Search Results - cyber+security

3 Results Sort By:
Visual Correlation of Computer Network Alerts to Facilitate Intrusion Detection
Invention SummaryThis invention visually correlates different logs from computer systems across an enterprise for the detection and diagnosis of complex intrusion attempts. This is possible by integrating three separate visualizations which provide a holistic view of the network security status. The technology provides an alert set of processed data...
Published: 5/13/2019   |   Inventor(s): James Agutter, Stefano Foresti, Shaun Moon, Julio Bermudez, Yarden Livnat, Thomas Morahan
Keywords(s):  
Category(s): Computing, Cyber Security
Method for Highly Secure Secret Key Exchange Between Wireless Devices Using Spatial and Temporal Channel Properties and Avoiding Use of Public Keys
Invention Summary: This invention represents a fundamental advancement in secret exchange for secure wireless communications. Traditional cryptography uses public key methods for secure secret key exchange. This method addresses concerns about the security of public keys in the future by avoiding use of a public key. A secret key is exchanged between...
Published: 5/13/2019   |   Inventor(s): Sneha Kasera, Neal Patwari
Keywords(s):  
Category(s): Computing, Cyber Security
A Highly Secure Method for Detecting Unauthorized WLAN Access Points Using Access Point Clock Skews
Invention SummaryWireless security enhancement 802.11i RSNA (Robust Security Network Association) is a method for detecting unauthorized fake access points in a wireless local area network (WLAN). This technology comprises a system that is implemented on a network intrusion detection system to identify fake access points by comparing the measured clock...
Published: 1/3/2020   |   Inventor(s): Suman Jana, Sneha Kasera
Keywords(s): Computing, Cyber Security
Category(s): Computing, Cyber Security
© 2024. All Rights Reserved. Powered by Inteum