System for and method of securing a network utilizing credentials
First Claim
Patent Images
1. A computing device for increasing network security, the computing device comprising:
- one or more processors; and
one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform at least the following;
receive an initial packet from an other computing device;
verify the initial packet for a proper credential;
when the proper credential is not verified, drop the initial packet; and
when the proper credential is verified;
send an acknowledgment to the other computing device only; and
receive one or more subsequent packets from the other computing device without verifying that the subsequent packets have a proper credential,wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the other computing device is recognized by the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device sends the correct credentials, the receiving device will respond with an acknowledgment and further data is able to be transmitted. However, if the transmitting device does not send a packet with the proper credentials, then the receiving device will drop the packet and not respond. Thus, the transmitting device will be unaware of the presence of the receiving device, in particular when hackers are using scanning software to locate target devices.
-
Citations
20 Claims
-
1. A computing device for increasing network security, the computing device comprising:
-
one or more processors; and one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform at least the following; receive an initial packet from an other computing device; verify the initial packet for a proper credential; when the proper credential is not verified, drop the initial packet; and when the proper credential is verified; send an acknowledgment to the other computing device only; and receive one or more subsequent packets from the other computing device without verifying that the subsequent packets have a proper credential, wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the other computing device is recognized by the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device for increasing network security, the computing device comprising:
-
one or more processors; and one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computing device to perform at least the following; transmit an initial packet to an other computing device, the initial packet including a credential; receive an acknowledgment from the other computing device only when the other computing device has verified the initial packet for a proper credential, verification of the initial packet being performed by the other computing device independent of whether a device identifier or a user identifier of the computing device is recognized by the other computing device; and based on receiving the acknowledgment from the other computing device, transmit one or more subsequent packets to the other computing device without verifying whether the one or more subsequent packets include a proper credential. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, implemented at a computing device that includes one or more processors, for increasing network security, the method comprising:
-
receiving an initial packet from an other computing device; verifying the initial packet for a proper credential; when the proper credential is not verified, dropping the initial packet; and when the proper credential is verified; sending an acknowledgment to the other computing device only; and receiving one or more subsequent packets from the other computing device without verifying that the subsequent packets have a proper credential, wherein the verification of the initial packet is performed independent of whether a device identifier or a user identifier of the other computing device is recognized by the computing device. - View Dependent Claims (19, 20)
-
Specification