MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Security of OSI Layers through BGP

There needs to be additional security on OSI Layers 2 & 3, such as security at those layers that only allows certain devices to use certain IP addresses – based on their MAC address, and based on encryption standards that can be employed at Layers 2 & 3 of the OSI Layer Stack Model.

An example of this would be to have a set of encryption keys, based on a vendor of devices, that must connect to a private company-hosted database system on the Internet, for the device to fully connect to connected systems. Specific encryption keys could then be employed by the specific systems, to ensure that other devices don’t connect using the same MAC address / IP address combination.

Currently there is a problem with WiFi systems being accessed by satellite transceivers, as evident by MCE123 Security Department.

There is also the issue of the same encryption key being used by multiple devices on the WiFi network. This should be changed, so there is a unique encryption key for each device, so that devices that are connected to the WiFi network can’t see traffic that is being sent or received by other devices on the same network, simply because it has the passphrase.

There could be systems that employ unique passphrases for each individual system that is connected to the WiFi network, but this would still allow abuse, such as the use of a WiFi network in proximity that gathers credentials using the same SSID, transmitting and receiving in unison with the same WiFi network, in a way that takes over devices’ connections to the WiFi network, based on its gathering credentials, and then redirecting the traffic to the original WiFi network through a tunnel. This has been done at UNH Manchester.

There could also be a security awareness of BGP, by re-creating the Layer 7 instances that are transmitting and/or receiving information, based on protocol, port number, and other characteristics that are gathered through the packets or frames through BGP border gateway systems, specifically that link between multiple nations and/or undersea cables. The reason would be to identify harmful foreign traffic, and shut down, or enable hold down timers on the intelligence, based on a border-wide protocol that shares security between all of the devices and blocks all traffic related to that instance between the border gateway and internal network resources (the U.S. Internet).

MCE123 Intellectual Property Rights Management

MCE123℠ invents original concepts for new high-tech technologies in our Technology Development department that can be purchased by other organizations to develop into physical products for a fee. Some of these concepts have already been physically developed by MCE123℠ Technology Development with our partners in the government, and are classified as national security technologies, in which we allow the government to develop the technologies as part of our company. We do allow these technologies to be purchased, however the technologies must be purchased from our company, as they are our technologies. There are government policies and government legislation that prevents the technologies from being purchased without MCE123℠ being paid for its works to invent the technologies as the government.

You must have our authorization to work on our products or services, regarding any invention you read about on our website. Please consult with the MCE123℠ Legal Department before taking any concepts from us, as we spend countless hours developing these concepts from scratch, and you must pay us to use these concepts, or even modify the concepts and use the concepts, even with significant modification. You must purchase all intellectual property relating to a technology concept before you begin work on any of our products or services. Failure to do so will result in Intellectual Property Theft lawsuits and cases to compensate our company for intellectual and monetary damages that we have incurred due to any third party developing any of our products.

This Intellectual Property is owned by MCE123℠ Technology Development. By viewing this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. To use the Intellectual Property, you must first obtain an Intellectual Property license, and you must pay royalties for each product that is produced using the Intellectual Property license.

MCE123 Technology Usage Policy Disclaimer

MCE123℠ does not support experiments using animals or human beings, at all, and all trials pertaining to or using animals or human beings using technologies invented by MCE123℠ must be agreed to in a physically pre-written contract agreed to between MCE123℠, its attorneys, and each individual, a separately pre-written contract for each technology, a separately pre-written contract for each individual, with the terms of which can be modified in various ways to ensure the security of our staff and the public, and additionally of which each individual contract can be cancelled or audited at any time and at all times by any individual or legal staff in the public. Any usage of our technologies must also be paid for to MCE123℠, or there was no agreement and thus no contract to provide any products or services, not even for scientific experimentation and educational uses. Any unauthorized usage or utilization of our technologies will be filed under the misuse clause, to cease and desist all usage of our technologies by unauthorized persons or organizations.


DMCA.com Protection Status Site Protected by SiteLock