LIGHTWEIGHT AUTHENTICATION PROTOCOL USING DEVICE TOKENS

    公开(公告)号:US20230142978A1

    公开(公告)日:2023-05-11

    申请号:US18094096

    申请日:2023-01-06

    摘要: A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.

    Lightweight encrypted communication protocol

    公开(公告)号:US10554636B2

    公开(公告)日:2020-02-04

    申请号:US16186425

    申请日:2018-11-09

    IPC分类号: H04L29/06 H04L9/08 H04L9/14

    摘要: A lightweight network protocol provides mutual authentication and encryption of a communication channel in environments where the amount of computing resources available to the networked devices is constrained. When a new device is added to a network, the device contacts a registration service and provides information that is published via a device directory. The network entity locates the device via information provided by the device directory, and establishes an encrypted network connection with the device. A shared secret is established between the device and the network entity using a key-exchange protocol. Consecutive messages that are sent or received are encrypted or decrypted with a sequence of cryptographic keys generated based at least in part on the shared secret. Key-exchange parameters are added to message exchanges between the device and the network entity to facilitate regenerating the shared secret.

    Detecting denial of service attacks on communication networks

    公开(公告)号:US10027694B1

    公开(公告)日:2018-07-17

    申请号:US15083183

    申请日:2016-03-28

    IPC分类号: H04L29/06

    摘要: Systems and methods are described to enable detection of network attacks in communication networks. An attack detection system receives information regarding network traffic occurring at nodes of a communication network, and analyzes the information for anomalous traffic patterns. The attack detection system can use multiple, parallel metric evaluation units programmed to detect specific types of anomalies within traffic patterns. In one instance, a metric evaluation unit is programmed to detect changes in entropy for the traffic, as distributed according to a characteristic such as source address, protocol, or country of origin. Where the entropy of a set of traffic differs from historical averages by a large amount, such as by many standard deviations, the attack detection system may flag the traffic as indicative of an attack, even when the absolute volume of traffic has not changed.

    DETECTING NETWORK ATTACKS
    4.
    发明申请
    DETECTING NETWORK ATTACKS 审中-公开
    检测网络攻击

    公开(公告)号:US20150215331A1

    公开(公告)日:2015-07-30

    申请号:US14671843

    申请日:2015-03-27

    IPC分类号: H04L29/06

    摘要: This disclosure generally relates to the generation of a packet signature for packets determined to correspond to a network attack, such as a denial of service (“DoS”) attack. Specifically, a set of data packets captured during normal system operations can be analyzed to determine a set of baseline attributes. Additional packets captured during an attack can be compared to the baseline attributes, to determine, for individual packets, a probability that the packet forms a part of the attack. A packet signature can then be generated to identify attributes that are characteristic of the attack. That signature can then be used to filter out packets and mitigate the attack.

    摘要翻译: 本公开通常涉及为对应于诸如拒绝服务(“DoS”)攻击的网络攻击确定的分组的生成分组签名。 具体地,可以分析在正常系统操作期间捕获的一组数据分组以确定一组基线属性。 在攻击期间捕获的附加数据包可以与基线属性进行比较,以确定各个数据包是数据包构成攻击的一部分的概率。 然后可以生成分组签名以识别作为攻击特征的属性。 然后可以使用该签名来过滤掉数据包并减轻攻击。

    Lightweight authentication protocol using device tokens

    公开(公告)号:US11552946B2

    公开(公告)日:2023-01-10

    申请号:US16852220

    申请日:2020-04-17

    摘要: A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.

    LIGHTWEIGHT AUTHENTICATION PROTOCOL USING DEVICE TOKENS

    公开(公告)号:US20200252396A1

    公开(公告)日:2020-08-06

    申请号:US16852220

    申请日:2020-04-17

    摘要: A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.

    Detecting network attacks
    9.
    发明授权
    Detecting network attacks 有权
    检测网络攻击

    公开(公告)号:US09432387B2

    公开(公告)日:2016-08-30

    申请号:US14671843

    申请日:2015-03-27

    IPC分类号: H04L29/06 G06F21/56

    摘要: This disclosure generally relates to the generation of a packet signature for packets determined to correspond to a network attack, such as a denial of service (“DoS”) attack. Specifically, a set of data packets captured during normal system operations can be analyzed to determine a set of baseline attributes. Additional packets captured during an attack can be compared to the baseline attributes, to determine, for individual packets, a probability that the packet forms a part of the attack. A packet signature can then be generated to identify attributes that are characteristic of the attack. That signature can then be used to filter out packets and mitigate the attack.

    摘要翻译: 本公开通常涉及为对应于诸如拒绝服务(“DoS”)攻击的网络攻击确定的分组的生成分组签名。 具体地,可以分析在正常系统操作期间捕获的一组数据分组以确定一组基线属性。 在攻击期间捕获的附加数据包可以与基线属性进行比较,以确定各个数据包是数据包构成攻击的一部分的概率。 然后可以生成分组签名以识别作为攻击特征的属性。 然后可以使用该签名来过滤掉数据包并减轻攻击。