H04L12/22

Digital signature terminal and secure communication method
12041179 · 2024-07-16 · ·

A digital signature terminal device and a secure communication method are provided. The digital signature terminal includes a first module and a second module. The first module includes a communication component configured to communicate with outside and includes a central unit. The central unit includes a memory configured to store data received by the communication component. The central unit is configured to receive an operation from a user, and is controlled, in response to the operation from the user, to be simultaneously connected to the second module and disconnected from the communication component or to be simultaneously disconnected from the second module and connected to the communication component. The second module includes a signature component configured to generate a digital signature for the data, and the second module is configured to send the digital signature to the memory.

System and method for detecting attacks on mobile ad hoc networks based on network flux
10187404 · 2019-01-22 · ·

Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations including continuously measuring time-varying signals at each node in a network. The system determines network flux on the time-varying signals of all nodes in the network and detects a network attack if the network flux exceeds a predetermined threshold. Further, a reactive protocol is initiated if the network flux exceeds the predetermined threshold.

System and method for detecting attacks on mobile ad hoc networks based on network flux
10187404 · 2019-01-22 · ·

Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations including continuously measuring time-varying signals at each node in a network. The system determines network flux on the time-varying signals of all nodes in the network and detects a network attack if the network flux exceeds a predetermined threshold. Further, a reactive protocol is initiated if the network flux exceeds the predetermined threshold.

CONFIRMATION MESSAGE DETERMINATIONS
20190018971 · 2019-01-17 ·

An example technique involves sending, from a user device associated with a particular user, a request for a confirmation message setting. The request may include an indication of an identity of the particular user. The example technique involves determining that an operation included in a predetermined set of operations has been cued. The example technique involves receiving a response comprising an indication of a confirmation message setting for the cued operation prior to performing the cued operation. The confirmation message setting may be based on data generated responsive to the sent request. The confirmation message setting for the cued operation may include an indication of whether or not to output a confirmation message. The example technique involves determining, based on the received response, whether to prompt the particular user via a user interface of the user device for a response to a confirmation message prior to performing the cued operation.

PREVENTING MALWARE DOWNLOADS
20180373875 · 2018-12-27 ·

An example embodiment of the present techniques determines, in response to a byte-serving request to download a portion of a resource, that the resource has previously been determined to comprise malware. Further, the byte-serving request is modified to request downloading all the resource. Additionally, all the resource is requested for downloading using the modified byte-serving request.

APPARATUS, SYSTEM, AND METHOD OF PREVENTING FORGERY OR FALSIFICATION OF ELECTRONIC DOCUMENT BASED ON CONTENT
20180349567 · 2018-12-06 · ·

The present invention includes: an electronic document receiving unit receiving an original electronic document; a text information extracting unit extracting text and text location information by analyzing content of the original electronic document; an image information extracting unit extracting an image and image location information by analyzing the content; a verification data generating unit generating original forgery falsification verification data by using at least one of the text and the text location information, the image and the image location information; and a secure electronic document generating unit generating a secure original electronic document after encrypting and inserting the original forgery falsification verification data in a preset position of the original electronic document. According to the present invention, a location of forged or falsified content can be indicated and identified with integrity verification of an electronic document file, whereby forgery or falsification can be effectively prevented.

HANDLING NETWORK THREATS

Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.

Filtering system, management device, filtering method and management program
10135787 · 2018-11-20 · ·

The present invention prevents all of the filter rules from leaking and the filter functions of an entire network from stopping, even if problems arise in a filter device, etc. performing filtering. A management device of a filtering system, which includes a plurality of devices which perform filtering of communication data based on filter rules, and a management device which manages the filter rules, in a case of a first of the devices that is connected to an external network not through another of the devices having entered a predetermined state, reconstructs decentralized filter rules set in the first of the devices based on a plurality of decentralized filter rules received from a plurality of second of the devices connected to an external network via the first of the devices, and sets the decentralized filter rules thus reconstructed in the plurality of second devices, in which the decentralized filter rules are decentralized to be able to reconstruct the filter rules without using all of the decentralized filter rules.

Information Display Regarding Playback Queue Subscriptions
20180321897 · 2018-11-08 ·

An example non-transitory computer-readable medium stores instructions that, when executed by a control device, cause the control device to perform functions. The functions comprise configuring a first playback device associated with a first user-account to (i) play media content from a playback queue comprising one or more audio tracks stored at a network location and (ii) enable one or more other user-accounts associated with other playback devices to subscribe to the playback queue. The functions further comprise receiving an indication that a second user-account associated with a second playback device has subscribed to the playback queue. The functions further comprise in response to receiving the indication, displaying a subscriber indicator on the control device showing that the second user-account has subscribed to the playback queue. An example control device and an example method, both related to the example non-transitory computer-readable medium, are also disclosed herein.

SDN CONTROLLER ASSISTED INTRUSION PREVENTION SYSTEMS
20180309781 · 2018-10-25 ·

In example implementations, a method is disclosed for a software defined network (SDN) controller assisting an intrusion prevention system (IPS). The method includes receiving an indication that a malicious packet has been detected by an IPS in a communication network. A list of source nodes that have a source Internet protocol (IP) address that matches a source IP address of the malicious packet is determined. A virtual local area network identification (VLAN ID) associated with a source node of the list of source nodes that sent the malicious packet is determined. The SDN controller may instruct an edge switch to block additional packets from the source node of the list of source nodes having the VLAN ID.