Patent classifications
H04W12/102
OBSCURED ROUTING
Systems and techniques are provided for obscured routing. A computing device may send stacks of identifiers to neighbor computing devices in a network. Each stack of identifiers may include a unique identifier for the neighbor computing device to which it is sent. The computing device may send a notification identifying a destination computing device to the neighbor computing devices. The computing device may receive stacks of identifiers from the neighbor computing devices. The received stacks of identifiers may include completed routes to the destination computing device. Each completed route may be specified by unique identifiers added to the stack of identifiers by computing devices in the network. A unique identifier in each stack of identifiers may not be resolvable to an address by the computing device. The computing device may send a message a neighbor computing device based on a unique identifier in a chosen stack of identifiers.
SYSTEM FOR IMPLEMENTING DYMANIC NETWORK CHANNEL SWITCHING FOR SECURE COMMUNICATION
Systems, computer program products, and methods are described herein for implementing dynamic network channel switching for secure communication. The present invention is configured to receive, from a first user input device, a resource transfer request via a first communication channel; determine, using a secure channel monitoring engine, that the first communication channel does not meet one or more preset channel requirements for secure communication; determine a second communication channel associated with a second user input device, wherein the second user input device is within a preset geographic radius of the first user input device, wherein the second user input device is associated with the resource distribution platform; trigger, via the second communication channel, the second user input device to establish a communication link with the first user input device to form an alternate communication channel; and execute, via the alternate communication channel, the resource transfer request.
SYSTEM FOR IMPLEMENTING DYMANIC NETWORK CHANNEL SWITCHING FOR SECURE COMMUNICATION
Systems, computer program products, and methods are described herein for implementing dynamic network channel switching for secure communication. The present invention is configured to receive, from a first user input device, a resource transfer request via a first communication channel; determine, using a secure channel monitoring engine, that the first communication channel does not meet one or more preset channel requirements for secure communication; determine a second communication channel associated with a second user input device, wherein the second user input device is within a preset geographic radius of the first user input device, wherein the second user input device is associated with the resource distribution platform; trigger, via the second communication channel, the second user input device to establish a communication link with the first user input device to form an alternate communication channel; and execute, via the alternate communication channel, the resource transfer request.
COMMUNICATION MONITORING DEVICE AND COMMUNICATION MONITORING METHOD
In order to monitor communication by a frame column performed among electronic controllers, a communication monitoring device determines some or all of fields configuring a frame as an object section, extracts the object section as an attention section from the frame received from an in-vehicle network, and verifies validity of the received frame based on the attention section.
COMMUNICATION MONITORING DEVICE AND COMMUNICATION MONITORING METHOD
In order to monitor communication by a frame column performed among electronic controllers, a communication monitoring device determines some or all of fields configuring a frame as an object section, extracts the object section as an attention section from the frame received from an in-vehicle network, and verifies validity of the received frame based on the attention section.
Attack mitigation in a packet-switched network
The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
Spatial physical layer security in wireless communication systems
Certain aspects of the present disclosure provide techniques for wireless communication by a first wireless device. The first wireless device may participate in a beam forming procedure with a second wireless device to evaluate a plurality of transmit (TX) and receive (RX) beam pairs. The first wireless device may select one of the TX and RX beam pairs based on the evaluation. The first wireless device may determine at least one cryptographic key based on channel parameters associated with a selected one of the TX and RX beam pairs. The first wireless device may use the at least one cryptographic key for communications with the second wireless device.
Spatial physical layer security in wireless communication systems
Certain aspects of the present disclosure provide techniques for wireless communication by a first wireless device. The first wireless device may participate in a beam forming procedure with a second wireless device to evaluate a plurality of transmit (TX) and receive (RX) beam pairs. The first wireless device may select one of the TX and RX beam pairs based on the evaluation. The first wireless device may determine at least one cryptographic key based on channel parameters associated with a selected one of the TX and RX beam pairs. The first wireless device may use the at least one cryptographic key for communications with the second wireless device.
Wireless Projecting Control Method and Wireless Projecting Control System Capable of Providing High Data Transmission Security According to Various Authority Levels
A wireless projecting control method includes setting at least one operation restriction, communicating a transmitter with a receiver or a communication device for executing at least one restricted operation by the transmitter or the receiver, and selectively or restrictedly projecting an image signal to a display device by the receiver after the transmitter or the receiver executes the at least one restricted operation. The image signal is generated by the communication device. The transmitter is used for transmitting the image signal to the receiver according to the at least one operation restriction.
Electronic device for transmitting/receiving data and method thereof
An electronic device is provided. The electronic device includes a near-field communication (NFC) communication circuit, an ultra-wideband (UWB) communication circuit connected with the NFC communication circuit, at least one secure element operatively connected with the NFC communication circuit and configured to store security information, and a processor disposed in the NFC communication circuit and operatively connected with the UWB communication circuit, wherein the processor is configured to receive a data request from an external electronic device via the UWB communication circuit, access at least part of the security information stored in the at least one secure element, based on a routing table matching the data request with the at least one secure element, and transmit the at least part of the security information to the external electronic device via the UWB communication circuit.