-
公开(公告)号:US20240236042A1
公开(公告)日:2024-07-11
申请号:US18610074
申请日:2024-03-19
Applicant: Parallel Wireless, Inc.
Inventor: Ayan Chattopadhyay , Vikram Menon
CPC classification number: H04L63/0236 , H04L9/0643 , H04L63/029 , H04L63/0485
Abstract: A method and computer readable software for providing randomized Security Parameter Index (SPI) for distributed Internet Protocol security (IPsec) are disclosed. In one embodiment a method includes designating each IPsec node with a unique node identifier, the IPsec node; performing a hash function on a random SPI to provide a randomized SPI; and assigning the randomized SPI to an IPsec tunnel associated with an IPsec node.
-
公开(公告)号:US11936620B2
公开(公告)日:2024-03-19
申请号:US17080836
申请日:2020-10-26
Applicant: Parallel Wireless, Inc.
Inventor: Ayan Chattopadhyay , Vikram Menon
CPC classification number: H04L63/0236 , H04L9/0643 , H04L63/029 , H04L63/0485
Abstract: A method and computer readable software for providing randomized Security Parameter Index (SPI) for distributed Internet Protocol security (IPsec) are disclosed. In one embodiment a method includes designating each IPsec node with a unique node identifier, the IPsec node; performing a hash function on a random SPI to provide a randomized SPI; and assigning the randomized SPI to an IPsec tunnel associated with an IPsec node.
-
公开(公告)号:US20230275923A1
公开(公告)日:2023-08-31
申请号:US18158467
申请日:2023-01-23
Applicant: Parallel Wireless, Inc.
Inventor: Ayan Chattopadhyay , Vikram Menon
IPC: H04L9/40
CPC classification number: H04L63/1458 , H04L63/164
Abstract: Systems and methods for detecting a Denial of Service (DoS) attack against Internet Protocol Security (IPsec) are disclosed. In one embodiment, a method comprises retrieving a first and a second Internet Security Association and Key Management Protocol (ISAKMP) packet, where the first ISAKMP packet and the second ISAKMP packet are received in immediate succession from a shared origin; storing a unique key out of a tuple wherein a value against the unique key is a time difference between the first and the second successive incoming packets; and calculating a score for each defined packet using a deep neural network, wherein a lower score value denotes an increased probability of having a DoS attack and a higher score value denotes a lower probability of a DoS attack.
-
公开(公告)号:US20210126902A1
公开(公告)日:2021-04-29
申请号:US17080836
申请日:2020-10-26
Applicant: Parallel Wireless, Inc.
Inventor: Ayan Chattopadhyay , Vikram Menon
Abstract: A method and computer readable software for providing randomized Security Parameter Index (SPI) for distributed Internet Protocol security (IPsec) are disclosed. In one embodiment a method includes designating each IPsec node with a unique node identifier, the IPsec node; performing a hash function on a random SPI to provide a randomized SPI; and assigning the randomized SPI to an IPsec tunnel associated with an IPsec node.
-
公开(公告)号:US11310040B2
公开(公告)日:2022-04-19
申请号:US16806430
申请日:2020-03-02
Applicant: Parallel Wireless, Inc.
Inventor: Vikram Menon , Ayan Chattopadhyay
Abstract: Methods, systems and computer readable media are disclosed for providing a quantum cipher based on phase inversion, A shared key is established between a first party and a second party. A Hadamard transformation is applied to a message intended for a second party from the first party to produce an equal superposition state. A key phase inversion is applied to the output of the Hadamard transformation. A multiple phase inversion transformation is applied to the output of the key phase inversion to produce an encrypted quantum state with a uniform probability and relative phase distributions. The result is sent to the second party.
-
公开(公告)号:US20200280438A1
公开(公告)日:2020-09-03
申请号:US16806430
申请日:2020-03-02
Applicant: Parallel Wireless, Inc.
Inventor: Vikram Menon , Ayan Chattopadhyay
Abstract: Methods, systems and computer readable media are disclosed for providing a quantum cipher based on phase inversion, A shared key is established between a first party and a second party. A Hadamard transformation is applied to a message intended for a second party from the first party to produce an equal superposition state. A key phase inversion is applied to the output of the Hadamard transformation. A multiple phase inversion transformation is applied to the output of the key phase inversion to produce an encrypted quantum state with a uniform probability and relative phase distributions. The result is sent to the second party.
-
-
-
-
-