会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Stealth packet switching
    • 隐形分组交换
    • US09306977B2
    • 2016-04-05
    • US13815801
    • 2013-03-15
    • Wayne Richard Howe
    • Wayne Richard Howe
    • H04L12/28H04L29/06H04L12/853H04J3/06H04L12/931H04L12/947
    • H04L63/20H04J3/0638H04J3/0682H04L47/2416H04L49/205H04L49/251H04L49/602
    • Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical networks using specially modified “stealth” packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets, network elements, and networks to have a low probability of detection, interception, and interpretation. The “stealth” packets, switches, networks, and methods provide invisibility or “cloaking” by modifying previously existing standards rules for packet structures, protocols, timing, synchronization, and other elements.Stealth packets, network elements, and networks may be further enhanced with encryption techniques by encrypting various parts of, or the entire packet structure itself, for example, headers, preambles, payload, and/or other packet elements. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques.
    • 公开了用于使用特别修改的“隐形”分组,小区,帧和/或其他“隐形”信息结构来创建和实现安全无线,有线和/或光网络的系统,方法,设备和网络架构。 这使得隐形分组,网络元素和网络具有较低的检测,拦截和解释概率。 “隐形”数据包,交换机,网络和方法通过修改先前存在的分组结构,协议,时序,同步和其他元素的标准规则来提供隐形或“隐藏”。 秘密分组,网络元素和网络可以通过加密技术的各个部分或整个分组结构本身例如头部,前导码,有效载荷和/或其他分组元素来进一步增强。 使用加密来修改数据包结构本身增加了一个全新的加密复杂度,从而使得隐形通信的数量级比标准解密技术难以解密。
    • 3. 发明申请
    • Stealth packet switching
    • 隐形分组交换
    • US20140090011A1
    • 2014-03-27
    • US13815801
    • 2013-03-15
    • Wayne Richard Howe
    • Wayne Richard Howe
    • H04L29/06
    • H04L63/20H04J3/0638H04J3/0682H04L47/2416H04L49/205H04L49/251H04L49/602
    • Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical networks using specially modified “stealth” packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets, network elements, and networks to have a low probability of detection, interception, and interpretation. The “stealth” packets, switches, networks, and methods provide invisibility or “cloaking” by modifying previously existing standards rules for packet structures, protocols, timing, synchronization, and other elements.Stealth packets, network elements, and networks may be further enhanced with encryption techniques by encrypting various parts of, or the entire packet structure itself, for example, headers, preambles, payload, and/or other packet elements. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques.
    • 公开了用于使用特别修改的“隐形”分组,小区,帧和/或其他“隐形”信息结构来创建和实现安全无线,有线和/或光网络的系统,方法,设备和网络架构。 这使得隐形分组,网络元素和网络具有较低的检测,拦截和解释概率。 “隐形”数据包,交换机,网络和方法通过修改先前存在的分组结构,协议,时序,同步和其他元素的标准规则来提供隐形或“隐藏”。 秘密分组,网络元素和网络可以通过加密技术的各个部分或整个分组结构本身例如头部,前导码,有效载荷和/或其他分组元素来进一步增强。 使用加密来修改数据包结构本身增加了一个全新的加密复杂度,从而使得隐形通信的数量级比标准解密技术难以解密。
    • 5. 发明授权
    • Scheduled network management
    • 计划的网络管理
    • US09015302B2
    • 2015-04-21
    • US13028610
    • 2011-02-16
    • Wayne Richard Howe
    • Wayne Richard Howe
    • G06F15/173H04L29/06H04L12/801
    • H04L63/0428H04L47/17
    • A method and apparatus for managing a network. Signals are received from a plurality of time sources. A signal having a desired level of accuracy is selected from the signals. A reference time in the network is established using the signal. Data to be transmitted through the network is encrypted to form encrypted data. The encrypted data includes a number of encrypted headers and an encrypted body. A next node in the network is identified based on a destination for the encrypted data. A request is generated to reserve a number of time intervals for transmitting the encrypted data to the next node through the network. The encrypted data is transmitted in the network during the number of time intervals responsive to receiving an approval for the request from the next node.
    • 一种用于管理网络的方法和装置。 从多个时间源接收信号。 从信号中选择具有期望的精度水平的信号。 使用该信号建立网络中的参考时间。 要通过网络传输的数据被加密以形成加密数据。 加密数据包括多个加密头和加密体。 基于加密数据的目的地识别网络中的下一个节点。 生成一个请求,以保留多个时间间隔,用于通过网络将加密数据发送到下一个节点。 响应于接收到来自下一个节点的请求的批准,在时间间隔的数量内,在网络中发送加密的数据。
    • 6. 发明授权
    • Stealth packet switching
    • 隐形分组交换
    • US08428069B2
    • 2013-04-23
    • US10986550
    • 2004-11-10
    • Wayne Richard Howe
    • Wayne Richard Howe
    • H04L12/28
    • H04L63/20H04J3/0638H04J3/0682H04L47/2416H04L49/205H04L49/251H04L49/602
    • Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical stealth-enabled networks using specially modified packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets to have a low probability of detection, a low probability of interception, and a low probability of interpretation. Stealth packets are only detected, intercepted, and correctly interpreted by stealth-enabled network equipment. In its simplest form, stealth packet switching modifies the packet structure, protocols, timing, synchronization, and other elements through various rule-violations. This creates stealth packets, which normal equipment cannot receive correctly, and hence normal equipment discards the stealth packets.Stealth packets may be further enhanced with encryption techniques which focus on encrypting the packet structure itself, as opposed to merely encrypting the data. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques.Combining stealth packets with time-based reservation packet switching enables total encryption of the packet (including header and preamble encryption) capable of routing through multiple hops without decryption of headers and preamble at each hop. Time-based reservation packet switching can also guarantee real-time stealth packet delivery through a network that is totally congested from data storms, virus caused congestion, and/or denial of service attacks.
    • 公开了用于使用特别修改的分组,小区,帧和/或其他“隐形”信息结构来创建和实现安全的无线,有线和/或光学隐形的网络的系统,方法,设备和网络架构。 这使得隐形分组具有较低的检测概率,低的拦截概率和较低的解释概率。 隐形数据包只能被隐形启用的网络设备检测,拦截和正确解释。 在最简单的形式中,隐形分组交换通过各种规则违规来修改分组结构,协议,定时,同步和其他元素。 这样会产生隐形报文,正常的设备无法正常接收,因此普通设备会丢弃隐身报文。 与仅仅加密数据相反,可以通过专注于加密分组结构本身的加密技术进一步增强隐形分组。 使用加密来修改数据包结构本身增加了一个全新的加密复杂度,从而使得隐形通信的数量级比标准解密技术难以解密。 将隐形分组与基于时间的预留分组交换相结合,可以对能够在多跳进行路由的分组(包括报头和前导码加密)进行全面加密,而无需对每一跳进行头部和前导码的解密。 基于时间的预留分组交换还可以保证通过完全从数据风暴,病毒引起的拥塞和/或拒绝服务攻击的网络实时隐身分组传送。
    • 7. 发明申请
    • Scheduled Network Management
    • 计划网络管理
    • US20120209971A1
    • 2012-08-16
    • US13028610
    • 2011-02-16
    • Wayne Richard Howe
    • Wayne Richard Howe
    • G06F15/173
    • H04L63/0428H04L47/17
    • A method and apparatus for managing a network. Signals are received from a plurality of time sources. A signal having a desired level of accuracy is selected from the signals. A reference time in the network is established using the signal. Data to be transmitted through the network is encrypted to form encrypted data. The encrypted data includes a number of encrypted headers and an encrypted body. A next node in the network is identified based on a destination for the encrypted data. A request is generated to reserve a number of time intervals for transmitting the encrypted data to the next node through the network. The encrypted data is transmitted in the network during the number of time intervals responsive to receiving an approval for the request from the next node.
    • 一种用于管理网络的方法和装置。 从多个时间源接收信号。 从信号中选择具有期望的精度水平的信号。 使用该信号建立网络中的参考时间。 要通过网络传输的数据被加密以形成加密数据。 加密数据包括多个加密头和加密体。 基于加密数据的目的地识别网络中的下一个节点。 生成一个请求,以保留多个时间间隔,用于通过网络将加密数据发送到下一个节点。 响应于接收到来自下一个节点的请求的批准,在时间间隔的数量内,在网络中发送加密的数据。