Abstract:
In general, the techniques of this disclosure describe a computing device that is configured to verify an identity of a user based on authentication factors received from multiple authentication devices. The computing device, which may be configured to operate as a server device, may receive an authentication factor from at least three authentication devices in a group of three or more authentication devices via a guard device. The computing device may determine a probability that the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. If the probability exceeds a threshold authentication probability, the computing device may send an authentication confirmation to a client device.
Abstract:
A method of routing a packet from a routing device includes receiving a first packet having a first header and a first data field. The first header has a final destination corresponding to a destination device communicatively coupled to the routing device via at least two parallel network links. A second packet having a second header and a second data field is sent over the first network link. The second data field is identical to the first data field. A destination address in the second header corresponds to a device on a first of the parallel network links. A third packet having a third header and a third data field is sent over the second network link. The third data field is identical to the first data field. a destination address in the third header corresponds to a device on a second of the parallel network links.
Abstract:
A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header.
Abstract:
This disclosure describes a context aware scalable dynamic network whereby network information concerning network elements in an untrusted (Black) network are gathered by network sensors, stored at a network sensor collector, and sent to another network sensor collector in a trusted (Red) network through a one-way guard. At the Red network, the network information from the Black network may be combined with network information from one or more Red networks. The combined network information may then be used to visualize a cross-domain network topology of both Red and Black networks, and to implement network management functions.