System for and method of securing a network utilizing credentials
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-012/28
H04L-029/06
H04L-012/807
H04L-029/12
출원번호
US-0872606
(2015-10-01)
등록번호
US-9584480
(2017-02-28)
발명자
/ 주소
Keith, Jr., Robert O.
출원인 / 주소
Microsoft Technology Licensing, LLC
대리인 / 주소
Gupta, Anand
인용정보
피인용 횟수 :
0인용 특허 :
126
초록▼
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device sends the correct credentials, the receiving device will respond with an acknowledgment and further data is able to be transmitted. However, if
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device sends the correct credentials, the receiving device will respond with an acknowledgment and further data is able to be transmitted. However, if the transmitting device does not send a packet with the proper credentials, then the receiving device will drop the packet and not respond. Thus, the transmitting device will be unaware of the presence of the receiving device, in particular when hackers are using scanning software to locate target devices.
대표청구항▼
1. A computing device for increasing network security, the computing device comprising: one or more processors; andone or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform
1. A computing device for increasing network security, the computing device comprising: one or more processors; andone or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform at least the following: receive an initial packet from an other computing device;verify the initial packet for a proper credential;when the proper credential is not verified, drop the initial packet; andwhen the proper credential is verified: send an acknowledgment to the other computing device only; andreceive one or more subsequent packets from the other computing device without verifying that the subsequent packets have a proper credential,wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the other computing device is recognized by the computing device. 2. The computing device of claim 1, wherein the computing device is a client and the other computing device is a server. 3. The computing device of claim 1, wherein the computing device is a server and the other device is a client. 4. The computing device of claim 1, wherein the proper credential is included in a wrapper around the initial packet. 5. The computing device of claim 4, wherein the proper credential is included in a header of the wrapper. 6. The computing device of claim 1, wherein a protocol for receiving the initial packet is User Datagram Protocol or any functionally equivalent protocol. 7. The computing device of claim 1, wherein a protocol for sending the acknowledgment is Transmission Control Protocol or any functionally equivalent protocol. 8. The computing device of claim 1, wherein the computing device and the other computing device are coupled by the Internet. 9. The computing device of claim 1, wherein the computing device and the other computing device are coupled by an intranet. 10. A computing device for increasing network security, the computing device comprising: one or more processors; andone or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform at least the following: transmit an initial packet to an other computing device, the initial packet including a credential;receive an acknowledgment from the other computing device only when the other computing device has verified the initial packet for a proper credential, verification of the initial packet being performed by the other computing device independent of whether a device identifier or a user identifier of the computing device is recognized by the other computing device; andbased on receiving the acknowledgment from the other computing device, transmit one or more subsequent packets to the other computing device without verifying whether the one or more subsequent packets include a proper credential. 11. The computing device of claim 10, wherein the computing device is a client and the other computing device is a server. 12. The computing device of claim 10, wherein the computing device is a server and the other computing device is a client. 13. The computing device of claim 10, wherein a protocol for receiving the initial packet is User Datagram Protocol or any functionally equivalent protocol. 14. The computing device of claim 10, wherein a protocol for sending the acknowledgment is Transmission Control Protocol or any functionally equivalent protocol. 15. The computing device of claim 10, wherein the computing device and the other computing device are coupled by the Internet. 16. The computing device of claim 10, wherein the computing device and the other computing device are coupled by an intranet. 17. The computing device of claim 10, wherein the credential is included in a wrapper around the initial packet. 18. A method, implemented at a computing device that includes one or more processors, for increasing network security, the method comprising: receiving an initial packet from an other computing device;verifying the initial packet for a proper credential;when the proper credential is not verified, dropping the initial packet; andwhen the proper credential is verified: sending an acknowledgment to the other computing device only; andreceiving one or more subsequent packets from the other computing device without verifying that the subsequent packets have a proper credential,wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the other computing device is recognized by the computing device. 19. The method of claim 18, wherein a protocol for receiving the initial packet is User Datagram Protocol or any functionally equivalent protocol. 20. The method of claim 18, wherein a protocol for sending the acknowledgment is Transmission Control Protocol or any functionally equivalent protocol.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (126)
Bodin,William Kress, Ad hoc data sharing in virtual team rooms.
Aguilar, Maximino; Lo, Yuan-Chang; Millican, Jr., Robert Ellington; Stafford, James Michael, Automatic recovery of a corrupted boot image in a data processing system.
Chatterjee,Amlan; Jain,Divya; Mueller,Thomas; Tran,Luu, Client aware extensible markup language content retrieval and integration in a wireless portal system.
Kent Fillmore Hayes, Jr. ; Brett Graham King, Client-server system for maintaining a user desktop consistent with server application user access permissions.
Gill, William Alton; Howard, Stephen M.; Boudrie, Robert Alan; Sachar, Glenn R.; StPierre, Edgar J., Data backup system having independent data restore execution.
Or,Yan; Casier,Johan; Garimella,Krishna; Bellur,Umesh; Koper,John; Joshi,Shashank; Sundaresan,Vinu, Deployment of applications in a multitier compute infrastructure.
Abdel-Malek, Aiman; Scallan, Brian; Bruno, Jeanette M.; Mathewson, Bryan A.; Schlabach, James E.; Fera, Gregory J.; Gomez, Ivan, Diagnosis and repair system and method.
Kahn Gary S. (Pittsburgh PA) Pepper Jeffrey A. (Verona PA) Kepner Al N. (Pittsburgh PA) Richer William (Pittsburgh PA) Enand Rajiv (Deerborn MI), Domain independent shell for building a diagnostic expert system.
Vladimir Chtchetkine ; Alan Kucheck ; Guennadi Terechtenko, Installable file system having virtual file system drive, virtual device driver, and virtual disks.
George,Randy; Howe,Brian Keith; Paul,Chakkalamattam Jos, Mechanism to dynamically update a windows system with user specific application enablement support from a heterogeneous server environment.
Senator Steven T. ; Passmore Dale R. ; Gittins Robert S., Metadevice driver rename/exchange technique for a computer system incorporating a plurality of independent device drive.
Adams John J. (Vienna VA) Kidd Clark (Sterling VA) Summers Timothy (Allison Park PA), Method and apparatus for a pattern based spaced management system.
Brew Glenn Edwards ; French Steven Michael ; Paul Chakkalamattam Jos ; Tran Julie Hong-Van, Method and apparatus for application management in computer networks.
Marc-Arthur Pierre-Louis ; Chakkalamattam Jos Paul ; Sockalingam Radhakrishnan, Method and apparatus for managing boot images in a distributed data processing system.
Huang, Yun-Wu; Johnson, Robert D.; Pollak, Roger A.; Ponzo, John J., Method and apparatus for server based handheld application and database management.
Maximino Aguilar ; Norbert Blam ; Yuan-Chang Lo ; James Michael Stafford, Method and system for automatically configuring the boot process of a computer having multiple bootstrap programs within a network computer system.
Cromer, Daryl Carvis; Kern, Eric Richard; Locker, Howard Jeffrey; Rhoades, David; Ward, James Peter, Method and system for customizing a client computer system configuration for a current user using BIOS settings downloaded from a server.
Halpern Joseph E. ; Martz David A. ; Sangroniz James ; Scheiderich ; III Walter J., Method for more efficiently installing software components from a remote server source.
Joeressen Olaf J.,DEX ; Schneider Gregor,DEX ; Zwickler Uwe,DEX, Methods and apparatuses for identification of the position of data packets which are located in a serial received data stream.
Ekrot Alexander C. ; Singer James H. ; Hemphill John M. ; Autor Jeffrey S. ; Galloway William C. ; Alexander Dennis J., Multi-server fault tolerance using in-band signalling.
Swartz, Stephen J.; Bakshi, Anil R.; Murphy, Christopher John; Baeth, Kevin Ronald, On-line transaction control during activation of local telecommunication service.
Haun, Christopher K.; Prouse, Craig Harvey; Sokol, Jr., Joseph; Resch, Paul M., Providing a reliable operating system for clients of a net-booted environment.
Mann, Joseph F.; Sitaraman, Aravind; Deng, Mingqi; Thomas, Leslie Alan, Remote system administration and seamless service integration of a data communication network management system.
William G. Parry ; Mingtzong Lee ; Christopher W. Lorton ; Jayachandran Raja ; Serge Smirnov, Streaming information appliance with buffer read and write synchronization.
Conner, Michael Haden; Vicknair, Wayne Elmo; Becker, Craig Henry; Nicholas, Stewart E., System and method for automatically negotiating license agreements and installing arbitrary user-specified applications on application service providers.
Woodhill James R. (Houston TX) Woodhill Louis R. (Richmond TX) More ; Jr. William Russell (Houston TX) Berlin Jay Harris (Houston TX), System and method for distributed storage management on networked computer systems using binary object identifiers.
Aronberg David B. ; Goldman Dov J. ; Spiro Peter A., System and method for software distribution and desktop management in a computer network environment.
Brewer, James Arthur; Gupta, Sanjay; Hartman, Nicole Dawn; Jacks, Mark Alan, System and method of running diagnostic testing programs on a diagnostic adapter card and analyzing the results for diagnosing hardware and software problems on a network computer.
Booth, III, Earl Hardin; Lingafelt, Charles Steven; Nguyen, Phuong Thanh; Temoshenko, Leo; Wang, Xiaogang, System and method to determine connectivity of a VPN secure tunnel.
Michael F. Guheen ; James D. Mitchell ; James J. Barrese, System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework.
Landsman Rick W. ; Lee Wei-Yeh, Technique for implementing browser-initiated user-transparent advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to a user click-stream.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.