Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for operating data processing system and device for processing radio communication

A technology of data processing system and wireless communication, which is applied in the field of improved data processing system, and can solve the problem that computer resources are vulnerable to attacks

Inactive Publication Date: 2009-12-09
IBM CN
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, computer resources become more vulnerable due to the inadvertently increased ability of malicious users to spy on or attack computer resources accessible through those wireless networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for operating data processing system and device for processing radio communication
  • Method for operating data processing system and device for processing radio communication
  • Method for operating data processing system and device for processing radio communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In general, devices that may incorporate or relate to the present invention include a variety of data processing techniques. Therefore, as background, before describing the present invention in more detail, a typical organization of hardware and software components within a distributed data processing system is described.

[0026] Referring now to the accompanying drawings, Figure 1A A typical network of data processing systems, each of which may implement a portion of the invention, is depicted. Distributed data processing system 100 includes network 101, which is the medium within distributed data processing system 100 that may be used to provide communications links between various devices and computers connected together. Network 101 may include permanent connections such as electrical wires or fiber optic cables, or temporary connections made by telephone or wireless communication. In the depicted example, server 102 and server 103 , together with storage unit 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Change the characteristics of the wireless honeypot system on a dynamic and configurable basis. The wireless access point device is configured to use a wireless protocol based on user-specified values ​​for configurable parameters in the wireless protocol. The configurable rules change one or more values ​​for one or more configurable parameters in the wireless protocol in response to detected operating conditions of the wireless access point device. Values ​​for configurable parameters in wireless protocols are automatically changed according to configurable rules and detected operating conditions of the wireless access point device. The operating conditions may include the client's use of SSIDs or encryption keys stored in the SSIDs or encryption key history database, or SSIDs or encryption keys currently being used by the wireless access point device for pseudo wireless communications.

Description

technical field [0001] The present invention relates to an improved data processing system and in particular to a method and apparatus for computer security. Background technique [0002] Internet connectivity provides malicious users with the ability to spy on data processing systems and launch attacks on computer networks around the world. While computer security tools provide defensive mechanisms for limiting the ability of malicious users to cause harm to computer systems, computer administrators are legally limited in their ability to use offensive mechanisms. although intrusion detection systems can alert an administrator of suspicious activity so that the administrator can take action to track down the suspicious activity and make changes to systems and networks to prevent security breaches, these systems are typically only capable of aggregating information about possible security incidents . [0003] Honeypots have been developed as a tool to help computer securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 维基·K·康弗斯罗纳德·O·埃德马克约翰·M·加里森
Owner IBM CN