Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

319results about How to "Improve network security" patented technology

Method and apparatus for providing network security using security labeling

A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.
Owner:CISCO TECH INC

Stealth packet switching

Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and / or optical stealth-enabled networks using specially modified packets, cells, frames, and / or other “stealth” information structures. This enables stealth packets to have a low probability of detection, a low probability of interception, and a low probability of interpretation. Stealth packets are only detected, intercepted, and correctly interpreted by stealth-enabled network equipment. In its simplest form, stealth packet switching modifies the packet structure, protocols, timing, synchronization, and other elements through various rule-violations. This creates stealth packets, which normal equipment cannot receive correctly, and hence normal equipment discards the stealth packets. Stealth packets may be further enhanced with encryption techniques which focus on encrypting the packet structure itself, as opposed to merely encrypting the data. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques. Combining stealth packets with time-based reservation packet switching enables total encryption of the packet (including header and preamble encryption) capable of routing through multiple hops without decryption of headers and preamble at each hop. Time-based reservation packet switching can also guarantee real-time stealth packet delivery through a network that is totally congested from data storms, virus caused congestion, and / or denial of service attacks.
Owner:HOWE WAYNE RICHARD

Active intrusion resistant environment of layered object and compartment keys (AIRELOCK)

A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged. Thus any network session comprises one or more secure sessions in a plurality of security domains and any fault or potential attack can be compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links.
Owner:LOCKHEED MARTIN CORP

Using electronic security value units to control access to a resource

A network utilizes electronic security value units to prevent unauthorized access to resources in the network. The network includes at least a resource manager and an electronic bank server (e.g., the local resource bank). The resource manager determine a pricing strategy in electronic security value units for a group of one or more resources in the network. The electronic bank server selectively distributing electronic security value units to a client in the network, where the electronic security value units are unique to a group of one or more resources. Accordingly, access to a resource in the group, by the client, is determined by at least the above pricing strategy and by an amount of electronic security value units distributed to the client.
Owner:THE TRUSTEES OF COLUMBIA UNIV IN THE CITY OF NEW YORK +1

Microwave self-phasing antenna arrays for secure data transmission & satellite network crosslinks

A high-directivity transponder system uses a dual system of a retrodirective array transmitting a data signal peak toward an interrogator source, and a self-null-steering array transmitting a null toward the interrogator source and a jamming signal elsewhere, resulting in high S / N reception at the interrogator source and avoidance of interception. Integrating modulators would allow each array to transmit different data while the spectra of the transmitted signals are identical, thus disabling interception. The system enables secure point-to-point communications and can be used for short-distance wireless data transmission systems such as wireless LAN and RFID servers. As another aspect, self-steering signal transmission is employed for randomly oriented satellites using circularly polarized, two-dimensional retrodirective arrays. Quadruple subharmonic mixing is used as an effective means of achieving phase conjugation when a high-frequency LO is not feasible or inapplicable. These features may be used for small-satellite communications, secure tactical communications, search and rescue, enemy location fixing and tracking, UAV command and control, forest fire detection, marine-based tracking, and many other applications requiring secure communications with high signal directivity.
Owner:UNIV OF HAWAII

Microwave self-phasing antenna arrays for secure data transmission & satellite network crosslinks

A high-directivity transponder system uses a dual system of a retrodirective array transmitting a data signal peak toward an interrogator source, and a self-null-steering array transmitting a null toward the interrogator source and a jamming signal elsewhere, resulting in high S/N reception at the interrogator source and avoidance of interception. Integrating modulators would allow each array to transmit different data while the spectra of the transmitted signals are identical, thus disabling interception. The system enables secure point-to-point communications and can be used for short-distance wireless data transmission systems such as wireless LAN and RFID servers. As another aspect, self-steering signal transmission is employed for randomly oriented satellites using circularly polarized, two-dimensional retrodirective arrays. Quadruple subharmonic mixing is used as an effective means of achieving phase conjugation when a high-frequency LO is not feasible or inapplicable. These features may be used for small-satellite communications, secure tactical communications, search and rescue, enemy location fixing and tracking, UAV command and control, forest fire detection, marine-based tracking, and many other applications requiring secure communications with high signal directivity.
Owner:UNIV OF HAWAII

Microwave self-phasing antenna arrays for secure data transmission & satellite network crosslinks

A high-directivity transponder system uses a dual system of a retrodirective array transmitting a data signal peak toward an interrogator source, and a self-null-steering array transmitting a null toward the interrogator source and a jamming signal elsewhere, resulting in high S / N reception at the interrogator source and avoidance of interception. Integrating modulators would allow each array to transmit different data while the spectra of the transmitted signals are identical, thus disabling interception. The system enables secure point-to-point communications and can be used for short-distance wireless data transmission systems such as wireless LAN and RFID servers. As another aspect, self-steering signal transmission is employed for randomly oriented satellites using circularly polarized, two-dimensional retrodirective arrays. Quadruple subharmonic mixing is used as an effective means of achieving phase conjugation when a high-frequency LO is not feasible or inapplicable. These features may be used for small-satellite communications, secure tactical communications, search and rescue, enemy location fixing and tracking, UAV command and control, forest fire detection, marine-based tracking, and many other applications requiring secure communications with high signal directivity.
Owner:UNIV OF HAWAII

Method and device for updating a key

A method for updating a key includes: assigning, by a network, a stipulated specific value to an authentication management field AMF and generating a corresponding authentication tuple, and sending corresponding parameters in the authentication tuple to the terminal when an authentication request is initiated to the terminal, and generating a new authentication key for use in the next authentication; generating, by the terminal, a new authentication key corresponding to the network for use in the next authentication, when the corresponding parameters are received and it is determined that the authentication for the network is passed and the authentication management field in the corresponding parameters is with the predetermined value. According to the method for updating the key according to the invention, the key may be updated conveniently without adding to or modifying the existing signaling resources or the authentication parameters, so that network security may be improved.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products