LOCATION BASED TECHNIQUE FOR DETECTING DEVICES EMPLOYING MULTIPLE ADDRESSES
    3.
    发明申请
    LOCATION BASED TECHNIQUE FOR DETECTING DEVICES EMPLOYING MULTIPLE ADDRESSES 有权
    用于检测使用多个地址的设备的基于位置的技术

    公开(公告)号:US20150042792A1

    公开(公告)日:2015-02-12

    申请号:US13961991

    申请日:2013-08-08

    Abstract: In an example embodiment, there is described herein a location based detection technique that determines whether multiple requests from different addresses, such as a Layer 2 MAC (Media Access Control) address and/or layer 3 IP (Internet Protocol) address are being sent form a single device. In particular embodiments, if the device sends more than a predefined threshold number of requests, those requests can be ignored and/or denied.

    Abstract translation: 在示例实施例中,这里描述了基于位置的检测技术,其确定是否正在从诸如第2层MAC(媒体访问控制)地址和/或第3层IP(因特网协议)地址的不同地址的多个请求形式 单一设备。 在特定实施例中,如果设备发送超过预定义的阈值数量的请求,则可以忽略和/或拒绝那些请求。

    SYSTEM AND METHOD FOR PROVISIONING AND AUTHENTICATING VIA A NETWORK
    4.
    发明申请
    SYSTEM AND METHOD FOR PROVISIONING AND AUTHENTICATING VIA A NETWORK 审中-公开
    用于通过网络提供和认证的系统和方法

    公开(公告)号:US20140237247A1

    公开(公告)日:2014-08-21

    申请号:US14263148

    申请日:2014-04-28

    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.

    Abstract translation: 提供了用于通过网络(例如IEEE 802.11)保护通信的系统架构和相应的方法。 根据一个实施例,本系统和方法协议可以被适当地配置为通过使用共享秘密来建立用于保护较弱认证方法(例如,用户名和密码)的隧道来实现相互认证。 在本实施例中被称为受保护的访问凭证的共享秘密可以有利地用于在保护用于经由网络进行通信的隧道的相互认证服务器和对等体之间。 在本文中公开和要求保护的本系统和方法在其一个方面包括以下步骤:1)提供第一方和第二方之间的通信实现; 2)在第一方和第二方之间提供安全证书; 以及3)使用安全证书在第一方和第二方之间建立安全隧道。

Patent Agency Ranking