MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Upgrade DHCP Protocol to be more Security Friendly

There could be modifications to the DHCP Protocol, such as having it work with WEP/WPA verification, and even having the system have a blanket control over all switching operations, so that rogue DHCP servers are kept from accessing the network. This could be done with a Layer 4 switch, by blocking DHCP services if they don’t originate from the trusted DHCP server. The switch, whether it control a Wireless Access Point, and/or multiple WAPs, and/or wired ports, could prevent someone from plugging in another router into the network to create an internal network that is mapped via IP (Layer 3) – Network Address Translation (NAT) and TCP (Layer 4) – Port Address Translation (PAT) – which could theoretically be used to re-route traffic away from the services that are defined by the authorized DHCP server, and pass them through a proxy-type of high-level intelligent routing that could steal logins and passwords, not to mention financial information, social security numbers, and any other information transmitted over the network.

There should be modifications to the way that DHCP works for client systems as well, such as specifying the DHCP server from a local DNS server (Layer 7) that operates with Layer 3 (Routing) to completely change how a client must access DHCP services. It could basically require that the client register in the Layer 3 table with a temporary IP address, while its security is checked – and as it negotiates its connection with the actual DHCP server, through a Layer 7 verification method, it is not allowed to communicate with other devices on the network. The systems could take on a rather forensic analysis of the network interface of the client, to determine if it is spoofing its MAC address – such as requesting a security key from the device that is verified by a third party such as Verisign – even a company like Dyn could implement this type of Layer 7 security negotiation. And the connection to the Internet could be limited so much, that only the security parameters can be communicated, in the case that the network isn’t attached to the outside world – such as an internal Financial Services company.

There could be other methods similar, or dissimilar to this, that could also be used. Obviously it’s going to take a major organization, such as IEEE and/or ICAAN, to implement changes like this.

MCE123 Intellectual Property Rights Management

MCE123℠ invents original concepts in our Technology Development department, such as for new high-tech technologies, which can be purchased ahead of time by other organizations to develop into physical products for a fee. Some of these concepts have already been intellectually developed by MCE123℠ Technology Development, originally with all of the intrinsic qualities, developed naturally, over a long period of time, based on our own original thoughts about wanting to have these technologies, for our own professional usage, within our organization.

We require a physical contract to be in-person agreed to, stipulated through e-mail communications between us and our attorneys, reviewed by us, with our attorneys, and then agreed to with our attorneys present, with the organization that wishes to develop these technologies, before any work can begin on physically making these technologies, including any prototyping, per our internal policies, the entire time, including at our attorney offices.

We also require that anyone or any organization that works on intellectually developing any of our technologies, must have a contract agreed to with our company attorneys, ahead of time. Otherwise, people are not authorized by our company to work on developing, or engineering, or prototyping, or building, or manufacturing, or selling, or promoting, or marketing our technologies, even as other companies or other individuals.

Everyone must have our authorization, through a physical contract, agreed to with our attorneys present with us, in-person, to work on our products or services. These contracts must be stipulated ahead of time, in physical writing to our attorneys, regarding any invention you read about on our website. Please consult with the MCE123℠ Legal Department before using any concepts from us, as we spend countless hours developing these concepts from scratch, and you must pay us to use these concepts, or even modify the concepts and use the concepts, even through "revisions" or "modifications" or "improvements", even "improvements" that are "dangerous", even with significant "modifications" or "enhancements", even through "re-invention of the wheel". All works that derive from our works, including "extrapolations" or "derivatives", are our property if you do not follow due process by obtaining physically written permission from us ahead of time, in a contract that is notarized with us present, in addition to our company attorneys. Otherwise, you must purchase all intellectual property relating to any technology concept before you begin work on any of our products or our services. Failure to do so will result in Intellectual Property lawsuits and cases from our attorneys to compensate our company for intellectual and monetary damages that we have incurred due to any third party developing, using, or misusing any of our products or any of our services, even as other "facsimile" companies or "cloned" individuals. Misuse of our products or our services, including not having paid us to make them, including because of intellectual property theft, will result in the products and the services being taken away by law enforcement.

This Intellectual Property is owned by MCE123℠ Technology Development. By viewing this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. To use the Intellectual Property, you must first obtain an Intellectual Property license, and you must pay royalties for each product that is produced using the Intellectual Property license.

MCE123 Technology Usage Policy Disclaimer

MCE123℠ does not support experiments using animals or human beings, at all, and all trials pertaining to or using animals or human beings using technologies invented by MCE123℠ must be agreed to in a physically pre-written contract agreed to between MCE123℠, its attorneys, and each individual, a separately pre-written contract for each technology, a separately pre-written contract for each individual, with the terms of which can be modified in various ways to ensure the security of our staff and the public, and additionally of which each individual contract can be cancelled or audited at any time and at all times by any individual or legal staff in the public. Any usage of our technologies must also be paid for to MCE123℠, or there was no agreement and thus no contract to provide any products or services, not even for scientific experimentation and educational uses. Any unauthorized usage or utilization of our technologies will be filed under the misuse clause, to cease and desist all usage of our technologies by unauthorized persons or organizations.


DMCA.com Protection Status Site Protected by SiteLock