摘要:
A method for securing information over-the-air (OTA) in a non-Universal Integrated Circuit Card (UICC) type secure element (SE) of a mobile terminal including receiving a request to initialize an OTA proxy of a mobile terminal, initializing the OTA proxy, receiving a request to secure information, and securing, using the OTA proxy, the requested information in the non-UICC type SE. A method for reconstructing a mobile wallet application including receiving a request to reconstruct the mobile wallet application for a user; transmitting stored mobile wallet application information associated with the user to the mobile terminal; receiving mobile terminal information and SE information; and transmitting a stored application associated with the mobile wallet application information to the mobile terminal. A mobile terminal to secure information OTA in a non-UICC type SE including an OTA proxy to receive a securing command from a TSM, and a non-UICC SE.
摘要:
The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof.
摘要:
Embodiments of the disclosure include systems and methods for secure storage and/or retrieval of customer secrets by, e.g., a cloud services provider. According to methods, secret data that is to be securely stored may be transmitted, along with an initialization vector, to an encryption service for encryption using a private key stored on in a remote key vault. The encrypted data can be returned and stored, in its encrypted form, in a secure storage along with the initialization vector data. To retrieve the securely stored data, embodiments disclose retrieving the encrypted form of the data and transmitting it, along with its related initialization vector data, to the encryption service for decryption using the private key stored in the remote key vault. The decrypted data can then be made available to a requesting product service.
摘要:
A technique for promoting network security employs a user-centric approach in which a hardware appliance serves as a local security hub for storing and dispatching user identity information (UII). The hardware appliance is configured to release UII in response to access requests by applying a variable verification procedure. The variable verification procedure tests multiple verification factors associated with an access request, assigns a verification strength to each factor, and selectively releases the requested UII in response to a combined verification strength exceeding a threshold.
摘要:
Methods, systems and apparatus for securing credential distribution are disclosed. One method includes receiving, by a cloud system, a notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification, authenticating, by the cloud system, the wireless device, receiving, by the cloud system, a request from the wireless device for private network credentials, and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials.
摘要:
A method of protecting a secret may include, by a client electronic device, identifying a secret, identifying a unique identifier associated with the secret, splitting the secret into shares so that the secret can only be reconstructed with an authorized subset of shares, identifying a share from the plurality of shares to store, and identifying a unique identifier associated with the identified share. A short range communication receiver of the client electronic device may detect a presence of a target electronic device, where the target electronic device is operating in a discoverable mode by using a short range communication transmitter to broadcast a signal within a communication range of the short range communication receiver. The short range communication transmitter of the client electronic device may transmit the identified share, the unique identifier associated with the secret, and the unique identifier associated with the identified share to the target electronic device.
摘要:
Provided is a communication apparatus (121) that securely manages passwords for utilizing a server apparatus. A generator (203) generates a random table having the same number of rows and the same number of columns as a password table associated with a server name specified in an authentication request received by a receiver (202). An acceptor (205) accepts a key from a user to whom the random table is presented by a presenter (204). An identification unit (206) identifies, from the key and the random table, the user's of selection order of elements in the table. An acquirer (207) selects and arranges elements in the password table in the identified selection order, thereby acquiring a password. An output unit (208) displays the acquired password on a display or transmits the acquired password to the server apparatus, thereby allowing the user to utilize the server apparatus.
摘要:
Methods, apparatus, and systems for securing the interactions of a user with an application using a Bluetooth enabled authentication device are disclosed.
摘要:
The present disclosure relates to methods and devices for managing accounts. A method may include receiving, by a processor, a first log-out request for logging out a plurality of target accounts corresponding to at least one target application. A method may further include for each target application of the at least one target application, sending, from the processor to a target application server corresponding to the target application, a second log-out request that carries information of the plurality of target accounts, for the target application server to log out the plurality of target accounts according to the information of the plurality of target accounts. Aspects of the present disclosure can allow for quickly logging out a plurality of target accounts, which may save time for users and improve user experience.
摘要:
A method and device for network access of a smart terminal device. The smart terminal device generates a network access request message and broadcasts the network access request message; and then receives a network access response message transmitted by a mobile terminal device, the network access response message including connection information of a router to be accessed, such that the smart terminal device may connect to the router to be accessed based on the connection information.