Kenneth Green - Elkridge MD, US Joseph Patanella - Annapolis MD, US Erik Schetina - New York NY, US Brian Prather - Pasadena MD, US
International Classification:
G06F012/14
US Classification:
713/201000
Abstract:
The present invention relates generally to an apparatus and method for detecting vulnerabilities in networks. In particular, the present invention may relate to an apparatus and method for detecting network security flaws in a computer network. The types of computer networks which the present invention may aid in protecting include both local area and other private networks, and networks connected to the internet or a similar wide area public network.
Disclosed herein are systems, methods and devices system for identifying a misbehaving computerized device. In some implementations, the system includes a processor to perform operations including receiving, by the system, a report about a computerized device, wherein the report comprises a pseudonym certificate from the computerized device, and wherein the pseudonym certificate comprises a linkage value. The operations also include transmitting, by the system and to a cloaking authority device, a request for a cloak index, wherein the request for the cloak index comprises the linkage value from the pseudonym certificate from the computerized device. The operations also include receiving, by the system, the cloak index from the cloaking authority device, and determining, by the system and using the cloak index, that the computerized device is the misbehaving computerized device.
Disclosed herein are systems, methods and devices system for identifying a misbehaving computerized device. In some implementations, the system includes a processor to perform operations including receiving, by the system, a report about a computerized device, wherein the report comprises a pseudonym certificate from the computerized device, and wherein the pseudonym certificate comprises a linkage value. The operations also include transmitting, by the system and to a cloaking authority device, a request for a cloak index, wherein the request for the cloak index comprises the linkage value from the pseudonym certificate from the computerized device. The operations also include receiving, by the system, the cloak index from the cloaking authority device, and determining, by the system and using the cloak index, that the computerized device is the misbehaving computerized device.
- Irvine CA, US Erik S. Schetina - Bergenfield NJ, US
Assignee:
INTEGRITY Security Services, Inc. - Irvine CA
International Classification:
H04L 29/06
Abstract:
Disclosed herein are systems, methods and devices system for identifying a misbehaving computerized device. In some implementations, the system includes a cloaking authority device for identifying a misbehaving computerized device, wherein the cloaking authority device includes a processor that can receive a request for a cloak index, wherein the request for the cloak index comprises a linkage value retrieved from a pseudonym certificate. In some examples, the processor can also request, from a pseudonym certificate authority device, first information that is used to produce the cloak index, wherein the first information is associated with the linkage value. Additionally, the processor can process, by the cloaking authority device, the linkage value to produce the cloak index based in part on the first information, wherein the cloak index identifies a misbehaving computerized device. Furthermore, the processor can transmit, by the cloaking authority device, the cloak index to a misbehavior authority device.
Critical Assets Nov 2011 - Aug 2012
Security Architect
Valicore Technologies - Irvine, CA Dec 2006 - Jun 2011
Chief Scientist
Trustwave Sep 1998 - Aug 2005
Chief Technology Officer
IFsec - New York, NY Jan 1998 - Sep 1998
Chief Technology Officer
Nichols Research Corporation - Columbia, MD 1993 - 1998
Principal Engineer
Education:
The Johns Hopkins University 1986 - 1988
MS, Electrical Engineering
Columbia University in the City of New York 1981 - 1985
BS, Electrical Engineering
Skills:
Information Security Security Network Security Computer Security Pki Pci Dss Vulnerability Assessment Intrusion Detection Information Assurance Software Development Embedded Systems Data Security Firewalls Cryptography Vpn Application Security Encryption Information Security Standards Security Policy Development Security Policy Tcp/Ip Computer Forensics Vulnerability Management Information Security Management Pci Dss Critical Infrastructure Protection Iso 27002 Private Pilot Multi Engine Creative Problem Solving Kindness Security Architecture Design Cissp Instrument Rated Pilot Program Management Payment Card Industry Data Security Standard
Critical Assets Nov 2011 - Aug 2012
Security Architect
Valicore Technologies - Irvine, CA Dec 2006 - Jun 2011
Chief Scientist
Trustwave Sep 1998 - Aug 2005
Chief Technology Officer
IFsec - New York, NY Jan 1998 - Sep 1998
Chief Technology Officer
Nichols Research Corporation - Columbia, MD 1993 - 1998
Principal Engineer
Education:
The Johns Hopkins University 1986 - 1988
MS, Electrical Engineering
Columbia University in the City of New York 1981 - 1985
BS, Electrical Engineering
Skills:
Information Security Information Security Standards Intrusion Detection Network Security PKI Cryptography PCI DSS Information Assurance Security PCI-DSS Critical Infrastructure Protection ISO-27002 Security Policy Development Vulnerability Assessment VPN TCP/IP Embedded Systems Software Development Private Pilot Multi-Engine Creative Problem Solving
Interests:
Multi-Engine and Instrument Rated Private Pilot, Tailwheel, High Performance and Complex endorsements.
Certifications:
CISSP INFOSEC Assessor, DoD Critical Infrastructure Assessment Office (CIAO)
David Schwartz, George Cohen, Barry Lefkowitz, Glenn Nozek, Dave Giblin, Michael Pretzel, Michelle Boyarsky, Anthony Lener, Darcy Rand, Eileen Brennan, Michele Manspeizer
Youtube
IMG 0281
Duration:
6s
Erik Satie: Relche (Complete ballet) (1924)
Erik Satie (1866-1925): Relche, ballet instantaniste en deux Actes: un...
Duration:
32m
Erik Linder - Shelly Linder I Cha Cha I Under...
Panache Star TV Roku TV and Amazon Fire TV Share and enjoy! SUBSCRIBE ...
Duration:
1m 57s
Poschiavo 50 (Harris Eisenstadt, Erik Friedla...
Erik Friedlander - cello Sara Schoenbeck - bassoon Harris Eisenstadt -...
Duration:
57m 21s
Erik Satie (2/4): Misticismo y amor
La poca mstica de Satie fue tan interesante personalmente como prolfic...
Duration:
7m 25s
Classics - Eric Koston Menikmati 2000
His skating has never disappointed, but this part made it a written-in...
Duration:
6m 13s
Eric Izakson - Mishel Magera ISR, Cha-Cha-Cha...
WDSF International Open Latin Grand Prix Dynamo, 10.03.2019 1. Mikhail...
Duration:
1m 33s
9701 Collins #1101 August 11, 2016
For more details: 4 bed, 4.5 bath, SF Presented By: Leon Weinschneid...