摘要:
The invention relates to a system and method of hiding cryptographic private keys. While public/private key encryption systems are considered to be secure, the private keys ultimately must be stored in some location—in fact, in some digital commerce systems the private key is sent to the end user as part of an executable file such as an audio player and audio file. Thus, attackers can obtain access to the private key. The broad concept of the invention is to split the private key up into parts which are obfuscated, but still kept in a form that allows the encrypted data to be decrypted. One technique for obfuscating the private key uses modulo arithmetic.
摘要:
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
摘要:
Malware detection systems and methods are presented in which header data of protocol data units (PDUs) are examined at a wireless access switch shared by multiple clients, and the PDU type and client are used to establish counters, with the count values being analyzed to identify clients suspected of being infected with malware.
摘要:
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
摘要:
A certificate registry system is configured to issue authentication certificates to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates includes a respective Instant Messaging (IM) screen name information of the information provider. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located.
摘要:
The invention is directed to providing threat and risk analysis for a network that has a high degree of inter-relationships and interdependencies among the assets comprising it, using a “cut set” enumeration method. The identified cut sets are used as the basis to the threat and risk analysis, since each cut set may affect the traffic between two dependent assets in the network, and thereby affect the security state of the dependent assets themselves. The affected security state may be confidentiality, integrity, availability, or other network or security relevant parameter.
摘要:
The present invention relates in general to tile assemblies and more particularly to a method of installing a plurality of tile assemblies on a planar surface. Existing tile systems require a large number of steps and take place over a matter of days while one waits for various adhesives and grouts to set. The invention provides a tile system which is much quicker and less complex to install. It relies mainly on a composite tile comprising: a surface tile layer; a rigid carrier being generally the same shape and planar dimensions of the surface tile layer; and adhesive means for bonding the rigid carrier to the underside of the surface tile layer; the rigid carrier having edges extending beyond the edges of the surface tile layer, the rigid carrier edges being operable to matingly engage with complementary edges of carriers of others of the composite tiles.
摘要:
A great deal of intellectual property is currenttly handled digitally, in the from of audible, visual, or audio-visual files or data streams. With today's powerful electronic equipment and communication networks such as the internet, this digital content can be reproduced flawlessly and distributed without control. While attemps have been made to protect such digital content, none of the existing protection techniques have been successful. The invention provides a system and method of protecting digital content by integrating the digital content with an executable software package such as a digital media player, executing some sort of protection mechanism (such as password, watermark or encryption protection), and then encoding the software into a tamper-resistant form. In this way, the digital content can be used by initiating the executable software it was encoded with, but the content itself cannot be accessed, nor can the protection mechanism be cracked.
摘要:
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
摘要:
A directional sound system, a method of transmitting sound to a spatial location determined by the gaze of a user and a directional communication system are disclosed. In one embodiment, the directional sound system includes: (1) a direction sensor configured to produce data for determining a direction in which attention of a user is directed, (2) a microphone configured to generate output signals indicative of sound received thereat, (3) loudspeakers configured to convert directed sound signals into directed sound and (4) an acoustic processor configured to be coupled to the direction sensor, the microphone, and the loudspeakers, the acoustic processor configured to convert the output signals to the directed sound signals and employ the loudspeakers to transmit the directed sound to a spatial location associated with the direction.