Network security system for rogue devices

    公开(公告)号:US11271919B2

    公开(公告)日:2022-03-08

    申请号:US16890564

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication between systems on a network without the need for encrypting the packets related to the communication, and thus, provides secure communications over the network without the processing capacity, memory, and/or processing delays caused by encryption of the packets. The disclosure aids in preventing rogue systems from being able to read communications over the network without the need for encryption. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.

    NETWORK SECURITY SYSTEM FOR ROGUE DEVICES

    公开(公告)号:US20210377237A1

    公开(公告)日:2021-12-02

    申请号:US16890564

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication between systems on a network without the need for encrypting the packets related to the communication, and thus, provides secure communications over the network without the processing capacity, memory, and/or processing delays caused by encryption of the packets. The disclosure aids in preventing rogue systems from being able to read communications over the network without the need for encryption. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.

    Secure communication for remote devices

    公开(公告)号:US11558362B2

    公开(公告)日:2023-01-17

    申请号:US16890565

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.

    System for technology resource centric rapid resiliency modeling

    公开(公告)号:US11290475B2

    公开(公告)日:2022-03-29

    申请号:US16681067

    申请日:2019-11-12

    Abstract: A system provides for technology resource centric rapid resiliency modeling. In particular, the system may generate a model for securing technology resources based on compromise vectors that may affect the integrity or security of the resources, along with resiliency controls which may be used by the system to protect the resources. Based on the above information, the system may determine the impact that certain vectors may have on certain resources and assess the resistance of the resources to the impacts. In this way, the system may provide an efficient way to assess resiliency of resources and implement resiliency controls to protect such resources.

    DYNAMIC SEGMENTATION OF NETWORK TRAFFIC BY USE OF PRE-SHARED KEYS

    公开(公告)号:US20220255747A1

    公开(公告)日:2022-08-11

    申请号:US17725445

    申请日:2022-04-20

    Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.

    SECURE COMMUNICATION FOR REMOTE DEVICES

    公开(公告)号:US20210377238A1

    公开(公告)日:2021-12-02

    申请号:US16890565

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.

    SYSTEM FOR GENERATION AND IMPLEMENTATION OF RESILIENCY CONTROLS FOR SECURING TECHNOLOGY RESOURCES

    公开(公告)号:US20210144163A1

    公开(公告)日:2021-05-13

    申请号:US16681074

    申请日:2019-11-12

    Abstract: A system provides for generation and implementation of resiliency controls for securing technology resources. In particular, the system may generate a model for securing technology resources or assets based on compromise vectors that may affect the integrity or security of the resources, along with resiliency controls which may be used by the system to protect the resources. Based on the above information, the system may determine the impact that certain vectors may have on certain resources and assess the resistance of the resources to the impacts. In this way, the system may provide an efficient way to assess resiliency of resources and implement resiliency controls to protect such resources.

Patent Agency Ranking