Patent
Agile network protocol for secure communications with assured system availability
Reads0
Chats0
TLDR
In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.Abstract:
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.read more
Citations
More filters
Patent
Digital object routing based on a service request
Shabbir Khan,Alexander Cohen +1 more
TL;DR: In this paper, a digital object may be routed via a network based in part on a requested service, and/or on the ability of an intermediate node to provide the requested service.
Patent
Increasing peer privacy
Zhichen Xu,Li Xiao +1 more
TL;DR: In this article, a path for information is formed from a provider to a requestor through a plurality of peers in response to a received request for the information, where each peer of the plurality receives a respective set-up message comprising of a predetermined label and an identity of a next peer.
Patent
Secure communication protocol
TL;DR: In this article, the authors propose a method of establishing secure communication, which may include: generating a first symmetric key, encrypting at least the first asymmetric key according to a public key, sending a first message that includes at least encrypted first symmeter key to a communication counterpart using a connectionless protocol; and receiving, as part of a connection-oriented protocol first session, a second message that including an acknowledgement encrypted via the first symmetype key.
Patent
Methods and Systems for Network Attack Detection and Prevention Through Redirection
TL;DR: In this article, a directory service can respond to requests for the address of a resource by returning an address that can be relocated over time by coordinating the directory service entry with the host and network address configuration data.
Patent
Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
TL;DR: In this article, the authors present an architecture for optimizing signaling for arbitrary proprietary and non-proprietary protocols, where the local proxy observes and identifies patterns within the byte stream, without being aware of the underlying protocol.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
The Bargaining Problem
TL;DR: In this paper, a new treatment is presented of a classical economic problem, one which occurs in many forms, as bargaining, bilateral monopoly, etc It may also be regarded as a nonzero-sum two-person game in which a few general assumptions are made concerning the behavior of a single individual and of a group of two individuals in certain economic environments.
An Architecture for Differentiated Service
TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Proceedings Article
Hypertext Transfer Protocol -- HTTP/1.1
Roy T. Fielding,James Gettys,Jeffrey C. Mogul,H. Frystyk,Larry Masinter,Paul J. Leach,Tim Berners-Lee +6 more
TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.