Patent application number | Description | Published |
20150178236 | COMMUNICATION WITH ACCESSORIES - A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also be established. A first set of messages may be communicated via the accessory interface between an application of the portable electronic device and a first accessory of the plurality of accessories. A second set of messages may be communicated via the accessory interface between the application and a second accessory of the plurality of accessories. The first and second sets of messages communicated between the portable electronic device and the accessory interface may be formatted in accordance with the same data exchange pattern. | 06-25-2015 |
20150281195 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150281196 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150281199 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving, from a first computer system at a second computer system, a message including a data portion, wherein the data portion is associated with a security token, and wherein the data portion includes a session key. The method may also include performing, at the second computer system, processing associated with the message. The method may further include accessing, responsive to the processing, the session key from the data portion. | 10-01-2015 |
20150281213 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may also include generating a second message including the first data portion. The method may further include communicating the second message from the first computer system to a second computer system. | 10-01-2015 |
20150281241 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second computer system, wherein the receiving further includes receiving the first message at a third computer system. The method may also include performing, at the third computer system, processing associated with the first message. The method may also include generating, responsive to the processing, a second message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may further include communicating the second message from the third computer system to the first computer system. | 10-01-2015 |
20150281254 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150326539 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer system, wherein the determining is performed at a third computer system. A message may be communicated from the third computer system to the first computer system, wherein the message includes a first data portion and a second data portion, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The second data portion may be decrypted at the first computer system to access the second instance of the session key. Another message, including the first data portion, may be communicated from the first computer system to the second computer system. The first data portion may be decrypted at the second computer system to access the first instance of the session key. | 11-12-2015 |