scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Patent
25 May 2016
TL;DR: In this article, a method and a device for recognizing a pseudo-WiFi network by a wireless terminal is presented, which comprises the following steps: whether four handshake packets appear in the current network communication data packet is monitored; if yes, at least one following step or a step combination is executed, if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network; and after the Wi-Fi network is accessed, a first route arriving at a specified IP address is acquired, whether the first route is consistent with a second route arriving
Abstract: The invention relates to the wireless network field, and discloses a method and a device for recognizing a pseudo WiFi network by a wireless terminal. The method comprises the following steps: whether four handshake packets appear in the current network communication data packet is monitored; if yes, at least one following step or a step combination is executed: A, whether the handshake information in the four handshake packets is consistent with the handshake information used when the WiFi network is accessed last time, if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network; and B, after the WiFi network is accessed, a first route arriving at a specified IP address is acquired, whether the first route is consistent with a second route arriving at the specified IP address when the WiFi network is accessed last time is judged, and if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network. A more precise recognition method is given to the pseudo WiFi network, and error judgment and missed judgment can be reduced.

8 citations

Patent
29 Oct 2013
TL;DR: In this paper, the authors propose a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors in a system for securely authenticating software application program interfaces (APIs).
Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.

8 citations

Patent
Antti Mäkelä1
07 Jun 2006
TL;DR: In this paper, the client terminals agree on establishing a mutual TCP connection by sending a message, which indicates port numbers to be used on said connection, and the raw socket based acknowledgement message is sent to the opposite client terminal for completing the establishment of the TCP connection.
Abstract: A method for establishing a TCP connection between two client terminals protected by stateful firewalls and comprising means for sending messages to each other via a messaging server. The client terminals agree on establishing a mutual TCP connection by sending a message, which indicates port numbers to be used on said connection. A TCP connection establishment procedure is started in both client terminals. After sending a first handshake message, a message indicating a sequence number of the first handshake message is sent from both client terminals to each other. When the firewalls of the opposite client terminals reject the first handshake message, an acknowledgement message to the first handshake message is created in both client terminals using a raw socket, which acknowledgement message includes the received sequence number as an acknowledgement number. Finally, the raw socket based acknowledgement message is sent to the opposite client terminal for completing the establishment of the TCP connection.

8 citations

Patent
30 Sep 2014
TL;DR: In this paper, an apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia contents in the one or multiple transactions, which can be used for at least one of optimizing or reporting of the multimedia content before providing it to the specific terminal.
Abstract: An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or more transactions. The apparatus can include a traffic processor configured to acquire one or more handshake messages associated with the transactions. The apparatus can also include a multimedia detector configured to determine a domain name requested by a specific terminal based on the one or more handshake messages, and to detect the presence of the multimedia content data in the transactions using the determined domain name. The detection of the presence of the multimedia content can be used for at least one of optimizing or reporting of the multimedia content before the multimedia content is provided to the specific terminal.

8 citations

Patent
02 Jul 2014
TL;DR: In this article, a mobile terminal authentication method, a service access method and equipment is described. But the authentication scheme is based on the first authentication handshake, where a communication key is generated by the security gateway and sent to the mobile terminal.
Abstract: The invention discloses a mobile terminal authentication method, a service access method and equipment. During the process when a mobile terminal and a security gateway carry out the first authentication handshake, a communication key is generated by the security gateway, the communication key is encrypted and sent to the mobile terminal, the mobile terminal carries out decryption and acquires the communication key, the communication key is used for carrying out encryption on the second handshake request, the security gateway uses the communication key to carry out decryption authentication on the second handshake request, and authentication security is ensured. According to the above authentication scheme, the user only needs one interaction, the whole authentication can be finished even without interaction, operations such as preregistration, manual login information filling or manual verification code filling can be omitted, and convenience of mobile terminal authentication can be enhanced.

8 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877