Network topology aided by smart agent download
First Claim
1. A method for a network topology aided by a smart agent download, the method comprising:
- authenticating, with at least one authenticator device, at least one claimant;
transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with the at least one claimant;
receiving, by the at least one receiving source, the smart agent download;
executing, by at least one processor, the smart agent download; and
monitoring, by the smart agent download, for anomalous network behavior related to cyber security,wherein the at least one authenticator device authenticates the at least one claimant by verifying a location of the at least one claimant by using geolocation techniques, which use random liveness information from at least one secure spot beam based authentication signal to derive at least one secret authentication key, in order to obtain the location of the at least one claimant.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and apparatus for a network topology aided by a smart agent download are disclosed. The method involves authenticating, with at least one authenticator device, at least one claimant. The method further involves transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with at least one claimant. In one or more embodiments, at least one transmission source is employed in a Lower Earth Orbiting (LEO) Iridium satellite. Also, the method involves receiving, by at least one receiving source, the smart agent download. In addition, the method involves executing, by at least one processor, the smart agent download. Further, the method involves monitoring, by the smart agent download, network behavior. The monitoring of network behavior includes monitoring the users on the network, monitoring data passing through the network, and monitoring the quantity of data passing through the network.
-
Citations
23 Claims
-
1. A method for a network topology aided by a smart agent download, the method comprising:
-
authenticating, with at least one authenticator device, at least one claimant; transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with the at least one claimant; receiving, by the at least one receiving source, the smart agent download; executing, by at least one processor, the smart agent download; and monitoring, by the smart agent download, for anomalous network behavior related to cyber security, wherein the at least one authenticator device authenticates the at least one claimant by verifying a location of the at least one claimant by using geolocation techniques, which use random liveness information from at least one secure spot beam based authentication signal to derive at least one secret authentication key, in order to obtain the location of the at least one claimant. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for a network topology aided by a smart agent download, the system comprising:
-
at least one authenticator device to authenticate at least one claimant; at least one transmission source to transmit the smart agent download to at least one receiving source associated with the at least one claimant; at least one receiving source to receive the smart agent download; and at least one processor to execute the smart agent download, wherein the smart agent download, when executed, is to monitor for anomalous network behavior related to cyber security, wherein the at least one authenticator device is configured to authenticate the at least one claimant by verifying a location of the at least one claimant by using geolocation techniques, which use random liveness information from at least one secure spot beam based authentication signal to derive at least one secret authentication key, in order to obtain the location of the at least one claimant. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. An apparatus for a network topology aided by a smart agent download, the apparatus comprising:
-
at least one authenticator device to authenticate at least one claimant associated with the apparatus; at least one receiving source to receive the smart agent download; memory to store the smart agent download; and at least one processor to execute the smart agent download, wherein the smart agent download, when executed, is to monitor for anomalous network behavior related to cyber security, wherein the at least one authenticator device is configured to authenticate the at least one claimant by verifying a location of the at least one claimant by using geolocation techniques, which use random liveness information from at least one secure spot beam based authentication signal to derive at least one secret authentication key, in order to obtain the location of the at least one claimant. - View Dependent Claims (23)
-
Specification