MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Security of OSI Layers through BGP

There needs to be additional security on OSI Layers 2 & 3, such as security at those layers that only allows certain devices to use certain IP addresses – based on their MAC address, and based on encryption standards that can be employed at Layers 2 & 3 of the OSI Layer Stack Model.

An example of this would be to have a set of encryption keys, based on a vendor of devices, that must connect to a private company-hosted database system on the Internet, for the device to fully connect to connected systems. Specific encryption keys could then be employed by the specific systems, to ensure that other devices don’t connect using the same MAC address / IP address combination.

Currently there is a problem with WiFi systems being accessed by satellite transceivers, as evident by MCE123 Security Department.

There is also the issue of the same encryption key being used by multiple devices on the WiFi network. This should be changed, so there is a unique encryption key for each device, so that devices that are connected to the WiFi network can’t see traffic that is being sent or received by other devices on the same network, simply because it has the passphrase.

There could be systems that employ unique passphrases for each individual system that is connected to the WiFi network, but this would still allow abuse, such as the use of a WiFi network in proximity that gathers credentials using the same SSID, transmitting and receiving in unison with the same WiFi network, in a way that takes over devices’ connections to the WiFi network, based on its gathering credentials, and then redirecting the traffic to the original WiFi network through a tunnel. This has been done at UNH Manchester.

There could also be a security awareness of BGP, by re-creating the Layer 7 instances that are transmitting and/or receiving information, based on protocol, port number, and other characteristics that are gathered through the packets or frames through BGP border gateway systems, specifically that link between multiple nations and/or undersea cables. The reason would be to identify harmful foreign traffic, and shut down, or enable hold down timers on the intelligence, based on a border-wide protocol that shares security between all of the devices and blocks all traffic related to that instance between the border gateway and internal network resources (the U.S. Internet).

Intellectual Property Rights Management

MCE123SM Intellectual Property Development

MCE123SM invents original concepts for new high-tech technologies in our Technology Development department that can be purchased by other organizations to develop into physical products. Before you invest any time or money into refining or producing any invention that is in relation to anything you view on our website, please consult with our Legal Department. You must purchase all intellectual property relating to a technology concept before you begin work on any of our products. Failure to do so will result in Intellectual Property Theft lawsuits and cases to compensate our company for intellectual and monetary damages that we have incurred due to any third party developing any of our products.

This Intellectual Property is owned by MCE123SM Technology Development. By viewing this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. To use the Intellectual Property, you must first obtain an Intellectual Property license, and you must pay royalties for each product that is produced using the Intellectual Property license.


DMCA.com Protection Status Site Protected by SiteLock