摘要:
A video data communication system and method are disclosed which provides for the secure transmission of video data among devices connected to a video data bus. The video data is transmitted with address information corresponding to a particular device or, alternatively, video data is encrypted and transmitted on the data bus without address information.
摘要:
A security device for use in communications network devices, such as multi-port repeaters, in local area networks to prevent eavesdropping by overwriting the data with an invalid symbol in the data communication packets transmitted to all unintended transceivers connected to the communications network device. Confidential or user sensitive information is not conveyed to the unintended transceivers since the invalid symbol is defined independent of the data. The invalid symbol unambiguously informs the unintended transceivers that the data in the data packet is invalid.
摘要:
A network having a security capability where the network includes a data bus, a plurality of stations connected to the data bus and a security unit which monitors traffic on the data bus and only enables authorized data to flow along the data bus.
摘要:
A system is provided for use in a network providing security to ensure the prevention of unauthorized receipt of data. The system utilizes a jamming sequence to prevent unauthorized ports from receiving certain data. Repeaters utilized in the network are provided with the capability to detect a particular data sequence to provide the improved features.
摘要:
In a method of preventing extraneous detection of signal information from raster scan signals in a plurality of consecutive line signals intended to form an image or partial images there is generated a random signal sequence, correlated with the information-carrying raster scan signals, but without information content, which is transmitted as protection for the raster scan signals. An apparatus for this purpose includes a generator (10, 12) adapted for generating a random signal sequence synchronous with the raster scan signals, and a switching element (5) adapted to transmit the random signal sequence round the equipment containing the raster scan signals that are to be protected.
摘要:
An access controller for peer-to-peer communication networks which monitors the data packets transmitted between stations, determines when an access that needs to be controlled is being made, and then either destroys the packet or transmits one or more packets which appear as legitimate message packets to the stations but which, in fact, terminates or alters the communication path between the two stations. Since the invention is free of any particular protocol restrictions, it can be implemented with any type of protocol and at any layer of that protocol. And since the access control mechanism is neither part of the physical communication path nor part of the communication primitives, the stations cannot detect, in any direct sense, that their access is being controlled, and they do not need to be programmed to follow any special control protocols, or to use encryption. A signature signal can be used as a safety mechanism to prevent multiple access controllers from controlling the same network, to prevent an unauthorized access controller from seizing control of the network.
摘要:
Apparatus and a method are disclosed to enable on-line modification and upgrading of terminal software in a communication network while maintaining the integrity of communication between a service provider and a subscriber using the network. Software is downloaded on a booter channel on the communication network. A subscriber terminal, coupled to the network initiates a communication with the network to receive downloaded booter data. The downloaded data is stored, and a checksum is computed from at least a portion of the downloaded data. The checksum is tested for validity, and control of the subscriber terminal is released to the downloaded software only if the checksum is valid.
摘要:
An arrangement for securing data transmissions to and from one data device from among a plurality of data devices sharing a common interface is disclosed. In a data communication network, a master communication bus connects to a plurality of data transmitting and receiving devices via a single interface. The disclosed arrangement provides circuitry in the common interface which generates a jamming signal to all devices connected to the interface except for that one device which is either transmitting or receiving a data-transmission. The jamming signal inhibits all the connected devices from monitoring and detecting the data transmission processes of the interface. The one transmitting and receiving device is enabled to either transmit or receive data during the generation of the jamming signal which ensures a secure data transmission and prevents "eavesdropping" by the other devices. The jamming signal is removed at the conclusion of the data transmission to or from the one device.
摘要:
A circuit (16) is designed to prevent unauthorized access to a remote device such as a computer (10) over a communications system such as a telephone network (12). A remote computer terminal (13) is connected to the telephone network (12) through a conventional modem (14). At the remote location of computer (10), circuit (16) is connected between computer (10) and another modem (15). Circuit (16) is also connected to the telephone network (12) to receive a signal therefrom which connects modem (15) through circuit (16) to computer (10) to temporarily access the same. The connection, however, is disconnected after a predetermined time period unless circuit (16) receives a second signal from the telephone network (12) before the expiration of that predetermined time period.
摘要:
Apparatus restricts access to a communication network having at least one service node for providing services to subscribers. A subscriber terminal, coupled to the communication network, includes a secret node key. A succession of frame verifier (FV) codes, derived through the use of the secret node key, is generated and transmitted on the network. A network access controller (NAC), coupled to the network, includes a record of the secret node key and uses the key to encrypt a seed which is transmitted to the subscriber terminal for use in generating the FV codes. The NAC also independently computes the succession of FV codes which should be generated by the subscriber terminal. A distributed access controller (DAC), coupled to the communication network, includes a look-up table for storing the succession of FV codes computed by the NAC. The FV codes transmitted by the subscriber terminal are detected and compared to those stored in the look-up table. If proper correspondence between the detected and stored FV codes is not found to exist, the communication network is jammed.