Network security based on redirection of questionable network access

    公开(公告)号:US10542006B2

    公开(公告)日:2020-01-21

    申请号:US15465315

    申请日:2017-03-21

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a source computing system to a destination computing system is allowable. The allowability of the communication is determined based properties of the network communication, such as a source or destination address, a port number, a time of day, a geographic location, and the like. If the communication is disallowed, the evaluation module or a related component redirects the communication to an alternative computing system that masquerades as the destination communication system.

    Network security based on device identifiers and network addresses

    公开(公告)号:US10382436B2

    公开(公告)日:2019-08-13

    申请号:US15359542

    申请日:2016-11-22

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a computing device is allowable. The allowability of the communication is determined based on (1) whether the computing device is using an authorized source network address, and (2) whether a non-modifiable identifier of the computing device is authorized. The non-modifiable identifier is a fixed hardware identifier of the computing device, such as an identifier of a CPU, network interface card, storage device, or the like.

    Systems and methods for suppressing denial of service attacks

    公开(公告)号:US10277626B2

    公开(公告)日:2019-04-30

    申请号:US15808283

    申请日:2017-11-09

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Techniques for network traffic filtering and flow control are disclosed. Some implementations provide a network communication evaluation module (“NCEM”) that executes on a networking device, such as a gateway or router, and performs network traffic control, such as suppressing denial of service attacks or otherwise limiting packet flow. The NCEM performs packet filtering in order to identify and drop packets that are being (or are likely to be) transmitted as part of a denial of service attack. The NCEM conditionally drops packets that meet specified conditions or rules. For example, the NCEM may drop all packets that are using a nonauthentic source address. As another example, the NCEM may limit the volume of packets of a particular type, such as by limiting the number of DNS requests that are made during a specified time interval.

    Evaluating a questionable network communication
    4.
    发明授权
    Evaluating a questionable network communication 有权
    评估有问题的网络通信

    公开(公告)号:US08621604B2

    公开(公告)日:2013-12-31

    申请号:US11712648

    申请日:2007-02-28

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    CPC classification number: H04L63/1441 G06F21/645 G06F2221/2119 H04L63/1491

    Abstract: Identifying a questionable network address from a network communication. In an embodiment, a network device receives an incoming or outgoing connection request, a web page, an email, or other network communication. An evaluation module evaluates the network communication for a corresponding network address, which may be for the source or destination of the network communication. The network address generally includes an IP address and a port number. The evaluation module checks a predefined white list for the network address to determine whether the network address is valid. Depending on the result, the evaluation module sets an indicator for preventing, allowing, or warning about the network communication. A category code, security code, organization code, or function code, may also be checked against the white list to ensure a valid network node is not compromised. A domain name may also be determined from the network address to further validate the network communication.

    Abstract translation: 从网络通信中识别可疑的网络地址。 在一个实施例中,网络设备接收传入或传出连接请求,网页,电子邮件或其他网络通信。 评估模块评估对应的网络地址的网络通信,该网络地址可以是网络通信的源或目的地。 网络地址通常包括IP地址和端口号。 评估模块检查网络地址的预定义白名单,以确定网络地址是否有效。 根据结果​​,评估模块设置一个用于防止,允许或警告网络通信的指示器。 还可以针对白名单检查类别代码,安全代码,组织代码或功能代码,以确保有效的网络节点不被泄露。 还可以从网络地址确定域名以进一步验证网络通信。

    ACCESS CONTROL SYSTEMS AND METHODS
    5.
    发明公开

    公开(公告)号:US20230198997A1

    公开(公告)日:2023-06-22

    申请号:US18113037

    申请日:2023-02-22

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    CPC classification number: H04L63/105 H04L63/104

    Abstract: Computer security techniques are described. One example provides a security module. The security module executes on a computing system and determines whether to allow a user or a program (e.g., native executable, script, etc.) associated with the user to access a resource, such as by reading, writing, or executing a file. An example operation system provides a new system administration mechanism that enforces rights and limitations for specific administrative and application groups that each have their own super user. Such a system may include a safe mode superuser who is required to log in when the system is in maintenance mode (e.g., single user console mode) at which time the safe mode superuser is the only user who is allowed to make programs executable.

    ACCESS CONTROL SYSTEMS AND METHODS

    公开(公告)号:US20210176253A1

    公开(公告)日:2021-06-10

    申请号:US16708423

    申请日:2019-12-09

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Computer security techniques are described. One example provides a security module. The security module executes on a computing system and determines whether to allow a user or a program (e.g., native executable, script, etc.) associated with the user to access a resource, such as by reading, writing, or executing a file. This decision is based at least in part on whether an access control list that is associated with the resource specifies that a source (e.g., IP address, hardware address) that is associated with the user is allowed to access the resource. This decision can also or instead be based on whether the computing system is executing in maintenance mode, such as in single-user diagnostic mode.

    Timestamp-based authentication
    7.
    发明授权

    公开(公告)号:US10826912B2

    公开(公告)日:2020-11-03

    申请号:US16220652

    申请日:2018-12-14

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a first and second computing system. The process provides as output a number that is based on a timestamp. The first computing system executes the authentication process using a timestamp obtained from its clock. The resulting number is transmitted to the second computing system, possibly along with other authentication data, such as a username and/or password. In response, the second computing system executes the authentication process using a timestamp obtained from its clock. If the numbers generated by the first and second computing systems match, the first computing system is authenticated.

    TIMESTAMP-BASED SHARED KEY GENERATION
    8.
    发明申请

    公开(公告)号:US20200295932A1

    公开(公告)日:2020-09-17

    申请号:US16888839

    申请日:2020-05-31

    Applicant: Daniel Chien

    Inventor: Daniel Chien

    Abstract: Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have synchronized clocks. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp. Since the computing systems have synchronized clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. Furthermore, both computing systems may synchronize their clocks to a private time server that maintains a clock that runs faster or slower than standard time. Security is maintained by one or more of restricting access to the time server, using secret key generation processes, and/or using a secret random number generator.

Patent Agency Ranking