US 12,034,736 B2
Detecting clock synchronization attacks with pseudo-randomization of frames in the protected window
Marcio Juliato, Portland, OR (US); Javier Perez-Ramirez, North Plains, OR (US); Mikhail Galeev, Beaverton, OR (US); Christopher Gutierrez, Hillsboro, OR (US); Dave Cavalcanti, Portland, OR (US); Manoj Sastry, Portland, OR (US); and Vuk Lesi, Cornelius, OR (US)
Assigned to INTEL CORPORATION, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Sep. 24, 2021, as Appl. No. 17/484,330.
Prior Publication US 2022/0014529 A1, Jan. 13, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/40 (2022.01); H04L 69/22 (2022.01); H04L 69/28 (2022.01)
CPC H04L 63/105 (2013.01) [H04L 9/0656 (2013.01); H04L 63/1483 (2013.01); H04L 69/22 (2013.01); H04L 69/28 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computing-implemented method, comprising:
generating a pseudo-random number (PRN); and
transmitting a message during a protected transmission window of a data stream based on the PRN and a time buffer (TB), a plurality of switching nodes communicating via the data stream, wherein a one of the plurality of switching nodes can independently generate the PRN.