_key_1,client_ID),(1)client_key_LSB = AES 128(base_key_2,client_ID + pad)和(2)cli​​ent_key =client_key_MSB‖ client_key_LSB,其中(1)和(2)并行执行。 可以使用客户端密钥和客户端标识符,以便可以实现端到端的安全性。

    Techniques for extending communications chain of trust to client applications

    公开(公告)号:US11374930B2

    公开(公告)日:2022-06-28

    申请号:US16238045

    申请日:2019-01-02

    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.

    Method and system of secured direct link set-up (DLS) for wireless networks

    公开(公告)号:US11233633B2

    公开(公告)日:2022-01-25

    申请号:US16188848

    申请日:2018-11-13

    Abstract: Method and system of secured direct link set-up (DLS) for wireless networks. In accordance with aspects of the method, techniques are disclosed for setting up computationally secure direct links between stations in a wireless network in a manner that is computationally secure. A direct link comprising a new communication session is set up between first and second stations in a wireless local area network (WLAN) hosted by an access point (AP), the direct link comprising a new communication session. The AP generates a unique session key for the new communication session and transfers secured copies of the session key to each of the first and second stations in a manner under which only the first and second stations can obtain the session key. A security mechanism is then implemented on the unsecured direct link to secure the direct link between the first and second stations using a secure session key derived from the session key.

    System, apparatus and method for key provisioning delegation

    公开(公告)号:US10516654B2

    公开(公告)日:2019-12-24

    申请号:US15070166

    申请日:2016-03-15

    Abstract: In one embodiment, a computing device includes at least one hardware processor to execute instructions, a network interface to enable communication with a second computing device and a third computing device, and at least one storage medium. Such medium may store instructions that when executed by the computing device enable the computing device to request delegation of a key provisioning privilege for the second computing device from the third computing device via a parent-guardian delegation protocol comprising a three-party key distribution protocol with the second computing device and the third computing device, the three-party key distribution protocol having interposed therein a two-party authenticated key exchange protocol between the computing device and the third computing device. Other embodiments are described and claimed.

    Technologies for secure bootstrapping of virtual network functions

    公开(公告)号:US10380346B2

    公开(公告)日:2019-08-13

    申请号:US15863414

    申请日:2018-01-05

    Abstract: Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function (VNF) bootstrap service (VBS) in secure network communication with a VBS agent of a VNF instance. The VBS agent is configured to execute a secure VNF bootstrap capture protocol in the NFV network architecture. Accordingly, the VBS agent can be configured to register with the VBS via secure communications transmitted between the VBS and the VBS agent. The secure communications include transmitting a security quote from a TEE of a platform on which the VNF instance is instantiated and a security credential request to the VBS, as well as receiving a security credential in response to validating the security quote and the security credential request. Other embodiments are described and claimed.

    TECHNIQUES FOR EXTENDING COMMUNICATIONS CHAIN OF TRUST TO CLIENT APPLICATIONS

    公开(公告)号:US20190141035A1

    公开(公告)日:2019-05-09

    申请号:US16238045

    申请日:2019-01-02

    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.

Patent Agency Ranking