Patent
Agile network protocol for secure communications with assured system availability
Reads0
Chats0
TLDR
In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.Abstract:
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.read more
Citations
More filters
Patent
Network printing system, web server, printing apparatus and program
Yoshiyuki Kondo,Yuji Sato +1 more
TL;DR: In this article, the facsimile machine extracts the periodical subscription setting data from the data packet and the setting of periodical subscriptions is performed based on the data set data.
Patent
Managing cyber attacks through change of network address
TL;DR: In this article, a system for responding to a cyber-attack on a server is proposed, in which a notification is sent to a server administrator that a cyber attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold.
Patent
Datagram identifier management
Charles Frank,Thomas Ludwig,Richard W. Hull,Mark Adams,Rochak Sharma,Adnan Khan,Samuel K. Baughman,Nicholas Witchey +7 more
TL;DR: In this article, the authors present a method to ensure that datagrams retain integrity in light of the problems associated with the internetworking protocol's use of datagram identifiers drawn from a first pool of dataagram identifiers.
Patent
Method and apparatus for controlling an unmanned aircraft
Donald J. Barnickel,James Gordon Beattie,Ken Liu,Farhad Barzegar,Irwin Gerszberg,Pamela A. M. Bogdan,Brandon Pimm,Thomas M. Willis,David M. Britz,Paul Shala Henry,Robert Bennett,Dorothy Zarsky +11 more
TL;DR: In this paper, a flight of a UAV is adjusted according to the second control signals received from a network device where the second controller signals are not sourced by the remote control device.
Patent
Method and system of network communication privacy between network devices
TL;DR: In this paper, a method for network communication privacy between network devices is proposed, which includes communicating first and second network enabled devices with a network, the first and the second network devices in communication via a main communication channel.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
The Bargaining Problem
TL;DR: In this paper, a new treatment is presented of a classical economic problem, one which occurs in many forms, as bargaining, bilateral monopoly, etc It may also be regarded as a nonzero-sum two-person game in which a few general assumptions are made concerning the behavior of a single individual and of a group of two individuals in certain economic environments.
An Architecture for Differentiated Service
TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Proceedings Article
Hypertext Transfer Protocol -- HTTP/1.1
Roy T. Fielding,James Gettys,Jeffrey C. Mogul,H. Frystyk,Larry Masinter,Paul J. Leach,Tim Berners-Lee +6 more
TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.