SG10201808482WA - Increased communication security - Google Patents
Increased communication securityInfo
- Publication number
- SG10201808482WA SG10201808482WA SG10201808482WA SG10201808482WA SG10201808482WA SG 10201808482W A SG10201808482W A SG 10201808482WA SG 10201808482W A SG10201808482W A SG 10201808482WA SG 10201808482W A SG10201808482W A SG 10201808482WA SG 10201808482W A SG10201808482W A SG 10201808482WA
- Authority
- SG
- Singapore
- Prior art keywords
- computer system
- communication security
- increased communication
- coap
- message
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
INCREASED COMMUNICATION SECURITY Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to 5 perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. (Fig. 1) 10
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/231,634 US10389714B2 (en) | 2014-03-31 | 2014-03-31 | Increased communication security |
US14/231,656 US9426136B2 (en) | 2014-03-31 | 2014-03-31 | Increased communication security |
US14/231,625 US9426135B2 (en) | 2014-03-31 | 2014-03-31 | Increased communication security |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201808482WA true SG10201808482WA (en) | 2018-11-29 |
Family
ID=52595112
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201501552UA SG10201501552UA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
SG10201501555XA SG10201501555XA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
SG10201808482WA SG10201808482WA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
SG10201501560UA SG10201501560UA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201501552UA SG10201501552UA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
SG10201501555XA SG10201501555XA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201501560UA SG10201501560UA (en) | 2014-03-31 | 2015-03-02 | Increased communication security |
Country Status (2)
Country | Link |
---|---|
EP (3) | EP2928147B1 (en) |
SG (4) | SG10201501552UA (en) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8886935B2 (en) * | 2010-04-30 | 2014-11-11 | Kabushiki Kaisha Toshiba | Key management device, system and method having a rekey mechanism |
-
2015
- 2015-02-25 EP EP15156551.2A patent/EP2928147B1/en active Active
- 2015-02-25 EP EP15156583.5A patent/EP2928148B1/en active Active
- 2015-03-02 SG SG10201501552UA patent/SG10201501552UA/en unknown
- 2015-03-02 SG SG10201501555XA patent/SG10201501555XA/en unknown
- 2015-03-02 SG SG10201808482WA patent/SG10201808482WA/en unknown
- 2015-03-02 SG SG10201501560UA patent/SG10201501560UA/en unknown
- 2015-03-31 EP EP15161863.4A patent/EP2928153B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2928147B1 (en) | 2021-08-18 |
SG10201501555XA (en) | 2015-10-29 |
SG10201501560UA (en) | 2015-10-29 |
EP2928148B1 (en) | 2021-06-30 |
SG10201501552UA (en) | 2015-10-29 |
EP2928147A1 (en) | 2015-10-07 |
EP2928153B1 (en) | 2021-12-01 |
EP2928148A1 (en) | 2015-10-07 |
EP2928153A1 (en) | 2015-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018256568A1 (en) | Systems and methods for software based encryption | |
MY190913A (en) | Device and method for secure connection | |
MX2014011953A (en) | Detecting network intrusion using a decoy cryptographic key. | |
WO2018071191A3 (en) | Method and system for data security based on quantum communication and trusted computing | |
SG10201900964QA (en) | Cloud-based transactions methods and systems | |
PH12016501640A1 (en) | Techniques to operate a service with machine generated authentication tokens | |
PE20170656A1 (en) | AUTHENTICATION OF THE SERVICE NETWORK | |
TR201902104T4 (en) | Systems and methods for secure communication. | |
WO2016175914A3 (en) | Transaction signing utilizing asymmetric cryptography | |
WO2013106094A3 (en) | System and method for device registration and authentication | |
MX2017000430A (en) | Networked access control system. | |
EP3197123A4 (en) | Method, terminal, and network server for information encryption and decryption and key management | |
MY190785A (en) | Network system for secure communication | |
WO2016114830A3 (en) | Methods and systems for authentication interoperability | |
WO2013040042A9 (en) | Systems and methods of performing link setup and authentication | |
WO2014153462A3 (en) | Advanced authentication techniques and applications | |
MX2017001090A (en) | Wireless key management for authentication. | |
WO2015073422A3 (en) | System and method for updating an encryption key across a network | |
GB2525719A8 (en) | Method and system for providing a vulnerability management and verification service | |
IN2014DN09206A (en) | ||
GB2533727A (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
MX340024B (en) | Role-based content rendering. | |
RS20120254A1 (en) | System and method for high security biometric access control | |
GB2562923A (en) | Data security system with encryption | |
MX2016014461A (en) | Provisioning drm credentials on a client device using an update server. |