Supercharge Your Innovation With Domain-Expert AI Agents!

Methods and systems for securing a computer network

A network and proprietary network technology, applied in the field of computer networks, can solve the problem of uncertainty in the reliability of user authentication wirelessly connected to the network

Active Publication Date: 2009-09-02
THE BOEING CO
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to human factors considerations and uncertainties regarding the reliability of user authentication using wireless connections to networks, additional access controls are required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for securing a computer network
  • Methods and systems for securing a computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] figure 1 is a side cross-sectional view of an aircraft 100 according to an embodiment of the invention. Aircraft 100 includes a cockpit 102 from which aircraft 100 is operated and controlled. Cockpit 102 is a secure access area onboard aircraft 100 . For example, an access procedure is required before access to the cockpit 102 is permitted. The cockpit 102 includes an input device 104 . Aircraft 100 also includes an electronics bay 106 onboard aircraft 100 , which is a secure access area onboard aircraft 100 . The electronic pod 106 also includes an input device 108 .

[0009] Aircraft 100 includes a computer network, such as aircraft data network (ADN) 100 . In an exemplary embodiment, AND 110 includes four domains with different levels of security access requests. AND 110 includes aircraft control domain 112 , airline information services domain 114 , passenger information and entertainment services domain 116 , and passenger-owned equipment domain 118 . Aircra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for establishing a secure access to a proprietary network (110) is provided. The method includes establishing a communication link between a first device (120) and the proprietary network using a first level of secure access to the network, requesting an access code by the first device. The method further includes generating an access code by the proprietary network in response to the request, receiving the access code by the first device, and entering the access code into a second device (104,108) communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user. The method also includes comparing the entered access code to the generated access code by the proprietary network, and enabling a second level of secure access between the first device and the proprietary network.

Description

technical field [0001] The present invention relates generally to computer networks and, more particularly, to methods and systems for protecting computer networks from unauthorized access. Background technique [0002] At least some known computer networks incorporate functionality to limit access by unauthorized users. Typically, access is restricted by requiring entry of a predetermined code at a prompt unique enough to a particular user, which is sufficient to ensure access by anyone other than that particular user. However, a user is generally allowed to access the network regardless of the access point used to authenticate the user. For example, an enterprise network allows users to log in from any computer or workstation communicatively coupled to the network. An enterprise network that includes the Internet as an access point basically allows users to be anywhere in the world while logging on to the enterprise network. Access to the corporate network can also be c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/00
CPCH04L67/12H04L29/08558H04L63/18H04L63/105
Inventor 查尔斯·D·罗亚尔蒂
Owner THE BOEING CO
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More