Patent
Agile network protocol for secure communications with assured system availability
Reads0
Chats0
TLDR
In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.Abstract:
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.read more
Citations
More filters
Patent
Empirical scheduling of network packets using a plurality of test packets
TL;DR: In this paper, the authors propose a method for zeroing in on congested network periods by detecting differences in packet latencies among test packets, where the second plurality of time locations are selected on the basis of favorable network traffic conditions.
Patent
Resynchronization for push message security using secret keys
TL;DR: In this article, a method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided, where the server provides the access terminal with a secret key that is only known to the access terminals and the server.
Patent
System and method for partner key management
Glenn Benson,Sean Croston +1 more
TL;DR: The Partner Key Management (PKM) protocol as mentioned in this paper provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization.
Patent
Fast dynamic measurement of connection bandwidth using a pair of packets, a packet-pair bandwidth calculation and a list of recent bandwidth measurements
TL;DR: In this article, the authors proposed a fast dynamic measurement of connection bandwidth utilizing a single pair of packets to calculate bandwidth between two entities on a network (such as the Internet) based upon the packet-pair technique.
Patent
Forwarding packets and PE devices in VPLS
TL;DR: In this article, a method for a first provider edge (PE) device to forward packets in a virtual private local area network service (VPLS) network is provided, where the first PE device receives a unicast packet on a first AC, which is associated with a first virtual switch instance (VSI) on the first PC device.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
The Bargaining Problem
TL;DR: In this paper, a new treatment is presented of a classical economic problem, one which occurs in many forms, as bargaining, bilateral monopoly, etc It may also be regarded as a nonzero-sum two-person game in which a few general assumptions are made concerning the behavior of a single individual and of a group of two individuals in certain economic environments.
An Architecture for Differentiated Service
TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Proceedings Article
Hypertext Transfer Protocol -- HTTP/1.1
Roy T. Fielding,James Gettys,Jeffrey C. Mogul,H. Frystyk,Larry Masinter,Paul J. Leach,Tim Berners-Lee +6 more
TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.