METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE
First Claim
Patent Images
1. A method for securing communications between a first node and a second node, comprising:
- receiving at least one model of behavior of the second node at the first node; and
authorizing the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing communication between a first node and a second node are provided. The methods comprising: receiving at least one model of behavior of the second node at the first node; and authorizing the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node.
134 Citations
35 Claims
-
1. A method for securing communications between a first node and a second node, comprising:
-
receiving at least one model of behavior of the second node at the first node; and authorizing the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A device that secures communications between a first node and a second node, comprising:
-
an interface in communication with a network; a memory; and a processor in communication with the memory and the interface;
wherein the processor;receives at least one model of behavior of the second node; and authorizes the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for securing communications between a first node and a second node, comprising:
-
receiving at least one model of behavior of the second node; and authorizing the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method for securing communications between a first node and a second node, comprising:
-
receiving at least one model of behavior of the second node at the first node; and rejecting traffic sent from the second node to the first node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node.
-
Specification