摘要:
Systems and method for flexible authentication of IoT devices that can accommodate non-IP environments are disclosed. One system includes a plurality of devices, with each device including a universal authentication agent and a verification certificate, wherein each verification certificate includes a proof that is recorded on an entry on a distributed ledger. The verification certificate proof is shared with one or more devices which verify the proof with the entry. A universal authentication service is configured with the universal authentication agent of at least one device to connect the at least one device with the distributed ledger.
摘要:
Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.
摘要:
Methods and systems for direct, machine-to-machine authentication through a trusted chain of ownership are disclosed. One method includes receiving, at a first device from a second device, a request for a certificate proof. The method also includes transmitting, to the second device, and in response to the request, the certificate proof from the first device, an entry of the proof being recorded on a distributed ledger. The certificate proof is useable by the second device to authenticate the first device based on a comparison of the proof and the entry on the distributed ledger, thereby establishing trust with the first device at the second device.
摘要:
Methods and systems for defining a solution within an enterprise security management configuration server is disclosed. One method includes, based on network concordance data, grouping a plurality of nodes within an enterprise network into a plurality of profiles and identifying one or more channels among the plurality of profiles within a project of an enterprise security management configuration tool. The method also includes displaying the plurality of profiles in a configuration user interface, and automatically identifying one or more solutions among the plurality of profiles. The method further includes collapsing each of the one or more solutions into a single icon within the configuration user interface, each single icon representing a solution.
摘要:
Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.
摘要:
Provided are apparatus and systems having a lessened pulsation through the use of a pulse flow control mechanism. In performing a cyclical swing adsorption process, various streams are passed through adsorbent bed units during various steps in the swing adsorption process. The pulse flow control mechanism is utilized within a manifold of one of the streams to lessen pulsation within the manifold that results from performing the various steps.
摘要:
Provided are apparatus and systems for performing a swing adsorption process. This swing adsorption process may involve passing streams through adsorbent bed units to treat the pipeline quality natural gas to form a stream that complies with liquefied natural gas (LNG) specifications. The process may involve a combined TSA and PSA process, which is utilized to remove contaminants from the feed stream.
摘要:
Provided are apparatus and systems having a lessened pulsation through the use of a pulse flow control mechanism. In performing a cyclical swing adsorption process, various streams are passed through adsorbent bed units during various steps in the swing adsorption process. The pulse flow control mechanism is utilized within a manifold of one of the streams to lessen pulsation within the manifold that results from performing the various steps.
摘要:
A pressure swing adsorption process for removal of C02 from natural gas streams through a combination of a selective adsorbent material containing an effective amount of a non-adsorbent filler, adsorbent contactor design, and adsorption cycle design. The removal of contaminants from gas streams, preferably natural gas streams, using rapid-cycle swing adsorption processes, such as rapid-cycle pressure swing adsorption (RC-PSA). Separations at high pressure with high product recovery and/or high product purity are provided through a combination of judicious choices of adsorbent material, gas-solid contactor, system configuration, and cycle designs. For example, cycle designs that include steps of purge and staged blow-down as well as the inclusion of a mesopore filler in the adsorbent material significantly improves product (e.g., methane) recovery. An RC-PSA product with less than 10 ppm H2S can be produced from a natural gas feed stream that contains less than 1 mole percent H2S.
摘要:
Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Security may be further enhanced by establishing a session key for use during communications between a first and a second virtual machine. The session key may be encrypted with the COI key.