Dell products l.p. (20240348583). PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION simplified abstract
PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION
Organization Name
Inventor(s)
Ofir Ezrielev of Be’er Sheba (IL)
Yevgeni Gehtman of Modi'in (IL)
Tomer Shachar of Beer-Sheva (IL)
PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240348583 titled 'PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION
Simplified Explanation: The patent application describes a method where an edge gateway is verified by a gateway management system, and upon successful verification, a unique identifier is generated and stored in the edge gateway. When the edge gateway intercepts a packet, it adds the unique identifier to the packet's header. The gateway management system uses this identifier to validate the packet and either drops it if validation fails or executes it if validation is successful.
Key Features and Innovation:
- Verification of edge gateway by gateway management system
- Generation and storage of unique identifier for edge gateway
- Addition of unique identifier to packet header by edge gateway
- Validation process based on identifier by gateway management system
Potential Applications: This technology can be applied in network security systems, data packet routing, and traffic management in communication networks.
Problems Solved: This technology addresses the need for secure packet validation and efficient data routing in network systems.
Benefits:
- Enhanced network security
- Efficient data packet routing
- Improved traffic management in communication networks
Commercial Applications: Potential commercial applications include network security solutions, data communication systems, and network infrastructure management tools.
Prior Art: Prior art related to this technology may include existing methods of packet validation and network security protocols.
Frequently Updated Research: Research on advancements in network security protocols, data packet routing algorithms, and edge computing technologies may be relevant to this technology.
Questions about Edge Gateway Technology: 1. How does the unique identifier added to the packet header enhance network security? 2. What are the potential challenges in implementing this method in large-scale network systems?
Original Abstract Submitted
one method includes verifying, by a gateway management system, an edge gateway, upon successful verification of the edge gateway, generating an identifier that is unique to the edge gateway, and storing the identifier in the edge gateway. when the edge gateway intercepts a packet, the edge gateway may add the unique identifier to a header of the packet. when the gateway management system receives the packet with the modified header, the gateway management system can use the identifier as a basis to perform a validation process and then either drop the packet if the validation is unsuccessful, or execute the packet if the validation process is successful.