Patent classifications
H04L9/12
Multi-tenant authentication framework
Disclosed are various embodiments for a multi-tenant authentication framework. In one embodiment, a particular user class to which a client device belongs is determined based at least in part on location-identifying information of the client device, and the client device is authenticated for access to a network resource using a particular authentication service corresponding to the particular user class.
Device and method for anomaly detection in a communications network
A device and a method for anomaly detection in a communications network, at least two messages at a port of the communications network being observed, a property of a communication behavior of a network user being determined as a function of the at least two messages, a deviation of the property from an expected property being determined, and the presence of an anomaly being detected when the deviation differs from an allowable deviation. The expected property defines a communication behavior of the at least one network user as a function of an in particular static network architecture of the communications network.
Securing a group-based communication system via identity verification
Securing a group-based communication system may comprise identity verification of a user based on tracking an entity's interactions with a computing device associated with a user profile registered with the group-based communication system. The identity verification techniques may comprise capturing various inputs at a computing device associated with a user profile registered with the group-based communication system and storing and/or transmitting the inputs and/or interaction parameters quantifying features of the inputs to a security component of the group-based communication system. The security component may generate a data structure based at least in part on comparing the interaction parameters to historical interaction parameters and the data structure may be used to generate a trust score for verifying or denying the entity interacting with the computing device.
Pairing apparatus using secret key based on power line noise, method thereof
A pairing apparatus according to an exemplary embodiment of the present invention includes: a noise filtering part for filtering a noise on a power line; and a processor for pairing with a pairing target device and performing an authentication by generating a secret key using the filtered noise and by using the generated secret key.
Pairing apparatus using secret key based on power line noise, method thereof
A pairing apparatus according to an exemplary embodiment of the present invention includes: a noise filtering part for filtering a noise on a power line; and a processor for pairing with a pairing target device and performing an authentication by generating a secret key using the filtered noise and by using the generated secret key.
Modification of device behavior for use in secure networking
A modifier infrastructure that takes digital device behaviors and allows them to enact channel behaviors instead. This infrastructure preferably extends to address issues of channels connected to channels for controlling and managing identities, privileges, and the encryption and decryption of valuable information. Embodiments of the present invention provide methods for computer authentication—particularly for component authentication, human-component authentication, and/or network cryptography.
SYSTOLIC PARALLEL GALOIS HASH COMPUTING DEVICE
A computing device (e.g., an FPGA or integrated circuit) processes an incoming packet comprising data to compute a Galois hash. The computing device includes a plurality of circuits, each circuit providing a respective result used to determine the Galois hash, and each circuit including: a first multiplier configured to receive a portion of the data; a first exclusive-OR gate configured to receive an output of the first multiplier as a first input, and to provide the respective result; and a second multiplier configured to receive an output of the first exclusive-OR gate, wherein the first exclusive-OR gate is further configured to receive an output of the second multiplier as a second input. In one embodiment, the computing device further comprises a second exclusive-OR gate configured to output the Galois hash, wherein each respective result is provided as an input to the second exclusive-OR gate.
Receiver for Verification using Entangled Photons
A method of generating a verification code includes measuring a time of arrival and a corresponding first or second state value of a plurality of first photons and a plurality of second photons, where respective ones of the plurality of first photons are entangled with respective ones of a plurality of second photons in a first basis, which is time, and entangled in a second basis. A first and a second ordered list of the measured times of arrival of the plurality of respective first and second photons is generated. Time-of-arrival matches between the first ordered list and the second ordered list are determined. First or second state values that correspond to the determined time-of-arrival matches between the first ordered list and the second ordered list are determined. A verification code using some of the determined first or second state values that correspond to the determined time-of-arrival matches is generated.
System for an encoded information transmission
The invention relates to a system for transmitting encoded information over radio channels and wired communication lines, including the Internet. The system includes a transmitting side and a receiving side each comprising various software/hardware modules for generating/displaying the output/received information of the transmitting side, cryptographic calculations of the transmitting side, service information of the transmitting side, a module for generating a set key of the transmitting side, a module for generating a computed key of the transmitting/receiving side, a module of transmitting side communication channel, macroblocks for blocking computer brute-force search including at least three software/hardware modules for information encoding/cryptographic transformations, a module for random numbers generation, and modules for a degree of the setting polynomial. These modules of the transmitting and receiving sides are connected to each other within their respective sides, as well as to each other across a communication channel.
Method and apparatus for MoCA network with protected set-up
Systems and methods are disclosed for securing a network, for admitting new nodes into an existing network, and/or for securely forming a new network. As a non-limiting example, an existing node may be triggered by a user, in response to which the existing node communicates with a network coordinator node. Thereafter, if a new node attempts to enter the network, and also for example has been triggered by a user, the network coordinator may determine, based at least in part on parameters within the new node and the network coordinator, whether the new node can enter the network.