Abstract:
A beacon device including directional transmission means transmits a challenge message in a first predetermined direction to each of one or more responder devices over a respective direct radio communication link, to invite the responder devices to each transmit a respective response message indicating knowledge of contents of the challenge message. The beacon device transmits one or more directed repetitions of the challenge message in one or more respective further predetermined directions such that data relating to the location of each of the responder devices can be inferred from timings of each response message with respect to times the challenge message and the directed repetitions of the challenge message were transmitted. The beacon device either engages in or eschews subsequent two-way communication with each of the one or more responder devices over the respective direct radio communication link, in dependence on the existence and timing of a respective response message.
Abstract:
A beacon device transmits a challenge message to each of one or more responder devices over a respective direct communication link, inviting each responder device to prove the existence of its respective direct communication link by transmitting to a respective recipient device, distinct from the beacon device, a respective response message indicating knowledge of contents of the challenge message. A predetermined time period after its transmission of the challenge message, the beacon device transmits a confirmation message indicating knowledge of the contents of the challenge message to a message store. A validation device then compares contents of each response message which preceded the confirmation message in time, if any, to contents of the confirmation message and infers therefrom which of the respective responder devices, if any, received the challenge message over the respective direct communication link.
Abstract:
A network device detecting possible malicious traffic and enlists the help of a co-operative group of downstream routers to perform enhanced deep packet analysis and firewalling in parallel with the transport of the packet through the network. The routers may also use other remote computational resource to perform some of the analysis along or close to the route 80 of the packet through the network. The packets are cached at the exit edge router, which does not release the packet from the cooperative group until all analyzers report the traffic is safe, or deletes the traffic if identified as malicious. By buffering at the remote end the packet can be forwarded promptly if approved, but protects downstream components if the traffic is malicious. Routing policies through the network are chosen according to initial estimates of the likelihood that a packet will be permitted to be forwarded from the downstream router, and of the time likely to be taken to reach a decision, allowing cache capacity requirements to be minimized by using higher-latency routes for packets unlikely to be forwarded promptly.
Abstract:
An optical network comprising: an optical splitter configured to split an optical signal incident on the optical splitter into at least a control signal and a data signal; an optical switch; a first optical path configured to carry the control signal between the optical splitter and the optical switch; and a second optical path configured to carry the data signal between the optical splitter and the optical switch. The optical network is configured to transmit the control and data signals such that the data signal is incident on the optical switch after the control signal. The optical switch is configured to selectively switch the optical network between a first configuration and a second configuration in accordance with the control signal. The application also relates to a method of configuring an optical network.
Abstract:
An apparatus according to the present invention comprises a chamber into which carbon nanotubes dispersed in a non-polar solvent may be received. The nanotubes are impelled along the chamber by the application of an external electrical field and will pass through a charging element that imposes an electrical charge on the nanotubes, and a template (180), such that the nanotubes are deposited on a substrate located next to the template. The substrate may be moved relative to the template such that the nanotubes are deposited on the substrate in a predetermined selective manner.
Abstract:
An authentication method using a plurality of physical unclonable functions (PUFs). The plurality of PUFs includes a first PUF associated with a first device and a second PUF associated with a second device. A surface pattern of the first PUF corresponds to a surface pattern of the second PUF. The method includes obtaining a first response to a challenge using the first PUF, sending a request to the second device for a second response to the challenge obtained used the second PUF, receiving the second response, and determining whether the second device is authenticated based on a comparison between the first response and the second response.
Abstract:
There is herein provided a method of quantum communication, the method comprising: indicating to a quantum receiving apparatus that a first sequence of mutually non-orthogonal bases will be used to prepare at least some of a plurality of bits in quantum states, at a quantum transmitting apparatus, preparing each of the plurality of bits in a respective one of a second sequence of mutually non-orthogonal bases, to give a plurality of qubits, wherein the second sequence of mutually non-orthogonal bases is different to the first sequence of mutually non-orthogonal bases.