Patents Assigned to EXILANT Technologies Private Limited
-
Publication number: 20180083784Abstract: A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may also include performing, at the first computer system, message validation associated with the first message. The method may further include generating, if the first message is valid, a second message including the first data portion. The method may also include communicating, if the first message is valid, the second message from the first computer system for delivery to a second computer system.Type: ApplicationFiled: December 4, 2017Publication date: March 22, 2018Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9876643Abstract: A method of increasing communication security may include determining, responsive to receiving a first message from a first computer system, whether said first computer system is authorized to communicate with a second computer system, wherein said determining is performed at a third computer system. The method may also include generating a first data portion associated with a security token, wherein said generating said first data portion includes accessing data, wherein said data includes a first instance of a session key, and wherein said generating said first data portion further includes encrypting, using a key associated with said second computer system, said data to generate said first data portion. The method may further include communicating, if said first computer system is authorized to communicate with said second computer system, a second message from said third computer system for delivery to said first computer system.Type: GrantFiled: July 21, 2016Date of Patent: January 23, 2018Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20170324725Abstract: A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data. The first computer system may be further configured to communicate the CoAP message for delivery to the second computer system. The second computer system may be configured to perform message validation based on the authentication data.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9794246Abstract: An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application Protocol (CoAP) message including authentication data. The security component may be configured to perform message validation based on the authentication data.Type: GrantFiled: July 21, 2016Date of Patent: October 17, 2017Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20170186258Abstract: An apparatus may include a housing defining a compartment, wherein the housing is configured to accept at least one item within the compartment. The apparatus may also include a member coupled with the housing, wherein the member defines a container, wherein the member is configured to provide access to the compartment in a first state, and wherein the member is further configured to restrict access to the compartment in a second state. The apparatus may further include an electronic lock disposed at least partially within the container, wherein the electronic lock is configured to limit relative movement between the member and the housing in the second state. The apparatus may also include an interface routed between the compartment and the container, wherein the interface is configured to allow control of the electronic lock.Type: ApplicationFiled: March 14, 2017Publication date: June 29, 2017Applicant: EXILANT Technologies Private LimitedInventors: Vishnu Sharma, Madhav Sivadas
-
Publication number: 20170099146Abstract: A method of increasing communication security may include determining, responsive to receiving a first message from a first computer system, whether said first computer system is authorized to communicate with a second computer system, wherein said determining is performed at a third computer system. The method may also include generating a first data portion associated with a security token, wherein said generating said first data portion includes accessing data, wherein said data includes a first instance of a session key, and wherein said generating said first data portion further includes encrypting, using a key associated with said second computer system, said data to generate said first data portion. The method may further include communicating, if said first computer system is authorized to communicate with said second computer system, a second message from said third computer system for delivery to said first computer system.Type: ApplicationFiled: July 21, 2016Publication date: April 6, 2017Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9602486Abstract: A method of increasing communication security may include receiving, from a first computer system at a second computer system, a message including a data portion, wherein the data portion is associated with a security token, and wherein the data portion includes a session key. The method may also include performing, at the second computer system, processing associated with the message. The method may further include accessing, responsive to the processing, the session key from the data portion.Type: GrantFiled: August 27, 2014Date of Patent: March 21, 2017Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20160330189Abstract: An apparatus may include a communication interface and a security component. The communication interface may be configured to receive a Constrained Application Protocol (CoAP) message including authentication data. The security component may be configured to perform message validation based on the authentication data.Type: ApplicationFiled: July 21, 2016Publication date: November 10, 2016Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9426135Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.Type: GrantFiled: March 31, 2014Date of Patent: August 23, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9426148Abstract: A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may also include generating a second message including the first data portion. The method may further include communicating the second message from the first computer system for delivery to a second computer system.Type: GrantFiled: August 27, 2014Date of Patent: August 23, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9426136Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.Type: GrantFiled: March 31, 2014Date of Patent: August 23, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9419979Abstract: A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second computer system, wherein the receiving further includes receiving the first message at a third computer system. The method may also include performing, at the third computer system, processing associated with the first message. The method may also include generating, responsive to the processing, a second message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may further include communicating the second message from the third computer system for deliver to the first computer system.Type: GrantFiled: August 27, 2014Date of Patent: August 16, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9419949Abstract: A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer system, wherein the determining is performed at a third computer system. A message may be communicated from the third computer system for delivery to the first computer system, wherein the message includes a first data portion and a second data portion, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. Another message, including the first data portion, may be communicated from the first computer system for delivery to the second computer system. Yet another message may be communication from the first computer system for delivery to the second computer system. Message validation associated with the yet another message may be performed using the first instance of the session key.Type: GrantFiled: August 27, 2014Date of Patent: August 16, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20160105465Abstract: A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also be established. A first set of messages may be communicated via the accessory interface between the portable electronic device and a first accessory of the plurality of accessories. A second set of messages may be communicated via the accessory interface between the portable electronic device and a second accessory of the plurality of accessories. The first and second sets of messages communicated between the portable electronic device and the accessory interface may be formatted in accordance with a data exchange pattern.Type: ApplicationFiled: December 18, 2015Publication date: April 14, 2016Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Patent number: 9251109Abstract: A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also be established. A first set of messages may be communicated via the accessory interface between an application of the portable electronic device and a first accessory of the plurality of accessories. A second set of messages may be communicated via the accessory interface between the application and a second accessory of the plurality of accessories. The first and second sets of messages communicated between the portable electronic device and the accessory interface may be formatted in accordance with the same data exchange pattern.Type: GrantFiled: December 20, 2013Date of Patent: February 2, 2016Assignee: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20150326539Abstract: A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer system, wherein the determining is performed at a third computer system. A message may be communicated from the third computer system to the first computer system, wherein the message includes a first data portion and a second data portion, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The second data portion may be decrypted at the first computer system to access the second instance of the session key. Another message, including the first data portion, may be communicated from the first computer system to the second computer system. The first data portion may be decrypted at the second computer system to access the first instance of the session key.Type: ApplicationFiled: August 27, 2014Publication date: November 12, 2015Applicant: EXILANT TECHNOLOGIES PRIVATE LIMITEDInventor: Vishnu Sharma
-
Publication number: 20150281195Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: EXILANT TECHNOLOGIES PRIVATE LIMITEDInventor: Vishnu Sharma
-
Publication number: 20150281196Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: EXILANT TECHNOLOGIES PRIVATE LIMITEDInventor: Vishnu Sharma
-
Publication number: 20150281241Abstract: A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second computer system, wherein the receiving further includes receiving the first message at a third computer system. The method may also include performing, at the third computer system, processing associated with the first message. The method may also include generating, responsive to the processing, a second message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may further include communicating the second message from the third computer system to the first computer system.Type: ApplicationFiled: August 27, 2014Publication date: October 1, 2015Applicant: EXILANT Technologies Private LimitedInventor: Vishnu Sharma
-
Publication number: 20150281254Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: EXILANT TECHNOLOGIES PRIVATE LIMITEDInventor: Vishnu Sharma