Check patentability & draft patents in minutes with Patsnap Eureka AI!

Computer-implemented system and method for selecting safe paths using network scoring

A security path and computer technology, applied in the field of network security, can solve problems such as hijacking and data snooping

Active Publication Date: 2020-04-24
TATA CONSULTANCY SERVICES LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is possible that financial data containing strongly encrypted data is not delivered to the recipient because of a vulnerable network path that ultimately allows the data to be snooped or hijacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer-implemented system and method for selecting safe paths using network scoring
  • Computer-implemented system and method for selecting safe paths using network scoring
  • Computer-implemented system and method for selecting safe paths using network scoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Referring now to the solution shown in the accompanying drawings, a computer-implemented system and method using network scoring to ensure route selection security will be described. This solution does not limit the scope and scope of this application. The description deals only with examples, preferred schemes of the disclosed systems and their suggested applications.

[0017] Referring to the non-limiting scenarios in the following description, the system and various features and advantages thereof are illustrated. Well-known parameters and processing techniques are omitted from the description to avoid obscuring the protocols herein. The examples used herein are only intended to facilitate the understanding of possible implementations of the solutions herein, so as to enable those skilled in the art to implement the solutions herein. As such, these examples should not be construed as limiting the scope of the protocols herein.

[0018] overview

[0019] Definitio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a solution to the challenges encountered in communication networks where data packets need to be transmitted in a secure manner. The system maintains integrity and provides high security and throughput in network channels. The system runs intelligently and solves the problem of loopholes. If a part of the network is compromised by an intruder, the system can automatically reroute packets around that part. Based on statistical transaction data, this system can identify trustworthy / reliable / safe networks, network paths and network nodes, and provide network trust scores to nodes. The system can also identify strong, weak / vulnerable network nodes. The system can also determine the risk probability in the network path and choose the best transmission path. Based on abnormal or suspicious traffic and data transactions, the system can also determine the damage suffered in the communication network.

Description

technical field [0001] This application relates to the field of network security. Background technique [0002] With the advent of the era of modern network technology, information security plays a vital role in ensuring the security of communication networks. Reliability and security are very critical elements in communication networks. Security measures, prevention and detection systems need to be in place to identify potential vulnerabilities. There are a variety of techniques that can be used to test for vulnerabilities to achieve network reliability and security. Vulnerability testing is aimed at common vulnerabilities and attacks that exist on network paths. At present, there are some vulnerability scanning software or security guards on the market, which can be used to verify the security weaknesses on the network or network path. However, these software or security guards provide limited rectification and resolution means for the detected vulnerabilities. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L45/02
CPCH04L63/1433
Inventor 斯坦迪欧·丹斯纳塔拉詹·维贾雅兰甘
Owner TATA CONSULTANCY SERVICES LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More