Check patentability & draft patents in minutes with Patsnap Eureka AI!

Computer implemented system and method for secure path selection using network rating

A security path and computer technology, applied in the field of network security, can solve problems such as data snooping and hijacking

Active Publication Date: 2016-10-05
TATA CONSULTANCY SERVICES LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is possible that financial data containing strongly encrypted data is not delivered to the recipient because of a vulnerable network path that ultimately allows the data to be snooped or hijacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer implemented system and method for secure path selection using network rating
  • Computer implemented system and method for secure path selection using network rating
  • Computer implemented system and method for secure path selection using network rating

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Referring now to the solution shown in the accompanying drawings, a computer-implemented system and method using network scoring to ensure route selection security will be described. This solution does not limit the scope and scope of this application. The description deals only with examples, preferred schemes of the disclosed systems and their suggested applications.

[0017] Referring to the non-limiting scenarios in the following description, the system and various features and advantages thereof are illustrated. Well-known parameters and processing techniques are omitted from the description to avoid obscuring the protocols herein. The examples used herein are only intended to facilitate the understanding of possible implementations of the solutions herein, so as to enable those skilled in the art to implement the solutions herein. As such, these examples should not be construed as limiting the scope of the protocols herein.

[0018] overview

[0019] Definitio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides solutions to the challenges encountered in the communication network where data packets need to be transmitted over network in a secure way. The system maintains integrity, provides high security and throughput in the network channel. The system works intelligently and resolves the vulnerability issues. If one portion of the network is being affected by intruder, then the system can automatically bypass that portion and reroute the data packets. The system identifies the trustworthy / reliable / safe network, network paths, and network nodes based on statistical transactional data and provides network trust rating for the nodes. The system also identifies the strong and weak / vulnerable network nodes. The system further determines the risk probability in the network path and selects the best transmission path. The system also determines the breaches in the communication network based on the unusual or suspicious traffic and data transactions.

Description

technical field [0001] This application relates to the field of network security. Background technique [0002] With the advent of the era of modern network technology, information security plays a vital role in ensuring the security of communication networks. Reliability and security are very critical elements in communication networks. Security measures, prevention and detection systems need to be in place to identify potential vulnerabilities. There are a variety of techniques that can be used to test for vulnerabilities to achieve network reliability and security. Vulnerability testing is aimed at common vulnerabilities and attacks that exist on network paths. At present, there are some vulnerability scanning software or security guards on the market, which can be used to verify the security weaknesses on the network or network path. However, these software or security guards provide limited rectification and resolution means for the detected vulnerabilities. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L45/02
CPCH04L63/1433
Inventor 斯坦迪欧·丹斯纳塔拉詹·维贾雅兰甘
Owner TATA CONSULTANCY SERVICES LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More