Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
H04L-009/32
H04L-012/44
H04L-012/24
H04L-012/715
H04L-012/803
H04L-012/801
H04L-012/851
H04L-012/891
H04L-012/911
H04L-012/927
H04L-009/14
H04L-009/30
H04W-040/02
H04W-040/24
H04W-084/18
출원번호
US-0207325
(2016-07-11)
등록번호
US-9866395
(2018-01-09)
발명자
/ 주소
Bruestle, Jeremy
Tucker, Mark L.
출원인 / 주소
CoCo Communications Corp.
대리인 / 주소
Lowe Graham Jones PLLC
인용정보
피인용 횟수 :
0인용 특허 :
17
초록▼
A unifying network model with a structure and architecture configured to address security, interoperability, mobility, and resource management, including priority and quality of services is provided. The network of the network model is structured as a hierarchical mesh network, with dynamically gene
A unifying network model with a structure and architecture configured to address security, interoperability, mobility, and resource management, including priority and quality of services is provided. The network of the network model is structured as a hierarchical mesh network, with dynamically generated routing tables. The configuration of the network model optimizes routing and distributes communication load. Every device on the network is capable of being both an endpoint and a forwarder of communications. The network model may include underlying networks that are represented with one of two models, the link model or the star model. The nodes are organized in a hierarchical relationship structure to optimize throughput. The model may include a cryptographic method of dynamically assigning local network addresses.
대표청구항▼
1. A system for organizing without central administration of a network of non-trusting computing devices so that the computing devices can securely share network resources and communicate with each other, comprising: a recipient computing device; anda sending computing device that sends a signed cir
1. A system for organizing without central administration of a network of non-trusting computing devices so that the computing devices can securely share network resources and communicate with each other, comprising: a recipient computing device; anda sending computing device that sends a signed circuit establishment request to the recipient computing device via the network of non-trusting computing devices,wherein the sending computing device communicates the circuit establishment request comprising a first identity document to the recipient computing device, wherein the first identity document identifies the sending computing device to the recipient computing device, wherein the first identity document includes a first public key signed by the sending computing device, and wherein the first public key is associated with a first private key known only to the sending computing device;wherein the recipient computing device communicates a second identity document and a signed challenge with a solution to the sending computing device, wherein the second identity document identifies the recipient computing device to the sending computing device, wherein the second identity document includes a second public key signed by the recipient computing device, wherein the second public key is associated with a second private key known only to the recipient computing device, and wherein the solution of the signed challenge includes a missing portion of data which results in a cryptographic hash that is to be computationally solved by the sending computing device to complete the circuit establishment;wherein, in response to the recipient computing device sending the sending computing device the signed challenge, the sending computing device solves the signed challenge by determining the missing portion of data of the cryptographic hash;wherein the sending computing device determines the missing portion of the data of the cryptographic hash by performing a brute force search for a number of missing bits of the cryptographic hash, wherein the number of missing bits is specified by the signed challenge; andwherein a communications circuit is established between the sending computing device and the recipient computing device in response to the recipient computing device identifying the sending computing device based on the first identity document, in response to the sending computing device identifying the recipient computing device based on the second identity document, and in response to the sending computing device computationally solving the received signed challenge. 2. The system of claim 1, wherein the sending computing device sends a packet to the recipient computing device using a hierarchical dynamic routing protocol. 3. The system of claim 2, wherein the hierarchical dynamic routing protocol propagates quality of service information to intermediate computing devices. 4. The system of claim 2, wherein the hierarchical dynamic routing protocol employs a cryptographic method to encrypt communications. 5. The system of claim 2, wherein the sending computing device sends a document that is used by at least one of the recipient computing device and intermediate computing devices to make decisions. 6. The system of claim 5, wherein the document describes a quality of service. 7. The system of claim 6, wherein the document further describes rights and delegations of rights for usage of the network by at least one of the recipient computing device and the intermediate computing devices. 8. The system of claim 5, wherein the document describes a delegation of a permission. 9. The system of claim 8, wherein the delegation of the permission enables at least one of the recipient computing device and the intermediate computing devices to make a data movement decision. 10. The system of claim 2, wherein the hierarchical dynamic routing protocol can use either a reliable or unreliable underlying communications protocol. 11. The system of claim 1, wherein the network is organized as a hierarchical mesh network. 12. The system of claim 11, wherein the sending computing device, the recipient computing device, and intermediate computing devices of the hierarchical mesh network are each identified by a name comprising a set of identifiers separated by a separator. 13. The system of claim 12, wherein the identifiers are organized in the name from specific to general. 14. The system of claim 11, wherein the hierarchical mesh network includes a meta-node. 15. The system of claim 14, wherein the meta-node indicates a computing device and a network of computing devices, and wherein the indicated computing device and the indicated network of computing devices represents peers in a hierarchy. 16. A method comprising: sending, from a sending computing device, a signed circuit establishment request to a recipient computing device via a network of non-trusting computing devices, wherein the signed circuit establishment request includes a first identity document that identifies the sending computing device to the recipient computing device, and wherein the first identity document includes a first public key signed by the sending computing device, and wherein the first public key is associated with a first private key known only to the sending computing device;receiving, at the sending computing device, a second identity document and a signed challenge with a solution communicated from the recipient computing device, wherein the second identity document identifies the recipient computing device to the sending computing device, wherein the second identity document includes a second public key signed by the recipient computing device, wherein the second public key is associated with a second private key known only to the recipient computing device, and wherein the solution of the signed challenge includes a missing portion of data which results in a cryptographic hash that is to be computationally solved by the sending computing device to complete the circuit establishment;solving, by the sending computing device and in response to receiving the signed challenge, the signed challenge by determining the missing portion of data of the cryptographic hash by performing a brute force search for a number of missing bits of the cryptographic hash, wherein the number of missing bits is specified by the signed challenge; andestablishing a communications circuit between the sending computing device and the recipient computing device in response to the recipient computing device identifying the sending computing device based on the first identity document, in response to the sending computing device identifying the recipient computing device based to the second identity document, and in response to the sending computing device computationally solving the received signed challenge. 17. The method of claim 16, further comprising: sending a packet from the sending computing device to the recipient computing device using a hierarchical dynamic routing protocol. 18. The method of claim 16, further comprising: sending a document from the sending computing device to the recipient computing device, wherein the document is used by intermediate computing devices to make decisions. 19. The system of claim 18, wherein the document describes rights and delegations of rights for usage of the network by at least one of the recipient computing device and the intermediate computing devices. 20. The system of claim 18, wherein the document describes a delegation of a permission, and wherein the delegation of the permission enables at least one of the recipient computing device and the intermediate computing devices to make a data movement decision.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (17)
Cain, Joseph Bibb, Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using ad-hoc on-demand distance vector routing (AODV).
Phillips, Marc S.; Lioy, Marcello; Hsu, Raymond Tah-Shen, System and method for facilitating device authentication in a wireless communications system.
Traversat,Bernard A.; Gong,Li; Yeager,William J.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Joy,William N.; Clary,Michael J., System using peer discovery and peer membership protocols for accessing peer-to-peer platform resources on a network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.