Patent classifications
H04L12/22
COMMUNICATION CONTROL APPARATUS, COMMUNICATION CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A communication control apparatus according to an aspect of the present invention downloads and acquires, from a center server on a cloud, an approval rule by an approver of upload in upload of a data file to the center server. The approval rule is stored in the center server. When any data file is uploaded to the center server, the communication control apparatus acquires approval of upload of the any data file from the approver in accordance with the acquired approval rule, and uploads the data file to the center server on condition that approval of upload of the data file has been acquired from the approver.
TRANSMISSION/RECEPTION APPARATUS OF SECURITY GATEWAY FOR PHYSICAL UNIDIRECTIONAL COMMUNICATION PERFORMING SECURITY TUNNELING AND DATA RE-TRANSMISSION, AND DATA TRANSMISSION METHOD USING SAME
The present invention provides a reception apparatus for performing security tunneling and data re-transmission and unidirectionally receiving data from a transmission apparatus and a transmission apparatus for unidirectionally transmitting data to the reception apparatus. When the reception apparatus checks that there is an error in received data, the reception apparatus performs a switching operation or transmits a switching request signal to the transmission apparatus to notify of the error of the received data to the transmission apparatus. When the transmission apparatus has detected the switching, the transmission apparatus re-transmits data, in which an error is generated, to the reception apparatus. The transmission apparatus encrypts the data and transmits the encrypted data to the reception apparatus. According to the present invention, reliability and security of one-unidirectional data communication are improved.
TRANSMISSION/RECEPTION APPARATUS OF SECURITY GATEWAY FOR PHYSICAL UNIDIRECTIONAL COMMUNICATION PERFORMING SECURITY TUNNELING AND DATA RE-TRANSMISSION, AND DATA TRANSMISSION METHOD USING SAME
The present invention provides a reception apparatus for performing security tunneling and data re-transmission and unidirectionally receiving data from a transmission apparatus and a transmission apparatus for unidirectionally transmitting data to the reception apparatus. When the reception apparatus checks that there is an error in received data, the reception apparatus performs a switching operation or transmits a switching request signal to the transmission apparatus to notify of the error of the received data to the transmission apparatus. When the transmission apparatus has detected the switching, the transmission apparatus re-transmits data, in which an error is generated, to the reception apparatus. The transmission apparatus encrypts the data and transmits the encrypted data to the reception apparatus. According to the present invention, reliability and security of one-unidirectional data communication are improved.
Near field communication for device configuration
Various embodiments include a device comprising: two connectors for powering the device; a controller to operate an HVAC system; a memory; a transponder controller and an antenna for near field communication; and a transponder memory storing a configuration version and an address list. Firmware in the transponder memory includes instructions for the controller to: connect to a handheld device; determine an address thereof; determine whether the address is on the list; if so: receive initial configuration data from the handheld device, and store it in the transponder memory. There is firmware in the device memory telling it to: connect to the transponder controller; read a device version; read the configuration version in the transponder memory; determine whether the configuration version is compatible with the device version; and if so, transfer the initial configuration data to the memory, and thereafter use the initial configuration data in operation of the system.
SYSTEM AND METHOD FOR DETECTING ATTACKS ON MOBILE AD HOC NETWORKS BASED ON NETWORK FLUX
Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations including continuously measuring time-varying signals at each node in a network. The system determines network flux on the time-varying signals of all nodes in the network and detects a network attack if the network flux exceeds a predetermined threshold. Further, a reactive protocol is initiated if the network flux exceeds the predetermined threshold.
Door tracking system and method
A locking device that can be mounted into a rotating or swinging door is disclosed. The locking device can have a deadbolt. The locking device can detect the position of the deadbolt and/or whether the door is closed. The locking device can have a camera, microphone and speaker. The locking device can send images detected by the camera and audio detected by the microphones to a remote computer.
FIREWALL PORT ACCESS RULE GENERATION
A method includes generating firewall port access rules between a first cloud system a second cloud system for each tenant of a plurality of tenants. A unique IP address range is generated for each tenant. The firewall port access rules are applied to each IP address.
Application Access Control Method and Apparatus
An application access control method and apparatus includes acquiring a graphic input by a user; generating an access strategy graphic according to the graphic, where the access strategy graphic indicates an access rule of whether at least two applications are allowed to access each other; converting the access strategy graphic into an access control strategy that can be identified by a system, where the access control strategy is used to indicate whether applications are allowed to access each other; and controlling access between the at least two applications according to the access control strategy. A graphic input by a user is acquired, and an access strategy graphic formed by the graphic is converted into an access control strategy that can be identified by a system, so as to control application access according to the access control strategy.
Application Access Control Method and Apparatus
An application access control method and apparatus includes acquiring a graphic input by a user; generating an access strategy graphic according to the graphic, where the access strategy graphic indicates an access rule of whether at least two applications are allowed to access each other; converting the access strategy graphic into an access control strategy that can be identified by a system, where the access control strategy is used to indicate whether applications are allowed to access each other; and controlling access between the at least two applications according to the access control strategy. A graphic input by a user is acquired, and an access strategy graphic formed by the graphic is converted into an access control strategy that can be identified by a system, so as to control application access according to the access control strategy.
Trust service for a client device
Techniques for a trust service for a client device are described. In various implementations, a trust service is implemented remotely from a client device and provides various trust-related functions to the client device. According to various implementations, communication between a client device and a remote trust service is authenticated by a client identifier (ID) that is maintained by both the client device and the remote trust service. In at least some implementations, the client ID is stored on a location of the client device that is protected from access by (e.g., is inaccessible to) device components such as an operating system, applications, and so forth. Thus, the client ID may be utilized to generate signatures to authenticate communications between the client device and the remote trust service.