Verizon Communications Inc.
Brokered communication protocol using information theoretic coding for security
Last updated:
Abstract:
A network device receives a device-specific connectivity restriction policy that specifies rules for exercising control over an identified first device's connectivity during communication using a brokered communication protocol, and receives, from the first device, a request to access the brokered communication protocol to enable communication with at least one second device. The network device connects, based on the access request, the first device to the at least one second device to allow the first device to read or write data using the brokered communication protocol. The network device monitors traffic associated with the first device during the first device's use of the brokered communication protocol to read data from, or write data to, the at least one second device, and controls the traffic associated with the first device based on the traffic monitoring and application of the device-specific connectivity restriction policy.
Utility
17 Dec 2019
1 Jun 2021