Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

103results about How to "Network security" patented technology

Proactive network security system to protect against hackers

A proactive network security system to protect against hackers for the proactive automated defense against hackers by automatically finding, reporting, communicating with countermeasures about and removing the common vulnerabilities and exposures (CVEs) that they exploit.
Owner:NETSHIELD CORP

Security protocol model for ubiquitous networks

Gaining secure access to a ubiquitous network by detecting a user joining one particular network domain of the ubiquitous network, authenticating the joined user by employing symmetric key authentication together with a single sign-on mechanism, and allowing the authenticated user to access one or more other network domains of the ubiquitous network based upon the authenticating for the one particular network domain.
Owner:LG ELECTRONICS INC

Method and apparatus for providing a private communication system in a public switched telephone network

A private communication network through which a plurality of member users communicate using the public switched telephone network (PSTN) is disclosed herein. Each member user utilizes either a modified land line telephone directly connected to PSTN, or uses a modified mobile telephone operatively coupled to the PSTN through a wireless communication system. The private communication network includes network call manager having a telephone network interface for establishing a telephone connection with each of a plurality of telephone lines of the PSTN. Each of the plurality of telephone lines is associated with one of the plurality of member users. The network call manager further includes a switch matrix, coupled to the telephone network interface, for providing an information signal received from an active member user over a selected telephone line to the remaining non-active member users. A network call manager controller identifies the active member user the basis of push-to-talk (PTT) request signals received from the member users'telephones over the plurality of telephone lines. The telephone set of each member user will typically be capable of both standard telephone operation as well as of PTT operation over the private communication network. The security of the PTT private network may be enhanced by configuring each telephone set for encryption of all such reverse link transmissions, as well as for corresponding decryption of the forward link information from the active member user.
Owner:QUALCOMM INC

Method and system for secure block acknowledgment (block ack) with protected mac sequence number

Aspects of a method and system for protected MAC sequence numbers, as well as secure block acknowledgment (block ACK) with protected MAC sequence number are presented. In one aspect of the system a communicating station (STA) may protect the sequence number (SN) field portion of transmitted protocol data units (PDUs), for example data MAC layer PDUs (MPDUs), or frames. In another aspect of the system, starting sequence number (SSN) information communicated via control frames, such as block acknowledgment request (BAR) and block acknowledgment (BA) frames, may be protected. In another aspect of the system, communicating STAs may exchange management frames to enable the protection of SN information in data MPDUs and / or the protection of SSN values in control MPDUs.
Owner:AVAGO TECH INT SALES PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products