Abstract:
Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection.
Abstract:
Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is configured to receive an inquiry from the client regarding a universal resource locator (URL) request and, based on a policy obtained from the policy database, cause the client to control the remote device such that network traffic associated with the URL request is routed (tunneled) via a particular interface, e.g., a virtual private network (VPN) connection, when so required by the policy, and network traffic associated with the URL request is routed over a different VPN connection or a non-VPN connection when so required by the policy.
Abstract:
Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection.
Abstract:
A passive transponder may be encoded with a number or code of up to 64 binary bits and then associated with or mounted to virtually any living tissue implant for implantation in a human. After implantation, the transponder's code may be conveniently read with a hand held electromagnetic reader which may merely be brought within proximity of the transponder. The encoded transponder may thus be read in a non-invasive procedure and without the use of any sophisticated or potentially harmful medical equipment or technology such as X-ray. The information encoded in the transponder may correspond to patient demographics and implant data to aid in tracking the implant's progress and use for medical as well as legal reasons.
Abstract:
A passive transponder may be encoded with a number or code of up to 64 binary bits and then associated with or mounted to virtually any living tissue implant for implantation in a human. After implantation, the transponder's code may be conveniently read with a hand held electromagnetic reader which may merely be brought within proximity of the transponder. The encoded transponder may thus be read in a non-invasive procedure and without the use of any sophisticated or potentially harmful medical equipment or technology such as X-ray. The information encoded in the transponder may correspond to patient demographics and implant data to aid in tracking the implant's progress and use for medical as well as legal reasons.
Abstract:
Digital data, such as images on a digital camera, is typically protected (e.g., encrypted and/or authenticated) based on a master key stored off the device. The original master key can be acquired in a number of different ways, including being generated by the device or by another device. A one-way, progressive series of keys are derived from the master key such that only images or data of a same session can be authenticated or decrypted for viewing, export or manipulation of the decrypted image/data. In order to decrypt images or data of a previous session on the device, the master key must be imported to the device, such as by, but not limited to, taking a picture of a representation of the key and interpreting the image to reacquire the master key.
Abstract:
Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is configured to receive an inquiry from the client regarding a universal resource locator (URL) request and, based on a policy obtained from the policy database, cause the client to control the remote device such that network traffic associated with the URL request is routed (tunneled) via a particular interface, e.g., a virtual private network (VPN) connection, when so required by the policy, and network traffic associated with the URL request is routed over a different VPN connection or a non-VPN connection when so required by the policy.
Abstract:
In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.
Abstract:
In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.
Abstract:
Digital data, such as images on a digital camera, is typically protected (e.g., encrypted and/or authenticated) based on a master key stored off the device. The original master key can be acquired in a number of different ways, including being generated by the device or by another device. A one-way, progressive series of keys are derived from the master key such that only images or data of a same session can be authenticated or decrypted for viewing, export or manipulation of the decrypted image/data. In order to decrypt images or data of a previous session on the device, the master key must be imported to the device, such as by, but not limited to, taking a picture of a representation of the key and interpreting the image to reacquire the master key.