System for and method of securing a network utilizing credentials
First Claim
Patent Images
1. A method of increasing network security comprising:
- a. transmitting an initial packet from a first device to a second device;
b. receiving the initial packet at the second device from the first device;
c. verifying the initial packet for proper credentials;
d. sending an acknowledgment from the second device to the first device only if the proper credentials are verified; and
e. transmitting one or more subsequent packets from the first device to the second device without verifying the subsequent packets have proper credentials;
wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the first device is recognized by the second device, and further wherein the credentials are verified at the second device.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device sends the correct credentials, the receiving device will respond with an acknowledgment and further data is able to be transmitted. However, if the transmitting device does not send a packet with the proper credentials, then the receiving device will drop the packet and not respond. Thus, the transmitting device will be unaware of the presence of the receiving device, in particular when hackers are using scanning software to locate target devices.
287 Citations
37 Claims
-
1. A method of increasing network security comprising:
-
a. transmitting an initial packet from a first device to a second device; b. receiving the initial packet at the second device from the first device; c. verifying the initial packet for proper credentials; d. sending an acknowledgment from the second device to the first device only if the proper credentials are verified; and e. transmitting one or more subsequent packets from the first device to the second device without verifying the subsequent packets have proper credentials; wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the first device is recognized by the second device, and further wherein the credentials are verified at the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of increasing network security comprising:
-
a. transmitting an initial packet from a first device to a second device; b. receiving the initial packet at the second device from the first device; c. verifying the initial packet for proper credentials; d. sending an acknowledgment from the second device to the first device only if the proper credentials are verified; e. dropping the initial packet if the proper credentials are not verified; and f. transmitting one or more subsequent packets from the first device to the second device without verifying the subsequent packets have proper credentials; wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the first device is recognized by the second device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for increasing network security comprising:
-
a. one or more first devices for transmitting an initial packet and one or more subsequent packets; b. one or more second devices for receiving the initial packet and one or more subsequent packets, wherein the one or more second devices are coupled to the one or more first devices through a network; and c. a set of credentials within the initial packet for verification, wherein the one or more second devices send an acknowledgment back to the one or more first devices only if the set of credentials are verified; wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of each of the first devices is recognized by the second devices, and further wherein the first devices transmit and the second devices receive the subsequent packets without verifying the subsequent packets have proper credentials if the acknowledgment is received. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A network of devices for increasing network security comprising:
-
a. one or more client devices for transmitting an initial packet and one or more subsequent packets; b. one or more server devices for receiving the initial packet and the subsequent packets, wherein the one or more server devices are coupled to the one or more client devices through a network; and c. a set of credentials within the packet for verification, wherein the one or more server devices send an acknowledgment back to the one or more client devices only if the set of credentials are verified; wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of each of the client devices is recognized by the server devices, and further wherein the client devices transmit and the server devices receive the subsequent packets without verifying the subsequent packets have proper credentials if the acknowledgment is received. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. An apparatus comprising a memory device, the memory device comprising:
-
a. an initial packet for increasing network security, the initial packet comprising; i. data; and ii. a set of credentials, wherein the set of credentials are analyzed by a receiving device such that the receiving device sends an acknowledgment back and receives one or more subsequent packets without verifying the subsequent packets have proper credentials only if the set of credentials are valid, further wherein the apparatus is configured to transmit the initial packet to the receiving device independent of whether a device identifier or a user identifier of the receiving device is recognized by the apparatus. - View Dependent Claims (33, 34, 35, 36, 37)
-
Specification