Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
•
25 May 2016
TL;DR: In this article, a method and a device for recognizing a pseudo-WiFi network by a wireless terminal is presented, which comprises the following steps: whether four handshake packets appear in the current network communication data packet is monitored; if yes, at least one following step or a step combination is executed, if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network; and after the Wi-Fi network is accessed, a first route arriving at a specified IP address is acquired, whether the first route is consistent with a second route arriving
Abstract: The invention relates to the wireless network field, and discloses a method and a device for recognizing a pseudo WiFi network by a wireless terminal. The method comprises the following steps: whether four handshake packets appear in the current network communication data packet is monitored; if yes, at least one following step or a step combination is executed: A, whether the handshake information in the four handshake packets is consistent with the handshake information used when the WiFi network is accessed last time, if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network; and B, after the WiFi network is accessed, a first route arriving at a specified IP address is acquired, whether the first route is consistent with a second route arriving at the specified IP address when the WiFi network is accessed last time is judged, and if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network. A more precise recognition method is given to the pseudo WiFi network, and error judgment and missed judgment can be reduced.
8 citations
•
29 Oct 2013TL;DR: In this paper, the authors propose a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors in a system for securely authenticating software application program interfaces (APIs).
Abstract: A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that enables promulgation of licensing rights controlling Intellectual Property (IP) to multiple Actors. The handshake is a Challenge-Response protocol that includes a Challenge issued by one Actor who controls IP rights to verify a second Actor has Licensed IP rights when the second Actor Response includes use of a function IPF1. The function e.g. IPF1 is provided through the IP licensing agreement. Other Actors who wish to use software that the first Actor provides will be encouraged to acquire rights to the IP License to obtain the function IPF1 for access. Subsequent Actors who have IP rights controlled by another function IPF2 can be pulled into the same IP Licensing system, or another IP License that becomes part of the same ecosystem with the system controlled using function IPF1.
8 citations
•
07 Jun 2006TL;DR: In this paper, the client terminals agree on establishing a mutual TCP connection by sending a message, which indicates port numbers to be used on said connection, and the raw socket based acknowledgement message is sent to the opposite client terminal for completing the establishment of the TCP connection.
Abstract: A method for establishing a TCP connection between two client terminals protected by stateful firewalls and comprising means for sending messages to each other via a messaging server. The client terminals agree on establishing a mutual TCP connection by sending a message, which indicates port numbers to be used on said connection. A TCP connection establishment procedure is started in both client terminals. After sending a first handshake message, a message indicating a sequence number of the first handshake message is sent from both client terminals to each other. When the firewalls of the opposite client terminals reject the first handshake message, an acknowledgement message to the first handshake message is created in both client terminals using a raw socket, which acknowledgement message includes the received sequence number as an acknowledgement number. Finally, the raw socket based acknowledgement message is sent to the opposite client terminal for completing the establishment of the TCP connection.
8 citations
•
30 Sep 2014
TL;DR: In this paper, an apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia contents in the one or multiple transactions, which can be used for at least one of optimizing or reporting of the multimedia content before providing it to the specific terminal.
Abstract: An apparatus is provided for detecting the presence of multimedia content in one or more transactions and for classifying the multimedia content in the one or more transactions. The apparatus can include a traffic processor configured to acquire one or more handshake messages associated with the transactions. The apparatus can also include a multimedia detector configured to determine a domain name requested by a specific terminal based on the one or more handshake messages, and to detect the presence of the multimedia content data in the transactions using the determined domain name. The detection of the presence of the multimedia content can be used for at least one of optimizing or reporting of the multimedia content before the multimedia content is provided to the specific terminal.
8 citations
•
02 Jul 2014
TL;DR: In this article, a mobile terminal authentication method, a service access method and equipment is described. But the authentication scheme is based on the first authentication handshake, where a communication key is generated by the security gateway and sent to the mobile terminal.
Abstract: The invention discloses a mobile terminal authentication method, a service access method and equipment. During the process when a mobile terminal and a security gateway carry out the first authentication handshake, a communication key is generated by the security gateway, the communication key is encrypted and sent to the mobile terminal, the mobile terminal carries out decryption and acquires the communication key, the communication key is used for carrying out encryption on the second handshake request, the security gateway uses the communication key to carry out decryption authentication on the second handshake request, and authentication security is ensured. According to the above authentication scheme, the user only needs one interaction, the whole authentication can be finished even without interaction, operations such as preregistration, manual login information filling or manual verification code filling can be omitted, and convenience of mobile terminal authentication can be enhanced.
8 citations