scispace - formally typeset
Patent

Agile network protocol for secure communications with assured system availability

Reads0
Chats0
TLDR
In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.
Abstract
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.

read more

Citations
More filters
Patent

Digital object routing based on a service request

TL;DR: In this paper, a digital object may be routed via a network based in part on a requested service, and/or on the ability of an intermediate node to provide the requested service.
Patent

Increasing peer privacy

TL;DR: In this article, a path for information is formed from a provider to a requestor through a plurality of peers in response to a received request for the information, where each peer of the plurality receives a respective set-up message comprising of a predetermined label and an identity of a next peer.
Patent

Secure communication protocol

TL;DR: In this article, the authors propose a method of establishing secure communication, which may include: generating a first symmetric key, encrypting at least the first asymmetric key according to a public key, sending a first message that includes at least encrypted first symmeter key to a communication counterpart using a connectionless protocol; and receiving, as part of a connection-oriented protocol first session, a second message that including an acknowledgement encrypted via the first symmetype key.
Patent

Methods and Systems for Network Attack Detection and Prevention Through Redirection

TL;DR: In this article, a directory service can respond to requests for the address of a resource by returning an address that can be relocated over time by coordinating the directory service entry with the host and network address configuration data.
Patent

Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols

Ari Backholm
TL;DR: In this article, the authors present an architecture for optimizing signaling for arbitrary proprietary and non-proprietary protocols, where the local proxy observes and identifies patterns within the byte stream, without being aware of the underlying protocol.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

The Bargaining Problem

John F. Nash
- 01 Apr 1950 - 
TL;DR: In this paper, a new treatment is presented of a classical economic problem, one which occurs in many forms, as bargaining, bilateral monopoly, etc It may also be regarded as a nonzero-sum two-person game in which a few general assumptions are made concerning the behavior of a single individual and of a group of two individuals in certain economic environments.

An Architecture for Differentiated Service

TL;DR: An architecture for implementing scalable service differentiation in the Internet achieves scalability by aggregating traffic classification state which is conveyed by means of IP-layer packet marking using the DS field [DSFIELD].
Proceedings Article

Hypertext Transfer Protocol -- HTTP/1.1

TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.