Anonymizing server-side addresses
    44.
    发明授权

    公开(公告)号:US11683286B2

    公开(公告)日:2023-06-20

    申请号:US17530244

    申请日:2021-11-18

    CPC classification number: H04L61/2503 H04L61/4511

    Abstract: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a virtual IP (VIP) address that is mapped to the client device and the endpoint device. In this way, IP addresses of servers are obfuscated by a virtual network of VIP addresses. The client device may then communicate data packets to the server using the VIP address as the destination address, and a virtual network service that works in conjunction with DNS can convert the VIP address to the actual IP address of the server using NAT and forward the data packet onto the server.

    Trustworthiness evaluation of network devices

    公开(公告)号:US11652824B2

    公开(公告)日:2023-05-16

    申请号:US17669123

    申请日:2022-02-10

    CPC classification number: H04L63/108 H04L41/0803 H04L63/0876 H04L63/20

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES

    公开(公告)号:US20220166779A1

    公开(公告)日:2022-05-26

    申请号:US17669123

    申请日:2022-02-10

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES

    公开(公告)号:US20200322348A1

    公开(公告)日:2020-10-08

    申请号:US16715271

    申请日:2019-12-16

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    INTERNET PROTOCOL (IP) PRIVACY INDICATION AND ACTIVATION IN ACCESS NETWORKS

    公开(公告)号:US20250031133A1

    公开(公告)日:2025-01-23

    申请号:US18223255

    申请日:2023-07-18

    Abstract: Techniques for establishing connections between user devices and access points to connect to networks. Access points may indicate privacy-support capabilities, enabling a user device to discover privacy-capable access networks, and use this capability for network selection. Furthermore, the techniques enable the user device to request to enable and/or disable privacy support on an on-demand basis. The techniques described herein include the use of an access point that indicates the network's privacy capability to an endpoint device (e.g., source device, user device, etc.) over one or more link-layer messages, IP address configuration mechanisms, and over authentication protocols.

Patent Agency Ranking