Abstract:
A method for accessing a wireless railroad data network (25) includes sensing presence of a rail vehicle on a rail track (12). Determination of rail vehicle presence is used as a primary authentication mechanism to permit temporary access to the wireless railroad data network (25) based on sensed presence of the rail vehicle on the rail track (12). The rail vehicle is permitted temporary access to the wireless railroad data network (25) based on sensed presence and authentication of the rail vehicle.
Abstract:
A computer implemented method for wireless communications access security, the method comprising: measuring at least one parameter during a wireless communication with an active access point, calculating at least one indicator from the measured parameter(s), and determining a threat indication by applying a threat evaluation function on the calculated indicator(s).
Abstract:
A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context.
Abstract:
System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.
Abstract:
Systems, methods, and/or techniques for mitigating attacks on an IoT device at a gateway device may be provided. The gateway device may receive a communication directed to an Internet of Things (IoT) device and forward it to the IoT device. The IoT device may indicate to the gateway device that the communication is associated with an attack and send the gateway device a sleep time period and a request to change a filtering rule set at the gateway device. The gateway device may change the filtering rule set and receive another communication directed to the IoT device. If the another communication is valid based on the filtering rule set with the change and a number of valid packets is less than a threshold, and the sleep time period has expired, the gateway device may send another communication to the IoT device.
Abstract:
In one embodiment, a method includes: receiving, in a first device of a first segment of a first network, a root seed from a second device; generating a pseudo-random seed tree using the root seed; according to a predetermined schedule, accessing at a first time a random number at a level of the pseudo-random seed tree associated with the first time; generating a rendezvous point record to enable communication with a third device in a second segment of the first network, the rendezvous point record including a rendezvous point name based on the random number; and encrypting and sending a message to the third device via an exchange server identified using the rendezvous point record, where the rendezvous point record does not include connection metadata and the exchange server has an anonymous network location.
Abstract:
Disclosed are an access authentication method and device for a WLAN hotspot. The method comprises: an access password of a WLAN hotspot is updated according to a preset update time interval; and access for a wireless workstation which is accessing to the WLAN hotspot through a soft AP is authenticated according to the updated access password. The present invention can solve the problem in the related art that other users can use traffic without limitation once they have stolen the password which causes great damage to users who pay the bill because the access password of the WLAN hotspot can only be manually updated.
Abstract:
A method for accessing a wireless railroad data network (25) includes sensing presence of a rail vehicle on a rail track (12). Determination of rail vehicle presence is used as a primary authentication mechanism to permit temporary access to the wireless railroad data network (25) based on sensed presence of the rail vehicle on the rail track (12). The rail vehicle is permitted temporary access to the wireless railroad data network (25) based on sensed presence and authentication of the rail vehicle.