WO2018187212A1 - Methods and apparatus for hypersecure last mile communication - Google Patents
Methods and apparatus for hypersecure last mile communication Download PDFInfo
- Publication number
- WO2018187212A1 WO2018187212A1 PCT/US2018/025695 US2018025695W WO2018187212A1 WO 2018187212 A1 WO2018187212 A1 WO 2018187212A1 US 2018025695 W US2018025695 W US 2018025695W WO 2018187212 A1 WO2018187212 A1 WO 2018187212A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- data
- communication
- network
- sdnp
- Prior art date
Links
- 230000006854 communication Effects 0.000 title claims abstract description 1021
- 238000004891 communication Methods 0.000 title claims abstract description 1021
- 238000000034 method Methods 0.000 title claims abstract description 332
- 230000001413 cellular effect Effects 0.000 claims description 121
- 238000003860 storage Methods 0.000 description 323
- 230000032258 transport Effects 0.000 description 188
- 238000004422 calculation algorithm Methods 0.000 description 160
- 230000011664 signaling Effects 0.000 description 158
- 230000006870 function Effects 0.000 description 117
- 230000008569 process Effects 0.000 description 108
- 230000000875 corresponding effect Effects 0.000 description 83
- 238000012544 monitoring process Methods 0.000 description 77
- 238000002156 mixing Methods 0.000 description 62
- 238000012384 transportation and delivery Methods 0.000 description 57
- 239000003795 chemical substances by application Substances 0.000 description 56
- 239000000835 fiber Substances 0.000 description 54
- 230000003068 static effect Effects 0.000 description 53
- 238000012795 verification Methods 0.000 description 45
- 230000008859 change Effects 0.000 description 34
- 238000012546 transfer Methods 0.000 description 34
- 230000000694 effects Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 27
- 238000005516 engineering process Methods 0.000 description 25
- 230000002441 reversible effect Effects 0.000 description 25
- 230000005540 biological transmission Effects 0.000 description 22
- 230000001934 delay Effects 0.000 description 21
- 230000008901 benefit Effects 0.000 description 20
- 238000009826 distribution Methods 0.000 description 20
- 238000003780 insertion Methods 0.000 description 20
- 230000037431 insertion Effects 0.000 description 20
- 238000013500 data storage Methods 0.000 description 19
- 238000013459 approach Methods 0.000 description 18
- 239000000969 carrier Substances 0.000 description 18
- 238000013475 authorization Methods 0.000 description 17
- 238000002360 preparation method Methods 0.000 description 16
- 208000015181 infectious disease Diseases 0.000 description 15
- 238000013507 mapping Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 15
- 238000011144 upstream manufacturing Methods 0.000 description 15
- 238000007726 management method Methods 0.000 description 14
- 239000013307 optical fiber Substances 0.000 description 14
- 230000001419 dependent effect Effects 0.000 description 13
- 239000002957 persistent organic pollutant Substances 0.000 description 11
- 230000008093 supporting effect Effects 0.000 description 11
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 10
- 230000001010 compromised effect Effects 0.000 description 10
- 238000012217 deletion Methods 0.000 description 10
- 230000037430 deletion Effects 0.000 description 10
- 238000013467 fragmentation Methods 0.000 description 10
- 238000006062 fragmentation reaction Methods 0.000 description 10
- 230000001965 increasing effect Effects 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 10
- 230000004044 response Effects 0.000 description 10
- 230000009286 beneficial effect Effects 0.000 description 9
- 238000012790 confirmation Methods 0.000 description 9
- 239000012634 fragment Substances 0.000 description 9
- 238000011835 investigation Methods 0.000 description 9
- 230000009471 action Effects 0.000 description 8
- 230000033228 biological regulation Effects 0.000 description 8
- 230000000670 limiting effect Effects 0.000 description 8
- 239000000203 mixture Substances 0.000 description 8
- 230000009131 signaling function Effects 0.000 description 8
- 244000035744 Hura crepitans Species 0.000 description 7
- 241000700605 Viruses Species 0.000 description 7
- 229910052802 copper Inorganic materials 0.000 description 7
- 239000010949 copper Substances 0.000 description 7
- 239000000463 material Substances 0.000 description 7
- 230000010363 phase shift Effects 0.000 description 7
- 238000012423 maintenance Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 238000011084 recovery Methods 0.000 description 6
- 238000009877 rendering Methods 0.000 description 6
- 235000008694 Humulus lupulus Nutrition 0.000 description 5
- 229920000168 Microcrystalline cellulose Polymers 0.000 description 5
- 230000002457 bidirectional effect Effects 0.000 description 5
- 208000017763 cutaneous neuroendocrine carcinoma Diseases 0.000 description 5
- 230000002354 daily effect Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 235000019813 microcrystalline cellulose Nutrition 0.000 description 5
- 238000013439 planning Methods 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000012550 audit Methods 0.000 description 4
- 230000010267 cellular communication Effects 0.000 description 4
- 239000000470 constituent Substances 0.000 description 4
- 230000001276 controlling effect Effects 0.000 description 4
- 230000006378 damage Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 230000018109 developmental process Effects 0.000 description 4
- 239000003814 drug Substances 0.000 description 4
- 229940079593 drug Drugs 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 4
- 238000009434 installation Methods 0.000 description 4
- 230000007774 longterm Effects 0.000 description 4
- 238000013508 migration Methods 0.000 description 4
- 230000005012 migration Effects 0.000 description 4
- 238000012552 review Methods 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 241000283086 Equidae Species 0.000 description 3
- 241000764238 Isis Species 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000001427 coherent effect Effects 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000005336 cracking Methods 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 230000000593 degrading effect Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 3
- 239000000945 filler Substances 0.000 description 3
- 238000007667 floating Methods 0.000 description 3
- 230000001771 impaired effect Effects 0.000 description 3
- 230000009545 invasion Effects 0.000 description 3
- 230000033001 locomotion Effects 0.000 description 3
- 239000000047 product Substances 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000003595 spectral effect Effects 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 238000010200 validation analysis Methods 0.000 description 3
- ABEXEQSGABRUHS-UHFFFAOYSA-N 16-methylheptadecyl 16-methylheptadecanoate Chemical compound CC(C)CCCCCCCCCCCCCCCOC(=O)CCCCCCCCCCCCCCC(C)C ABEXEQSGABRUHS-UHFFFAOYSA-N 0.000 description 2
- 241000237858 Gastropoda Species 0.000 description 2
- ATJFFYVFTNAWJD-UHFFFAOYSA-N Tin Chemical compound [Sn] ATJFFYVFTNAWJD-UHFFFAOYSA-N 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 2
- 238000004378 air conditioning Methods 0.000 description 2
- 238000012152 algorithmic method Methods 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 2
- 230000001174 ascending effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 239000000872 buffer Substances 0.000 description 2
- 230000003139 buffering effect Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 239000013256 coordination polymer Substances 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000011840 criminal investigation Methods 0.000 description 2
- 238000007418 data mining Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000002716 delivery method Methods 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 230000008030 elimination Effects 0.000 description 2
- 238000003379 elimination reaction Methods 0.000 description 2
- 238000005538 encapsulation Methods 0.000 description 2
- 230000012010 growth Effects 0.000 description 2
- 238000010438 heat treatment Methods 0.000 description 2
- 238000005417 image-selected in vivo spectroscopy Methods 0.000 description 2
- 230000036039 immunity Effects 0.000 description 2
- 230000001976 improved effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000008595 infiltration Effects 0.000 description 2
- 238000001764 infiltration Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000012739 integrated shape imaging system Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- 230000001568 sexual effect Effects 0.000 description 2
- 230000007480 spreading Effects 0.000 description 2
- 238000003892 spreading Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- KKIMDKMETPPURN-UHFFFAOYSA-N 1-(3-(trifluoromethyl)phenyl)piperazine Chemical compound FC(F)(F)C1=CC=CC(N2CCNCC2)=C1 KKIMDKMETPPURN-UHFFFAOYSA-N 0.000 description 1
- IRLPACMLTUPBCL-KQYNXXCUSA-N 5'-adenylyl sulfate Chemical compound C1=NC=2C(N)=NC=NC=2N1[C@@H]1O[C@H](COP(O)(=O)OS(O)(=O)=O)[C@@H](O)[C@H]1O IRLPACMLTUPBCL-KQYNXXCUSA-N 0.000 description 1
- RZVHIXYEVGDQDX-UHFFFAOYSA-N 9,10-anthraquinone Chemical compound C1=CC=C2C(=O)C3=CC=CC=C3C(=O)C2=C1 RZVHIXYEVGDQDX-UHFFFAOYSA-N 0.000 description 1
- 241001108921 Asclepias asperula Species 0.000 description 1
- 108020004414 DNA Proteins 0.000 description 1
- 208000034423 Delivery Diseases 0.000 description 1
- 241001331845 Equus asinus x caballus Species 0.000 description 1
- 208000001836 Firesetting Behavior Diseases 0.000 description 1
- 108091092724 Noncoding DNA Proteins 0.000 description 1
- 241000271897 Viperidae Species 0.000 description 1
- 241000607479 Yersinia pestis Species 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000005267 amalgamation Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 235000012813 breadcrumbs Nutrition 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- JLQUFIHWVLZVTJ-UHFFFAOYSA-N carbosulfan Chemical compound CCCCN(CCCC)SN(C)C(=O)OC1=CC=CC2=C1OC(C)(C)C2 JLQUFIHWVLZVTJ-UHFFFAOYSA-N 0.000 description 1
- 238000004040 coloring Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 239000012050 conventional carrier Substances 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 235000013365 dairy product Nutrition 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000881 depressing effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000002592 echocardiography Methods 0.000 description 1
- 238000004870 electrical engineering Methods 0.000 description 1
- 230000003028 elevating effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000037433 frameshift Effects 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 229910000078 germane Inorganic materials 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000003116 impacting effect Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000005865 ionizing radiation Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000002147 killing effect Effects 0.000 description 1
- 238000004900 laundering Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000002044 microwave spectrum Methods 0.000 description 1
- 230000001343 mnemonic effect Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 230000003071 parasitic effect Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 239000002244 precipitate Substances 0.000 description 1
- 230000001376 precipitating effect Effects 0.000 description 1
- 230000002028 premature Effects 0.000 description 1
- 238000010926 purge Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 238000009987 spinning Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
- 230000029305 taxis Effects 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 230000035899 viability Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/14—Multichannel or multilink protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/60—Router architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1033—Signalling gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1046—Call controllers; Call servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Definitions
- This invention relates to the methods and apparatus to facilitate HyperSecure "last mile" communication between a 8device and a gateway to a network or cloud.
- Improving means of communication have fueled the progress of civilization from civilization's earliest beginnings. From the use of couriers and messengers traveling by foot or horseback; through mail postal delivery by train, truck and airplane; to the advent of the telegram and telegraph, telephone, radio, television, computers, the cell phone; the Internet, email and World Wide Web; and more recently, through social media, voice- over-Internet, machine-to-machine (M2M) connectivity, the Internet of Things (IoT), and the Internet of Everything (IoE), communication has always led the way in exploiting the newest technologies of the day. With each new generation of telecommunications technology employed, the number of people connected and the rate by which information is transferred among them has also increased.
- M2M machine-to-machine
- IoT Internet of Things
- IoE Internet of Everything
- Another key consideration of a communication network is its ability to insure privacy, safety, and security to the client using it.
- communication technology has evolved, so too has the sophistication of criminals and "hackers” intending to inflict mischief, disrupt systems, steal money, and accidentally or maliciously harm others.
- Credit card fraud, stolen passwords, identity theft, and the unauthorized publicizing of confidential information, private pictures, files, emails, text messages, and private tweets (either stolen to embarrass or blackmail victims) are but a few examples of modern cyber-crime.
- Electronic communication involves a variety of hardware components or devices connected into networks of wires, radio, microwave, or optical fiber links. Information is passed from one device to others by sending electrical or electromagnetic energy through this network, using various methods to embed or encode informational "content" into the data stream.
- the laws of physics set the maximum data rate of such networks at the speed of light, but in most cases practical limitations in data encoding, routing and traffic control, signal-to-noise quality, and overcoming electrical, magnetic and optical noise and unwanted parasitics disturb or inhibit information flow, limiting the communication network's capability to a fraction of its ideal performance.
- electronic data communication was first achieved using dedicated "hardwired” electrical connections forming a communication "circuit" between or among two or more electrically connected devices.
- a mechanical switch was used to manually make and break a direct current (DC) electrical circuit, magnetizing a solenoid which in turned moved a metallic lever, causing the listening device or "relay" to click in the same pattern that the sender depressed the switch.
- the sender then used an agreed upon language, i.e. Morse code, to encode information into the pulse stream.
- Morse code a series of long and short pulses, called dots and dashes
- alternating current AC
- the telephone network comprised two magnetic transducers connected by an electrical circuit where each magnetic transducer comprised a movable diaphragm and coil, or "voice coil", surrounded by a fixed permanent magnet enclosure.
- each magnetic transducer comprised a movable diaphragm and coil, or "voice coil”, surrounded by a fixed permanent magnet enclosure.
- voice coil When speaking into the transducer, changes in air pressure from the sound causes the voice coil to move back and forth within the surrounding magnetic field inducing an AC current in the coil.
- the time-varying current flowing in the voice coil induces an identical waveform and time-varying magnetic field opposing the surrounding magnetic field causing the voice coil to move back-and-forth in the same manner as the transducer capturing the sound.
- the resulting movement reproduces the sound in a manner similar to the device capturing the sound.
- the transducer when the transducer is converting sound into electrical current, it is operating as a microphone and when the transducer is converting electrical current into sound it is operating as a speaker.
- the conducted electrical signal is analogous to the audio waveform carried as an elemental pressure wave in air, i.e. sound, today such electrical signals are referred to as analog signals or analog waveforms.
- radio communication commenced with radio broadcasting in the 1920s.
- the broadcast was unidirectional, emanating from radio broadcast stations on specific government-licensed frequencies, and received by any number of radio receivers tuned to that specific broadcast frequency or radio station.
- the broadcasted signal carried an analog signal using either amplitude modulation (AM) or later by frequency modulation (FM) methods, each on dedicated portions of the licensed radio spectrum.
- AM amplitude modulation
- FM frequency modulation
- a protocol called half-duplex or push-to-talk is commonly used for channel management, letting anyone exclusively transmit on a specific channel on a first-come first serve basis.
- Radios send their data over specific frequency "channels" to a central radio tower, where the tower amplifies and repeats the signal, sending it on to the entire radio network.
- the number of available frequencies carrying information over the broadcast area sets the total bandwidth of the system and the number of users able to independently communicate on the radio network at one time.
- Radio formats such as EDACS and TETRA emerged capable of concurrently enabling one-to-one, one-to-many, and many- to-many communication modes.
- Cellular communication also quickly migrated to digital formats such as GPRS, as did TV broadcasting.
- IP Internet protocol
- the resulting evolution of circuit-switched telephony is schematically, as a "public switched telephone network" or PSTN comprising an amalgamation of radio, cellular, PBX, and POTS connections and sub-networks, each comprising dissimilar technologies.
- PSTN public switched telephone network
- the network includes PSTN gateways connected by high bandwidth trunk lines and, by example, connected through wire-line connections to POTS gateways, cellular network base stations PBX and two-way radio networks.
- Each sub-network operates independently, driving like-kind devices.
- the PSTN also connects to circuit-switched cellular networks over base stations 17 running AMPS, CDMA and GSM analog and digital protocols.
- circuit-switched cellular network base stations connect using standardized cellular radio frequencies of cellular links to mobile devices such as cell phones.
- the circuit-switched cellular network base stations may also connect to tablets, concurrently delivering low speed data and voice.
- Two-way radio networks such as TETRA and EDACS connect the PSTN to handheld radios and larger in-dash and desktop radios via high-power radio towers and cellular link.
- Such two-way radio networks are also referred to as professional communication networks and services, and target governments, municipalities, and emergency responders rather than consumers.
- the terms "desktop,” “tablet' and “notebook” are used as a shorthand reference to the computers having those names.
- two-way radio network uses dedicated RF radio channels (rather than phone numbers) to establish radio links between towers and the mobile devices it serves.
- RF radio channels rather than phone numbers
- PSTN networks flexibly interconnect sub-networks of diverse technologies. It is this very diversity that defines an intrinsic weakness of today's circuit switched networks - interoperability among sub-networks. Because the various sub- networks do not communicate with any common control protocol or language, and since each technology handles the transport of data and voice differently, the various systems are essentially incompatible except for their limited capability of placing a phone call through the PSTN backbone or trunk lines. For example, during the September 11 terrorist attack on the World Trade Center in New York City, many emergency responders from all over the USA flocked to Manhattan in an attempt to help fight the disaster, only to learn their radio communication system and walkie-talkies were incompatible with volunteers from other states and cities, making it impossible to manage a centralized command and control of the relief effort. With no standardization in their radio's communication protocol, their radios simply wouldn't connect to one another.
- the post office represents the similar metaphor for packet-switch communication networks.
- text, data, voice, and video are converted into files and streams of digital data, and this data is then subsequently parsed into quantized "packets" of data to be delivered across the network.
- the delivery mechanism is based on electronic addresses that uniquely identify where the data packet is going to and where it is coming from.
- the format and communication protocol is also designed to include information as to the nature of the data contained in the packet including content specific to the program or application for which it will be used, and the hardware facilitating the physical links and electrical or radio connections carrying the packets.
- IP Internet Protocol
- OTT over-the-top
- OTT telephony suffers from poor quality of service (QoS) resulting from uncontrolled network latency, poor sound quality, dropped calls, echo, reverberation, feedback, choppy sound, and oftentimes the inability to even initiate a call.
- QoS quality of service
- the poor performance of OTT communication is intrinsically not a weakness of the VoIP based protocol but of the network itself, one where OTT carriers have no control over the path which data takes or the delays the communication encounters.
- OTT carriers cannot insure performance or QoS because OTT communication operates as an Internet hitchhiker.
- the companies able to best utilize VoIP based communications today are the long distance telephone carriers with dedicated low-latency hardware-based networks, the very telco' s that have the least motivation to do so.
- Internet Protocol manages the ability of the network to deliver the payload to its destination, without any care or concern for what information is being carried or what application will use it, avoiding altogether any need for customized software interfaces and expensive proprietary hardware.
- application related payloads have established predefined formats, e.g. for reading email, for opening a web page on a browser, for viewing a picture or video, for watching a flash file or reading a PDF document, etc.
- the Internet can be considered an "open source” communication platform, able to communicate with the widest range of devices ever connected, ranging from computers, to cell phones, from cars to home appliances.
- the most recent phrase describing this universal connectivity is the "Internet of Everything" or IoE.
- a large array of computers include high-speed cloud servers and cloud data storage interconnected by high bandwidth connections, typically optical fiber, among with countless other servers (not shown) to form the Internet cloud.
- the cloud metaphor is appropriate because there is no well-defined boundary defining which servers are considered part of the cloud and which ones are not.
- servers come online while others may be taken offline for maintenance, all without any impact to the Internet's functionality or performance. This is the benefit of a truly redundant distributed system - there is no single point of control and therefore no single point of failure.
- the cloud may be connected to the user or connected device through any variety of wire-line, WiFi or wireless links.
- Wireless packet-switched capable telephonic communication comprises cellular protocols 3G including HSUPA and HSDPA, as well as 4G/LTE.
- LTE, or long-term-evolution refers to the network standards to insure interoperability with a variety of cellular protocols including the ability to seamlessly hand-off phone calls from one cell to another cell even when the cells are operating with different protocols.
- last-mile refers to the link between any type of client device, such as a tablet, desktop or cell phone, and a cloud server.
- the term “first-mile” is sometimes also used to specify the link between the device originating the data transmission and the cloud server. In such cases the “last-mile” link is also the "first-mile” link.
- WiFi access points connect smartphones,, tablets, notebooks , desktops or connected appliances and may be used in localized wireless applications in homes, cafes, restaurants, and offices.
- WiFi comprises communication operating in accordance with IEEE defined standards for single-carrier frequency specifications 802.11a, 802.11b, 802. l lg, 802.11 ⁇ , and most recently for the dual frequency band 802.1 lac format.
- WiFi security based on a simple static login key, is primarily used to prevent unauthorized access of the connection, but is not intended to indefinitely secure data from sniffing or hacking.
- Wire-line distribution unit i.e. routers
- the wire-line connection may comprise fiber or coaxial cable distribution to the home, office, factory, or business connected locally though a modem to convert high- speed data (HSD) connection into WiFi, Ethernet, or twisted pair copper wire.
- HSD high- speed data
- DSL digital subscriber line
- packet-switched communications In contrast to circuit switched networks that establish and maintain a direct connection between devices, packet-switched communications uses an address to "route" the packet through the Internet to its destination. As such, in packet-switched
- the first data packet sent from the notebook to a local WiFi router via wireless connection is directed toward array of DNS servers, DNS being an acronym for domain name servers.
- DNS being an acronym for domain name servers.
- the purpose of the array of DNS servers is to convert the textual name or phone number of the destination device, in this case the desktop, into an IP address. Once identified, the IP address is passed from the array of DNS servers back to the source address, i.e. to the notebook. This address, which clearly identifies the communicating device, is used in routing the data packets through the network.
- the notebook assembles its IP data packets and commences sending them sequentially to their destination, for example first through WiFi radio to a local WiFi router and then subsequently across the network of routers and servers acting as intermediary routers and computer servers to its destination.
- the routers and computer servers network operating either as nodes in the Internet or as a point of presence or POP, i.e. gateways of limited connectivity capable of accessing the Internet. While some routers or servers acting as a POP connect to the Internet through only a small number of adjacent devices, other servers are interconnected to numerous devices, and are sometimes referred to as a "super POP".
- POP in network vernacular should not be confused with the application name POP, or plain old post office, used in email applications.
- Each router or server acting as a router, contains in its memory files a routing table identifying the IP addresses it can address and possibly also the addresses that the routers above it can address. These routing tables are automatically downloaded and installed in every router when it is first connected to the Internet and are generally not loaded as part of routing a packet through the network.
- POP IP address
- the router reads enough of the IP address, generally the higher most significant digits of the address, to know where to next direct the packet on its journey to its destination. For example a packet headed to Tokyo from New York may be routed first through Chicago then through servers in San Francisco, Los Angeles, or Seattle before continuing on to Tokyo. Since the number of routers a packet traverses and the available data rate of each of the connections between routers varies by infrastructure and by network traffic and loading, there is no way to determine a priori which path is fastest or best.
- a router's preferences may prioritize sending packets to other routers owned by the same company, balancing the traffic among connections to adjacent routers, finding the shortest delay to the next router, directing business to strategic business partners, or creating an express lane for VIP clients by skipping as many intermediate routers as possible.
- a packet enters a router there is no way to know whether the routing choices made by the specific POP were made in the best interest of the sender or of the network server operator.
- the route a packet takes is a matter of timing and of luck.
- the routing and resulting QoS can vary substantially based on even a small perturbation in the path, i.e. in non-linear equations the so-called "butterfly effect".
- the packet from New York goes through "router A” in Chicago and because of temporary high traffic in California, it is forwarded to Mexico City rather than to California.
- the Mexico City router then in turn forwards the IP packet to Singapore, from where it is finally sent to Tokyo.
- the very next packet sent is routed through Chicago "router B", which because of low traffic at that moment directs the packet to San Francisco and then directly to Tokyo in only two hops.
- the second packet may arrive in Tokyo before the first one routed through a longer more circuitous path.
- This example highlights the problematic issue of using the Internet for real-time communication such as live video streaming or VoIP, namely that the Internet is not designed to guarantee the time of delivery or to control network delays in performing the delivery. Latency can vary from 50ms to over 1 second just depending on whether a packet is routed through only two servers or through fifteen.
- the Internet's lack of routing control is problematic for real-time applications and is especially an issue of poor QoS for OTT carriers - carriers trying to provide Internet based telephony by catching a free ride on top of the Internet's infrastructure. Since the OTT carrier doesn't control the routing, they can't control the delay or network latency. Another issue with packet-switched communication, is that it is easy to hijack data without being detected. If a pirate intercepts a packet and identifies its source or destination IP address, they can use a variety of methods to intercept data from
- IP packet contains digital information defining the physical connection between devices, the way the data is organized to link the devices together, the network routing of the packet, a means to insure the useful data (payload) was delivered accurately and what kind of data is in the payload, and then the payload data itself to be used by various application programs.
- the IP packet is sent and received in sequence as a string of serial digital bits, organized in a specific manner called the Internet Protocol as established by various standards committees including the Internet Engineering Task Force or IETF among others.
- the standard insures that any IP packet following the prescribed protocol can communicate with and be understood by any connected device complying with the same IP standard. Insuring communication and interoperability of Internet connected devices and applications are hallmarks of the Internet, and represent a guiding principal of the Open Source Initiative or OSI, to prevent any company, government, or individual from taking control of the Internet or limiting its accessibility or its functionality.
- the OSI model an abstraction comprising seven layers of functionality, precisely prescribes the format of an IP packet and what each segment of the packet is used for. Each portion or "segment" of the IP packet corresponds to data applying to function of the particular OSI layer 4.
- the roles of the seven OSI layers are as follows:
- Layer 1 the physical or PHY layer, comprises hardware specific information articulating the physical nature of communication as electrical, RF and optical signals and the way those signals can be converted into bits for use in the communicating system. Converting a specific communication medium such as WiFi radio, Ethernet, serial ports, optical fiber, 3G or 4G cellular radio, DSL on twisted pair copper wire, USB, Bluetooth, cable or satellite TV, or digital broadcasts of audio, video, or multimedia content into a bit stream is the task of the PHY layer.
- the preamble represents Layer 1 data, and is used to synchronize the entire data packet or "frame", to the hardware transceiving it.
- the data link layer comprising bits arranged as frames, defines the rules and means by which bit streams delivered from PHY Layer 1 are converted into interpretable data.
- WiFi radio based bit streams may comply with any number of IEEE defined standards including 802.1 la, b, g, n, and ac; 3G radio communication may be modulated using high-speed packet access methods HSDPA or HSUPA; modulated light in an optical fiber or electrical signals on a coaxial cable can be decoded into data in accordance with the DOCSIS 3 standard; etc.
- Layer 2 data encapsulates its payload into a datagram with a leading "data link header”, and a trailing "data link trailer”, together defining when the encapsulated payload being delivered starts and stops, as well as to insure nothing was lost in the transmission process.
- One key element of Layer 2 data is the MAC or media access address, used to direct the data traffic to and from specific Ethernet addresses, RF links, or hardware specific transceiver links.
- Layer 3 the network or Internet layer, comprises packets called “datagrams” containing Internet Protocol (IP) information used for routing an IP packet including whether the packet contains IPv4 or IPv6 data and the corresponding source and destination IP addresses as well as information regarding the nature of the payload contained within the packet, i.e.
- IP Internet Protocol
- Layer 3 also includes a function to prevent immortals - IP packets that are never delivered yet never die.
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- Layer 3 also includes a function to prevent immortals - IP packets that are never delivered yet never die.
- a specific type of Layer 3 packet, ICMP is used to diagnose the condition of a network, including the well-known "ping" function.
- IP packet Layer 3 comprises "IP header" 82 and encapsulates its payload comprising transport and upper layer segments.
- ⁇ Layer 4 the transport layer, comprises segments of data defining the nature of the connection between communicating devices, where UDP defines a minimal description of the payload for connectionless communication, namely how large is the payload, were any bits lost, and what application service (port) will use the delivered data. UDP is considered connectionless because it does not confirm delivery of the payload, relying instead on the application to check for errors or lost data. UDP is typically used for time sensitive communication such as broadcasting, multicasting, and streaming where resending a packet is not an option. In contrast, TCP insures a virtual connection by confirming the packet and payload are reliably delivered before the next packet is sent, and resends dropped packets.
- TCP also checks the data integrity of the delivered packets using a checksum, and includes provisions for reassembling out-of-sequence packets in their original order.
- Both TCP and UDP define the source and destination ports, a description of an upper layer service or application, e.g. a web server or an email server, concerned with the information contained within the Layer 4 payload.
- Layer 4 comprises the TCP / UDP header and encapsulates its data / payload comprising content used by upper OSI Layers 5, 6 and 7.
- Layers 5, 6 and 7, the upper or application layers describe the content delivered by the Internet as data / payload.
- Layer 7, the "application” layer represents the highest level in the OSI model and relies on the six underlying OSI layers to support both open source and proprietary application software.
- Commonly used Level 7 applications include email using SMTP, POP or IMAP, web browsing using HTTP (Chrome, Safari, Explorer, Firefox), file transfers using FTP, and terminal emulation using Telnet.
- Proprietary applications include the Microsoft Office suite of products (Word, Excel, PowerPoint), Adobe Illustrator and Photoshop; Oracle and SAP database applications; Quicken, Microsoft Money, and QuickBooks financial software; plus audio and video players (such as iTunes, QuickTime, Real Media Player, Window Media Player, Flash), as well as document readers such Adobe Acrobat Reader and Apple Preview.
- Level 7 applications generally also utilize embedded objects defined syntactically by Level 6, the "presentation" layer, comprising text, graphics & pictures, sound and video, document presentations such as XML or PDF, along with security functions such as encryption.
- Level 5 the "session” layer, establishes cross-application connectivity, such as importing one object into another program file, and control initiating and terminating a session.
- the OSI seven-layer model defines the functions of each layer, and the corresponding IP packet encapsulates data relating to each layer, one inside the other in a manner analogous to the Babushka or Russian nesting doll, the wooden dolls with one doll inside another inside another and so on...
- the outer packet or Layer 1 PHY defines the entire IP frame containing information relating to all the higher levels.
- the Layer 2 data frame describes the data link layer and contains the Layer 3 network datagram.
- This datagram in turn describes the Internet layer as its payload, with Layer 4 segment data describing the transport layer.
- the transport layer carries upper layer data as a payload including Layer 5, 6 and 7 content.
- the seven-layer encapsulation is also sometimes referred to by the mnemonic "all people seem to need data processing" ordering the seven OSI layers successively from top to bottom as application, presentation, session, transport, network, data-link, and physical layers.
- the middle OSI layers encapsulated within the IP packet describing the network and transport information are completely agnostic to the hardware used to communicate and deliver the IP packet.
- the upper layers encapsulated as the payload of the transport layer are specific only to the applications to which they apply and operate completely independently from how the packet was routed or delivered through the Internet. This partitioning enables each layer to essentially be supervised independently, supporting a myriad of possible combinations of technologies and users without the need for managerial approval of packet formatting or checking the viability of the packet's payload. Incomplete or improper IP packets are simply discarded. In this manner, packet-switched networks are able to route, transport and deliver diverse application related information over disparate communication mediums in a coherent fashion between and among any Internet connected devices or objects.
- switched circuit networks require a single direct connection between two or more parties communicating (similar to the plain old telephone system of a century ago), while packet switches network communication involves fragmenting documents, sound, video, and text into multiple packets, and deliver those packets through multiple network paths (similar to the post office using best efforts to provide delivery in an accurate and timely manner), then reassembling the original content and confirming nothing was lost along the way.
- a comparison between circuit-switched PSTNs versus packet-switched VoIP is summarized in the following table:
- QoS Quality of Service
- IP packet sniffing IP packet sniffing
- port interrogation and denial of service attacks profiling, imposters, packet hijacking, cyber-infections, surveillance, pirate
- Quality of Service describes the performance of the network in capacity, bandwidth, latency, data rate, scalability, sound quality data integrity, data bit error rates, and other performance based parameters.
- data accuracy is a critical factor. Which factors are important depends on the nature of the payload being carried across a packet-switched network.
- voice and video comprising real-time applications, factors affecting packet delivery time are key. Quality factors and how they affect various applications such as video, voice, data, and text vary depending on the application.
- a good network condition typified by consistent high data rate IP packet waveform is one where there are minimal time delays, clear strong signal strength, no signal distortion, stable operation, and no packet transmission loss.
- IP packet waveform not only severely degrade video with jerky intermittent motion, fuzzy pictures, and improper coloring and brightness, but also begin to degrade sound or vocal communication with distortion, echo, and even whole sentences dropped from a conversation or soundtrack.
- data can still be delivered using TCP by repeated requests for rebroadcasts.
- unstable networks exhibit low data throughput rates with numerous data stoppages of unpredictable durations.
- Unstable networks also include corrupted IP packages as represented by the darkly shaded packets in waveform 610D, which in TCP based transport must be resent and in UDP transport are simply discarded as corrupt or improper data. At some level of network degradation even emails become intermittent and EVIAP fie synchronization fails.
- SMS and text messages will be delivered, albeit with some delivery delay, even with severe network congestion but attachments will fail to download.
- every application will fail and can even result in freezing a computer or cellphone's normal operation waiting for an expected file to be delivered.
- video freezes sound become so choppy it becomes unintelligible, VoIP connections drop repeatedly even over a dozen times within a few minute call, and in some cases fails to connect altogether.
- emails stall or freeze with computer icons spinning round and round interminably. Progress bars halt altogether. Even text messages bounce and
- the other factor determining QoS, propagation delay may be measured quantitatively in several ways, either as an IP packet's delay from node-to-node, or unidirectionally from source to destination, or alternatively as the round-trip delay from source to destination and back to the source.
- the effects of propagation delay on packet delivery differ using UDP and TCP transport protocols. As the intermodal network propagation delay increases, the time needed to perform round-trip communication such as in VoIP conversation increases. In the case of UDP transport, the round trip delay increases linearly with propagation delay. Since long propagation delays correlate to higher bit error rates, the number of lost UDP packets increases, but because UDP does request the resending of dropped packets, the round trip time remains linear with increased delay.
- TCP transport exhibits a substantially longer round trip time for each packet sent than UDP because of the handshaking required confirming packet delivery. If the bit error rate remains low and most packets do not require resending then TCP propagation delay increases linearly with intermodal propagation delay. If, however, the communication network becomes unstable as the propagation delay increases, then the round trip time resulting from TCP transport grows exponentially because of the protocol's need for retransmission of dropped packets. As such, TCP is contraindicated for time sensitive applications such as VoIP and video streaming.
- the best way to estimate the single direction latency of a network is by measuring the round trip time of a large number of similarly sized IP packets and dividing by two to estimate the single-direction latency. Latencies under 100ms are outstanding, up to 200ms are considered very good, and up to 300ms still considered acceptable. For propagation delays of 500ms, easily encountered by OTT applications running on the Internet, the delays become uncomfortable to users and interfere which normal conversation.
- the single-direction latency of a communication is different than the ping test performed by the Layer 3 ICMP utility (such as the free network test at http://www.speedtest.net) in part because ICMP packets are generally lightweight compared to real IP packets, because the ping test does not employ the "request to resend" feature of TCP, and because there is no guarantee over a public network of the Internet, that the ping test's route will match the actual packet route. In essence, when the ping experiences a long delay, something is wrong with the network or some link between the device and the network, e.g. in the WiFi router, or the last mile, but a good ping result by itself cannot guarantee low propagation delay of a real packet.
- the Layer 3 ICMP utility such as the free network test at http://www.speedtest.net
- Cybersecurity including network security, computer security and secure communications, comprises methods employed to monitor, intercept, and prevent unauthorized access, misuse, modification, or denial of a computer or communications network, network-accessible resources, or the data contained within network connected devices.
- data may include personal information, biometric data, financial records, health records, private communications and recordings, as well as private photographic images and video recordings.
- Network-connected devices include cell phones, tablets, notebooks, desktops, file servers, email servers, web servers, data bases, personal data storage, cloud storage, Internet-connected appliances, connected cars, as well as publically shared devices used by an individual such as point-of-sale or POS terminals, gas pumps, ATMs, etc.
- “Cyberprivacy” including Internet privacy, computer privacy, and private communication involves an individual's personal right or mandate to control their personal and private information and its use, including the collection, storage, displaying or sharing of information with others.
- Private information may involve personal identity information including height, weight, age, fingerprints, blood type, driver's license number, passport number, social-security number, or any personal information useful to identify an individual even without knowing their name. In the future, even an
- non-personal private information may include what brands of clothes we buy, what web sites we frequent, whether we smoke, drink, or own a gun, what kind of car we drive, what diseases we may have contracted in our life, whether our family has a history of certain diseases or ailments, and even what kind of people we are attracted to.
- an individual using a tablet connected to the Internet may wish to place a call to a business office phone, send a message to a TV, call a friend in the country still using a circuit switched POTS network, download files from web storage, or send emails through email server.
- a business office phone may wish to place a call to a business office phone, send a message to a TV, call a friend in the country still using a circuit switched POTS network, download files from web storage, or send emails through email server.
- an unauthorized intruder can monitor the radio link.
- LTE calls over cellular link can be monitored or "sniffed" by an intercepting radio receiver or sniffer.
- the same sniffer can be adjusted to monitor WiFi links and on the receiving end on cable between the cable CMTS and cable modem.
- the LTE call can also be intercepted by a pirate faux -tower, establishing a diverted communication path between a tablet and cellular tower.
- Wiretaps can intercept calls on the POTS line from PSTN gateway to phones and also on a corporate PBX line between PBX servers and office phones.
- spy ware can install itself onto a tablet or notebook, on a router, on a PSTN-bridge, on cloud storage,, on a cable CMTS, or on a desktop computer.
- Trojan horse software may install itself on a tablet or desktop to phish for passwords.
- a worm may also be used to attack a desktop, especially if the computer runs Microsoft operating system with active X capability enabled.
- a virus can attack any number of network-connected devices including servers, desktops, and tablets.
- Malware may therefore operate on differing portions of the communication network and infrastructure, where cyber-assaults may include viruses, man in the middle attacks government surveillance, and denial of service attacks.
- the last mile of the communication network offers an even more extensive opportunity for malware and cyber-assaults, divided into three sections, the local telco/network, the last link, and the device.
- the local telco/network as shown comprises high-speed wired or fiber links, routers, cable CMTS,, cable/fiber, cable modems, WiFi antennas, and LTE radio networks. In this portion of the network radio sniffers, spyware, viruses , and man in the middle attacks are all possible.
- the network connection comprises wireline connections, WiFi links, and LTE / radio cellular links subject to spyware, radio sniffers, wiretaps, and faux towers.
- the device itself including for example tablets, notebooks, desktops smartphones, smart TVs, POS terminals, etc. are subject to a number of attacks including spyware, Trojan horses, viruses, and worms.
- surveillance methods and spy devices are readily available in the commercial and online marketplace, including devices used for monitoring traffic on Ethernet local area networks, devices for monitoring WiFi data, and for surveillance of cellular
- IP packet sniffing To launch a cyber-assault generally involves several stages or combination of techniques, including: IP packet sniffing
- IP Packet Sniffing Using radio-monitoring devices, a cybercriminal can gain significant information about a user, their transactions, and their accounts.
- packet sniffing the contents of an IP packet can be obtained or "sniffed" anywhere in the path between two users. For example, when a user sends a file, e.g. a photo or text, in an IP packet from their notebook to the cell phone of their friend, a cyber-pirate can discover the IP packet in any number of places, either by intercepting the sender's last link, the intercepting the sender's local network, monitoring the cloud, intercepting the receiver's local telco, or by intercepting the receiver's last link.
- a cyber-pirate can discover the IP packet in any number of places, either by intercepting the sender's last link, the intercepting the sender's local network, monitoring the cloud, intercepting the receiver's local telco, or by intercepting the receiver's last link.
- the observable data contained in intercepted IP packet includes the Layer-2 MAC addresses of the devices used in the communication, the Layer-3 addresses of the sender of the receiving party, i.e. the packet's destination, including the transport protocol, e.g. UDP, TCP, etc. being used.
- the IP packet also contains, the Layer-4 port number of the sending and receiving devices potentially defining the type of service being requested, and the data file itself. If the file is unencrypted, the data contained in the file can also be read directly by a cyber pirate.
- the payload is unencrypted, textual information such as account numbers, login sequences, and passwords can be read and, if valuable, stolen and perverted for criminal purposes. If the payload contains video or pictographic information, some added work is required to determine which Layer 6 application-format the content employs, but once identified the content can be viewed, posted publically, or possibly used for blackmailing one or both of the communicating parties. Such cyber-assaults are referred to as a "man in the middle attack" because the cyber-pirate doesn't personally know either communicating party.
- IP packet routing in the cloud is unpredictable, monitoring the cloud is more difficult because a cyber-pirate must capture and the IP packet's important information when it first encounters it, because subsequent packets may not follow the same route and the sniffed packet.
- Intercepting data in the last mile has a greater probability to observe a succession of related packets comprising the same conversation, because local routers normally follow a prescribed routing table, at least until packets reach a POP outside the customer's own carrier. For example, a client of Comcast will likely pass IP packets up the routing chain using an entirely Comcast- owned network till the packet moves geographically beyond Comcast's reach and customer service region.
- a cyber-pirate can identify through the IP addresses and port #s that multiple IP packets carrying the text represent a conversation between the same two devices, i.e. a cell phone and notebook. So even if an account number and password were texted in different messages or sent incompletely spread over many packets, the consistency of the packet identifiers still makes it possible for a cyber pirate to reassemble the conversation and steal the account info. Once the account info is stolen, they can either transfer money to an offshore bank or even usurp the account authority by changing the account password and security questions, i.e. using identity theft on a temporary basis.
- Port Interrogation - Another method to break into a device is to use its IP address to interrogate many Layer-4 ports and see if any requests receive a reply.
- the cyber-pirate can launch a sequence of interrogations to ports on the device looking for any unsecure or open port, service and maintenance port, or application backdoor. While a hacker's interrogation program can systematically cycle through every port #, attacks generally focus on notoriously vulnerable ports such as port # 7 for ping, port # 21 for FTP, port # 23 for telnet terminal emulation, port # 25 for simple email, and so on. Every time a pirate sends packets, to which the device responds, the pirate learns something more about the operating system of the targeted device.
- a cyber pirate In the port interrogation process, a cyber pirate doesn't want to expose their real identity so they will use a disguised pseudo-address to receive messages but that is not traceable to them personally. Alternatively, cybercriminals may use a stolen computer and account, so it looks like someone else is trying to hack the targeted device, and if traced, leads investigators back to an innocent person and not to them.
- Profiling - User and account profiling is the process where a cyber pirate performs research using publically available information to learn about a target, their accounts, and their personal history in order to crack passwords, identify accounts, and determine assets.
- the traceroute utility can be used to find the DNS server of the device's account. Then by utilizing the "Who is" function on the Internet, the name of the account owner can be discovered.
- a cybercriminal searches on the Internet to gather all available information on the account owner. Sources of information include public records such as property deeds, car registration, marriages and divorces, tax liens, parking tickets, traffic violations, criminal records, etc.
- web sites from universities and professional societies also include home address, email addresses, phone numbers and an individual's birthdate.
- social media sites such as Facebook, Linked In, Twitter, and others
- a cybercriminal can amass a significant detailed information including family and friends, pets' names, previous home addresses, classmates, major events in someone's life, as well as photographic and video files, including embarrassing events, family secrets, and personal enemies.
- the cyber pirate's next step is to use this profile to "guess" a user's passwords based on their profile to hack the target device and other accounts of the same individual.
- a cybercriminal cracks one device's password, the likelihood is great they can break into other accounts because people tend to reuse their passwords for ease of memorizing.
- amassing a long list of passwords from stolen accounts cybercriminals used the same passwords to illegally purchase millions of dollars of premium tickets to concerts and sporting events using the same passwords and login information.
- Imposters When a cyber pirate impersonates someone they are not or uses illegally obtained cyber- security credentials to gain access to communication and files under the false pretense of being an authorized agent or device, the cyber-pirate is acting as an "imposter".
- the imposter type of cyber-assault can occur when a cybercriminal has sufficient information or access to an individual's account to usurp a victim's account, sending messages on their behalf and misrepresenting them as the owner of the hacked account. Recently, for example, a personal friend of one of the inventors had her "Line" personal messenger account hacked.
- misrepresentation occurs when a device has granted security privileges and is enabled to exchange information with a server or other network-connected device, and by some means a cyber-pirate device disguises itself as the authorized server, whereby the victim's device willingly surrenders files and information to the pirate server not realizing the server is an imposter.
- This method was reportedly used to lure celebrities to backup private picture files with iCloud, except that the backup cloud was an imposter.
- imposter occurs when someone with physical access to a person's phone or open browser performs an imposter transaction such as sending an email, answering a phone call, sending a text message from another person's account or device.
- the receiving party assumes because they are connected to a known device or account, that the person operating that device or account is its owner.
- the imposter can be a prank such as a friend posting embarrassing comments of Facebook or can be of a more personal nature where someone's spouse answers personal calls or intercepts private text messages of a private nature.
- the result of the unauthorized access can lead to ashamedy, divorce, and vindictive legal proceedings. Leaving a device temporarily unsupervised in an office or cafe, e.g. to run to the toilet, presents another risk for an imposter to quickly access personal or corporate information, send unauthorized emails, transfer files, or download some form of malware into the device, as described in the following section entitled "infections”.
- Imposter-based cyber-assault is also significant when a device is stolen. In such events, even though the device is logged out, the thief has plenty of time in which to break the login code.
- the "find my computer" feature that is supposed to locate the stolen device on the network and wipe a computer's files the first time the cyber pirate logs on to the device, no longer works because tech-savvy criminals today know to activate the device only where there is no cellular or WiFi connection. This risk is especially great in the case of cell phones where the passline security is a simple four-number personal identification number or PEST. It's only a matter of time to break a PIN since there are only 9999 possible combinations.
- IP packets traversing the router can be rewritten into a revised IP packet, diverting the IP package to a different destination address and port # of the cyber-pirate device.
- the cyber-pirate device then obtains whatever information it needs from the payload of the IP packet and possibly changes the content of the IP packet's payload.
- the fraudulent payload may be used to commit any number of fraudulent crimes, to gather information, or to download malware into the cell phone, described subsequently herein under the topic "infections".
- the hijacked packet is then retrofitted to appear like the original IP packet's source IP address and source port #, except that the packet travels through a new and different path.
- the hijacked IP packet can be returned to the compromised router and then sent on to the cloud as before.
- a cyber pirate needs to hide their identity in the packet hijacking, and for that reason they disguise the true routing of the IP packet so even the Layer-3 ICMP function "traceroute" would have difficulty in identifying the true path of the
- Cyber-infections One of the most insidious categories of cyber-assault is that of "cyber-infections", installing malware into targeted devices or the network by which to gather information, commit fraud, redirect traffic, infect other devices, impair or shut down systems, or to cause denial of service failures. Cyber infections can be spread through emails, files, web sites, system extensions, application programs, or through networks. One general class of malware, "spyware" gathers all kinds of transactional information and passes it on to a cyber pirate.
- malware infections can take control of hardware, e.g. control a router to execute the
- Another class of cyber-infections comprising viruses, worms, and Trojan-horses is designed to overwrite critical files, or to execute meaningless functions repeatedly to prevent a device from doing its normal tasks. Basically to deny services, degrade performance, or completely kill a device.
- These malevolent infections are intrinsically destructive and used for vindictive purposes, to disable a competitor's business from normal operation, or simply motivated for fun by a hacker wanting to see if it's possible.
- Surveillance - Bugging and surveillance goes beyond cybercrime. In such instances a private detective or an acquaintance is hired or coerced to installing a device or program into the target's personal devices to monitor their voice conversations, data exchanges, and location.
- SIM cards are commercially available that can copy a phone's network access privileges but concurrently transmit information to a cybercriminal monitoring the target's calls and data traffic.
- a device's password or PIN can be learned simply by observing a user's keystrokes during their login process. With enough cameras in place, eventually once will record the login process.
- a cyber pirate can hack an existing camera surveillance system on buildings, in stores, or on the streets, and through access to someone's else's network monitor the behavior of unsuspecting victims. Combining video surveillance with packet sniffing provides an even more comprehensive data set for subsequently launching cyber-assaults.
- Pirate Administration Infiltration
- data (which is defined broadly to include text, audio, video, graphical, and all other kinds of digital information or files) is transmitted over a Secure Dynamic Communication Network and Protocol (SDNP) network or "cloud.”
- SDNP Secure Dynamic Communication Network and Protocol
- the SD P cloud includes a plurality of “nodes,” sometimes referred to as “media nodes,” that are individually hosted on servers or other types of computers or digital equipment (collectively referred to herein as “servers”) located anywhere in the world. It is possible for two or more nodes to be located on a single server.
- the data is transmitted between the media nodes by light carried over fiber optic cables, by radio waves in the radio or microwave spectrum, by electrical signals conducted on copper wires or coaxial cable, or by satellite communication, but the invention broadly includes any means by which digital data can be transmitted from one point to another.
- the SDNP network includes the SDNP cloud as well as the "Last Mile" links between the SDNP cloud and client devices such as cell phones, tablets, notebook and desktop computers, mobile consumer electronic devices, as well as Internet-of-Things devices and appliances, automobiles and other vehicles.
- Last Mile communication also includes cell phone towers, cable or fiber into the home, and public WiFi routers. Within the Last Mile, the link between the client device and the nearest cell phone tower or other re- transmitter is referred to as the "Last Link.”
- the data While in transit between the media nodes in the SDNP cloud, the data is in the form of "packets," discrete strings of digital bits that may be of fixed or variable length, and the data is disguised by employing the following techniques: scrambling, encryption or splitting— or their inverse processes, unscrambling, decryption and mixing. (Note: As used herein, unless the context indicates otherwise, the word “or” is used in its conjunctive (and/or) sense.)
- Scrambling entails reordering the data within a data packet; for example, data segments A, B and C which appear in that order in the packet are re-ordered into the sequence C, A and B.
- the reverse of the scrambling operation is referred to as
- unscrambling and entails rearranging the data within a packet to the order in which it originally appeared - A, B and C in the above example.
- the combined operation of unscrambling and then scrambling a data packet is referred to as "re-scrambling.”
- re-scrambling In re- scrambling a packet that was previously scrambled, the packet may be scrambled in a manner that is the same as, or different from, the prior scrambling operation.
- the second operation is the encoding of the data in a packet into a form, called ciphertext, that can be understood only by the sender and other authorized parties, and who must perform the inverse operation - "decryption" - in order to do so.
- ciphertext a form
- decryption The combined operation of decrypting a ciphertext data packet and then encrypting it again, typically but not necessarily using a method that is different from the method used in encrypting it previously, is referred to herein as "re-encryption.”
- the third operation involves splitting up the packet into two or more smaller packets.
- the inverse operation is defined as recombining two or more packets into a single packet. Splitting a packet that was previously split and then mixed may be done in a manner that is the same as, or different from, the prior splitting operation.
- the order of operations is reversible, whereby splitting may be undone by mixing and conversely mixing of multiple inputs into one output may be undone by splitting to recover the constituent components.
- scrambling and unscrambling, encryption and decryption, and splitting and mixing are inverse processes, knowledge of the algorithm or method that was used to perform one is all that is necessary to perform the inverse. Hence, when referring to a particular scrambling, encryption, or splitting algorithm herein, it will be understood that knowledge of that algorithm allows one to perform the inverse process.
- a data packet that passes through an SDNP cloud is scrambled or encrypted, or it is subjected to either or both of these operations in combination with splitting.
- "junk" i.e., meaningless
- data may be added to the packet either to make the packet more difficult to decipher or to make the packet conform to a required length.
- the packet may be parsed, i.e., separated into distinct pieces.
- to parse is to divide a computer language statement, computer instruction, or data file into parts that can be made useful for the computer. Parsing may also be used to obscure the purpose of an instruction or data packet, or to arrange data into data packets having specified data lengths.
- the addresses of the media nodes are not standard Internet addresses, i.e. they cannot be identified by any Internet DNS server.
- the media nodes can technically receive data packets over the Internet, the media nodes will not recognize the addresses or respond to inquiries.
- Internet users were to contact a media node, they could not access or examine the data inside the media node because the media node can recognize them as imposters lacking the necessary identifying credentials as a SD P media node.
- the data packet traverses a single path through a series of media nodes in the SDNP cloud, and it is scrambled at the media node where it enters the cloud and unscrambled at the media node where the packet exits the cloud (these two nodes being referred to as “gateway nodes” or “gateway media nodes”).
- the packet is re- scrambled at each media node using a scrambling method different from the one that was used at the prior media node.
- the packet is also encrypted at the gateway node where it enters the cloud and decrypted at the gateway node where it exits the cloud, and in addition the packet may be re-encrypted at each media node it passes through in the cloud. Since a given node uses the same algorithm each time it scrambles or encrypts a packet, this embodiment is describes as "static" scrambling and encryption.
- the inverse operations are preferably performed in an order opposite to the operations themselves, i.e. in reverse sequence. For example, if the packet is scrambled and then encrypted prior to leaving a media node, it is first decrypted and then unscrambled when it arrives at the following media node. The packet is recreated in its original form only while it is within a media node. While the packet is in transit between media nodes, it is scrambled, split or mixed, or encrypted.
- the packet is split at the gateway node, and the resulting multiple packets traverse the cloud in a series of "parallel" paths, with none of the paths sharing a media node with another path except at the gateway nodes.
- the multiple packets are then mixed to recreate the original packet, normally at the exit gateway mode.
- the packet may also be scrambled and encrypted at the gateway node, either before or after it is split, and the multiple packets may be re-scrambled or re-encrypted at each media node they pass through.
- the packets do not travel over only a single path or a series of parallel paths in the SD P cloud, but rather the packets may travel over a wide variety of paths, many of which intersect with each other. Since in this embodiment a picture of the possible paths resembles a mesh, this is referred to as "meshed transport.” As with the embodiments described above, the packets may be scrambled, encrypted and split or mixed as they pass through the individual media nodes in the SDNP cloud.
- the routes of the packets through the SDNP network are determined by a signaling function, which can be performed either by segments of the media nodes themselves or preferably, in "dual-channel” or “tri-channel” embodiments, by separate signaling nodes running on dedicated signaling servers.
- the signaling function determines the route of each packet as it leaves the transmitting client device (e.g., a cell phone), based on the condition (e.g., propagation delays) of the network and the priority and urgency of the call, and informs each of the media nodes along the route that it will receive the packet and instructs the node where to send it.
- Each packet is identified by a tag, and the signaling function instructs each media node what tag to apply to each of the packets it sends.
- the data tag is included in a SDNP header or sub- header, a data field attached to each data sub-packet used to identify the sub-packet.
- Each sub-packet may contain data segments from one or multiple sources stored in specific data "slots" in the packet. Multiple sub-packets may be present within one larger data packet during data transport between any two media nodes.
- the routing function is aligned with the splitting and mixing functions, since once a packet is split, the respective routes of each of the sub-packets into which it is split must be determined and the node where the sub-packets are recombined (mixed) must be instructed to mix them.
- a packet may be split once and then mixed, as in multiroute embodiments, or it may be split and mixed multiple times as it proceeds through the SDNP network to the exit gateway node.
- a splitting algorithm may specify which data segments in a communication are to be included in each of the sub-packets, and the order and positions of the data segments in the sub-packets.
- a mixing algorithm reverses this process at the node where the sub -packets are mixed so as to recreate the original packet.
- that node may also split the packet again in accordance with a different splitting algorithm corresponding to the time or state when the splitting process occurs.
- the media node When a media node is instructed by the signaling function to send a plurality of packets to a particular destination media node on the "next hop" through the network, whether these packets are split packets (sub-packets) or whether they pertain to different messages, the media node may combine the packets into a single larger packet especially when multiple sub-packets share a common destination media node for their next hop (analogous to a post office putting a group of letters intended for a single address into a box and sending the box to the address).
- the individual media nodes in the SD P cloud do not use the same scrambling, encryption or splitting algorithms or methods on successive packets that pass through them. For example, a given media node might scramble, encrypt or split one packet using a particular scrambling, encryption or splitting algorithm, and then scramble, encrypt or split the next packet using a different scrambling, encryption or splitting algorithm.
- "Dynamic" operation greatly increases the difficulties faced by would-be hackers because they have only a short period of time (e.g., 100msec) in which to understand the meaning of a packet, and even if they are successful, the usefulness of their knowledge would be short-lived.
- each media node is associated with what is known as a "DMZ server,” which can be viewed as a part of the node that is isolated from the data transport part, and which has a database containing lists or tables ("selectors") of possible scrambling, encryption, and splitting algorithms that the media node might apply to outgoing packets.
- the selector is a part of a body of information referred to as “shared secrets,” since the information is not known even to the media nodes, and since all DMZ servers have the same selectors at a given point in time.
- a media node When a media node receives a packet that has been scrambled, in dynamic embodiments it also receives a "seed" that is used to indicate to the receiving node what algorithm is to be used in unscrambling the packet.
- the seed is a disguised numerical value that has no meaning by itself but is based on a constantly changing state, such as the time at which the packet was scrambled by the prior media node.
- the prior node scrambled the packet its associated DMZ server generated the seed based on the state. Of course, that state was also used by its associated DMZ server in selecting the algorithm to be used in scrambling the packet, which was sent to the sending media node in the form of an instruction as to how to scramble the packet.
- the sending node received both the instruction on how to scramble the packet and the seed to be transmitted to the next media node.
- a seed generator operating within the DMZ server generates the seed using an algorithm based on the state at the time the process is executed. Although the seed generator and its algorithms are part of the media node's shared secrets, the generated seed is not secret because without access to the algorithms the numerical seed has no meaning.
- the next media note on the packet's route receives the scrambled packet and the seed that is derived from the state associated with the packet (e.g., the time at which it was scrambled).
- the seed may be included in the packet itself or it may be sent to the receiving node prior to the packet, either along the same route as the packet or via some other route, such as through a signaling server.
- the receiving node sends the seed to its DMZ server. Since that DMZ server has a selector or table of scrambling algorithms that are part of the shared secrets and are therefore the same as the selector in the sending node's DMZ server, it can use the seed to identify the algorithm that was used in scrambling the packet and can instruct the receiving node how to unscramble the packet. The receiving node thus recreates the packet in its unscrambled form, thereby recovering the original data. Typically, the packet will be scrambled again according to a different scrambling algorithm before it is transmitted to the next node. If so, the receiving node works with its DMZ server to obtain a scrambling algorithm and seed, and the process is repeated. Thus, as the packet makes its way through the SD P network, it is scrambled according to a different scrambling algorithm by each node, and a new seed is created at each node that enables the next node to unscramble the packet.
- the actual state (e.g., time) may be transmitted between nodes (i.e., the sending node need not send a seed to the receiving node).
- the DMZ servers associated with both the sending and receiving media nodes contain hidden number generators (again, part of the shared secrets) that contain identical algorithms at any given point in time.
- the DMZ server associated with the sending node uses the state to generate a hidden number and the hidden number to determine the scrambling algorithm from a selector or table of possible scrambling algorithms.
- the sending node transmits the state to the receiving node. Unlike seeds, hidden numbers are never transmitted across the network but remain an exclusively private communication between the media node and its DMZ server.
- the hidden number generator in its associated DMZ server uses the state to generate an identical hidden number, which is then used with the selector or table to identify the algorithm to be used in unscrambling the packet.
- the state may be included with the packet or may be transmitted from the sending node to the receiving node prior to the packet or via some other route.
- the techniques used in dynamic encryption and splitting are similar to that used in dynamic scrambling, but in dynamic encryption "keys" are used in addition to seeds.
- the shared secrets held by the DMZ servers include selectors or tables of encryption and splitting algorithms and key generators.
- the sending node transmits a key to the receiving media node which can be used by the receiving node's DMZ server to identify the algorithm used in encrypting the packet and thereby decrypt the file.
- the media node requesting information i.e. the receiving node first sends an encryption key to the node containing the data packet to be sent. The sending media node then encrypts the data in accordance with that encryption key.
- the media node where the packet was split transmits a seed to the media node where the resulting sub-packets will be mixed, and the DMZ server associated with the mixing node uses that seed to identify the splitting algorithm and hence the algorithm to be used in mixing the sub-packets.
- the signaling function is performed by a signaling node operating on separate group of servers known as signaling servers.
- the seeds and keys may be transmitted through the signaling servers instead of from the sending media node directly to the receiving media node.
- the sending media node may send a seed or key to a signaling server, and the signaling server may forward the seed or key to the receiving media node.
- the signaling servers are responsible for designing the routes of the packet, so the signaling server knows the next media node to which each packet is directed.
- the list or table of possible scrambling, splitting or encryption methods in a selector may be "shuffled" periodically (e.g., hourly or daily) in such a way that the methods corresponding to particular seeds or keys are changed.
- the encryption algorithm applied by a given media node to a packet created at time ti on Day 1 might be different from the encryption algorithm it applies to a packet created at the same time ti on Day 2.
- Each of the DMZ servers is typically physically associated with one or more media nodes in the same "server farm.”
- a media node may request instructions on what to do with a packet it has received by providing its associated DMZ server with a seed or key (based for example on the time or state that the packet was created), but the media node cannot access the shared secrets or any other data or code within the DMZ server.
- the DMZ server responds to such requests by using the seed or key to determine what method the media node should use in unscrambling, decrypting or mixing a packet.
- the DMZ server may examine a list (or selector) of scrambling algorithms to find the particular algorithm that corresponds to the seed. The DMZ then instructs the media node to unscramble the packet in accordance with that algorithm.
- the media node transmits inquiries embodied in seeds or keys to the DMZ server, and the DMZ server responds to those inquiries with instructions.
- the DMZ servers are completely isolated from the Internet having only local network connections via wires or optical fiber to the network connected media servers.
- the seeds and keys are transmitted between the sending media node and the receiving media node as a part of the data packet itself, or they may be transmitted in a separate packet before the data packet on the same route as the data packet.
- media node #1 may include in the packet an encryption key based on the time at which the encryption was performed.
- media node #2 transmits the key to its associated DMZ server, and the DMZ server may use the key to select a decryption method in its selector and to perform the decryption.
- Media node #2 may then ask its DMZ server how it should encrypt the packet again, before transmitting it to media node #3.
- the DMZ server consults the selector, informs media node #2 what method it should use in encrypting the packet, and delivers to media node #2 a key that reflects a state corresponding to the encryption method.
- Media node #2 performs the encryption and transmits the encrypted packet and the key (either separately or as a part of the packet) to media node #3.
- the key may then be used in a similar manner by media node #3 to decrypt the packet, and so on.
- time or a dynamic "state" condition in the example above is only illustrative. Any changing parameter, e.g., the number of nodes that the packet has passed through, can also be used as the "state" in the seed or key for selecting the particular scrambling, encryption or splitting method to be used.
- the seeds and keys can be transmitted between the media nodes via a second "command and control" channel made up of signaling servers rather than being transported directly between the media nodes.
- the signaling nodes may also provide the media nodes with routing information and inform the media nodes along the route of a packet how the packet is to be split or mixed with other packets, and they instruct each media node to apply an identification "tag" to each packet transmitted so that the next media node(s) will be able to recognize the packet(s).
- the signaling servers preferably supply a given media node with only the last and next media node of a packet traversing the network. No individual media node knows the entire route of the packet through the SDNP cloud.
- the routing function may be split up among two or more signaling servers, with one signaling server determining the route to a particular media node, a second signaling server determining the route from there to another media node, and so on to the exit gateway node. In this manner, no single signaling server knows the complete routing of a data packet either.
- a third group of servers called “name servers”- are used to identify elements within the SDNP cloud and to store information regarding the identity of devices connected to the SDNP cloud and their corresponding IP or SDNP addresses.
- the name servers constantly monitor the media nodes in the SDNP cloud, maintaining, for example, a current list of active media nodes and a table of propagation delays between every combination of media nodes in the cloud.
- a client device such as a tablet, may send an IP packet to a name server, requesting an address and other information for the destination or person to be called.
- a separate dedicated name server is used to operate as a first contact whenever a device first connects, i.e. registers, on the cloud.
- separate security "zones,” having different selectors, seed and key generators and other shared secrets, may be established within a single SDNP cloud. Adjacent zones are connected by bridge media nodes, which hold the shared secrets of both zones and have the ability to translate data formatted in accordance with the rules for one zone into data formatted in accordance with the rules for the other zone, and vice versa.
- a full-duplex (i.e., two-way) communication link is formed between interface bridge servers in each cloud.
- Each interface bridge server has access to the relevant shared secrets and other security items for each cloud.
- signaling nodes running on signaling servers know the route (or in some cases only only part of a route) by which a communication is occurring, but they do not have access to the data content being communicated and do not know who the real callers or clients are. Moreover, the signaling nodes do not have access to the shared secrets in a media node's DMZ servers, so they do not know how the data packets in transit are encrypted, scrambled, split or mixed,
- the SDNP name servers know the true phone numbers or IP addresses of the callers but do not have access to the data being communicated or the routing of the various packets and sub-packets. Like the signaling nodes, the name servers do not have access to the shared secrets in a media node's DMZ servers, so they do not know how the data packets in transit are encrypted, scrambled, split or mixed.
- the SDNP media nodes actually transporting the media content have no idea who the callers communicating are nor do they know the route the various fragmented sub- packets are taking through the SDNP cloud.
- each media node knows only what data packets to expect to arrive (identified by their tags or headers), and where to send them next, i.e. the "next hop," but the media nodes do not know how the data is encrypted, scrambled, mixed or split, nor do they know how to select an algorithm or decrypt a file using a state, a numeric seed, or a key.
- the knowhow required to correctly process incoming data packets' data segments is known only by the DMZ server, using its shared secrets, algorithms not accessible over the network or by the media node itself.
- Another inventive aspect of the disclosed invention is its ability to reduce network latency and minimize propagation delay to provide superior quality of service (QoS) and eliminate echo or dropped calls by controlling the size of the data packets, i.e. sending more smaller data packets in parallel through the cloud rather than relying on one high bandwidth connection.
- the SDNP network's dynamic routing uses its knowledge of the network's node-to-node propagation delays to dynamically select the best route for any communication at that moment.
- the network can facilitate race routing, sending duplicate messages in fragmented form across the SD P cloud selecting only the fastest data to recover the original sound or data content.
- the packets may be fragmented as they transit the SDNP cloud, preventing potential hackers from understanding a message even if they are able to decipher an individual sub-packet or group of sub-packets, and in “dynamic” embodiments the scrambling, encryption and splitting methods applied to the packets are constantly changing, denying to a potential hacker any significant benefit from successfully deciphering a packet at a given point in time.
- Similar security techniques may generally be applied in the "last mile" between an SDNP cloud and a client device, such as a cell phone or a tablet.
- the client device is normally placed in a separate security zone from the cloud, and it may first become an authorized SDNP client, a step that involves installing in the client device a software package specific to the device's security zone, typically via a download from an SDNP administration server.
- the client device is linked to the SDNP cloud through a gateway media node (sometimes referred to as just a "gateway") in the cloud.
- the gateway media node has access to the shared secrets pertaining to both the cloud and the client's device's security zone, but the client device does not have access to the shared secrets pertaining to the SDNP cloud.
- the client devices may exchange seeds and keys directly with each other via the signaling servers.
- a transmitting client device may send a seed and/or key directly to the receiving client device.
- the packet received by the receiving client device will be in the same scrambled or encrypted form as the packet leaving the sending client device.
- the receiving client device can therefore use the seed or key that it receives from the sending client device to unscramble or decrypt the packet.
- the exchange of seeds and keys directly between client devices is in addition to the SDNP network's own dynamic scrambling and encrypting, and it thus represents an added level of security called nested security.
- a client device or the gateway node with which it communicates may mix packets that represent the same kind of data— e.g.
- the exit gateway node or destination client device may split the mixed packet to recover the original packets.
- the sending client device may send the receiving client device a seed instructing it how to split the packet so as to recreate the original packets that were mixed in the sending client device or gateway media node.
- Performing successive mixing and splitting may comprise a linear sequence of operations or alternatively utilize a nested architecture where the clients execute their own security measures and so does the SDNP cloud.
- a client device may transmit successive packets (or sub-packets) in a single communication to different gateway nodes, and/or it may transmit them over different physical media links (cellular, WiFi, Ethernet cable, etc.)— a process referred to sometimes herein as "Multi-PHY" transmission.
- Multi-PHY a process referred to sometimes herein as "Multi-PHY” transmission.
- it may also include different source addresses in the successive packets, thereby preventing a hacker from identifying the packets as originating from the same client device.
- the invention also includes unique advances in the handling of telephone conference calls.
- a normal conference call packets are sent to all of the participants in the call.
- certain designated participants may be "muted," i.e., excluded from the call by preventing a client device or other node from transmitting packets to the participant or participants who are to be muted.
- data packets are sent in broadcast mode to all participants in the group call but using different encryption methods.
- the data packets are sent to all users using an encryption where all participants have a copy of the decryption key.
- private mode or mute mode the data packets broadcasted to the users utilize a different encryption where only select users share the decryption key.
- Fig. 1 is a schematic diagram showing conventional packet transport across a network.
- Fig. 2 A is a schematic diagram showing the process of packet scrambling.
- Fig. 2B is a schematic diagram showing the process of packet unscrambling.
- Fig. 2C is a schematic diagram showing various packet scrambling algorithms.
- Fig. 2D is a schematic diagram showing static parametric packet scrambling.
- Fig. 2E is a schematic diagram showing dynamic scrambling with a hidden number.
- Fig. 3 is a schematic diagram showing the packet re-scrambling process.
- Fig. 4A is a schematic diagram showing the process of packet encryption.
- Fig. 4B is a schematic diagram showing the process of packet decryption.
- Fig. 5 is a schematic diagram showing the process of encrypted scrambling and its inverse function.
- Fig. 6 is a schematic diagram showing the process of DUSE re-packeting comprising re-scrambling and re-encryption.
- Fig. 7A is a schematic diagram showing the process of fixed-length packet splitting.
- Fig. 7B is a schematic diagram showing the process of fixed-length packet mixing.
- Fig. 8 is a schematic diagram showing various packet-mixing methods.
- Fig. 9A is a table summarizing SDNP security functions and anti-functions.
- Fig. 9B is a block diagram illustrating SDNP security operations performed on incoming and outgoing data packets for single route Last Mile communication.
- Fig. 9C is a block diagram illustrating SDNP security operations performed on incoming and outgoing data packets for multi-route Last Mile communication.
- Fig. 9D is a block diagram illustrating audio, video, textual, and file content creation, data packet preparation, data packet recognition, and content reproduction in a SDNP client device.
- Fig. 9E is a graphical representation of a SDNP data packet using the 7-Layer OSI model to illustrate hierarchical data encapsulation.
- Fig. 9F is a graphical and tabular representation of a SDNP payload.
- Fig. 9G is a block diagram illustrating inbound Last Mile data packet processing in SDNP gateway using tri-channel communication.
- Fig. 9H is a block diagram illustrating inbound Last Mile data packet processing in SDNP gateway using single-channel communication.
- Fig. 91 is a block diagram illustrating outbound Last Mile data packet processing in SDNP gateway using tri-channel communication.
- Fig. 10 is a schematic representation of SDNP cloud.
- Fig. 11 schematically represents examples of unsecure last mile communication without identity verification.
- Fig. 12 illustrates unsecure last mile communication over a plain old telephone system (POTS) lacking identity verification of callers.
- POTS plain old telephone system
- Fig. 13 schematically represents examples of unsecure last mile communication with identity verification.
- Fig. 14 illustrates unsecure last mile communication over an analog public service telephone network (PSTN) with operator-based identity verification.
- PSTN public service telephone network
- Fig. 15 illustrates unsecure last mile communication over a wireline digital network with login- or token-based identity verification.
- Fig. 16 illustrates unsecure last mile communication over a wireline analog network with PEST- or credit-card based identity verification.
- Fig. 17 schematically represents examples of HyperSecure last mile
- Fig. 18 illustrates identity -verifiable HyperSecure last mile communication over a WiFi wireless network.
- Fig. 19 illustrates identity-verifiable HyperSecure last mile communication over a cellular wireless network.
- Fig. 20 illustrates identity -verifiable HyperSecure last mile communication over an Ethernet wireline network.
- Fig. 21 illustrates identity -verifiable HyperSecure last mile communication over a cable wireline network.
- Fig. 22 illustrates identity -verifiable HyperSecure last mile communication over combined cable wireline and home WiFi wireless networks.
- Fig. 23 schematically represents an example of last mile communication comprising an identity-verifiable HyperSecure communication leg connected to an identity-paired secure LAN last link.
- Fig. 24 illustrates last mile communication comprising an identity-verifiable HyperSecure wireline communication leg connected by wireline to identity-paired secure devices and to unidentified unsecure devices.
- Fig. 25 illustrates last mile communication comprising an identity-verifiable HyperSecure wireline communication leg connected by WiFi LAN to identity-paired WPA-secured computing and communication devices for home and work.
- Fig. 26 illustrates last mile communication comprising an identity -verifiable HyperSecure wireline communication leg connected by WiFi LAN to identity-paired WPA-secured home IoT devices.
- Fig. 27 illustrates last mile communication comprising an identity -verifiable HyperSecure wireline communication leg connected by Ethernet or by WiFi LAN to identity-paired WPA-secured devices for business.
- Fig. 28 schematically represents an example of last mile communication comprising identity-verifiable HyperSecure communication legs connected to identity- paired secure wired or secure wireless LAN last links.
- Fig. 29A schematically represents wireline and wireless HyperSecure bridges comprising Ethernet and WiFi applicable in last mile communication.
- Fig. 29B schematically represents wireline and wireless HyperSecure bridges utilizing satellite and automotive networks applicable in last mile communication.
- Fig. 29C schematically represents wireline and wireless HyperSecure bridges utilizing cable and cellular networks applicable in last mile communication
- Fig. 30 illustrates last mile communication comprising an identity-verifiable HyperSecure wireless communication via satellite uplinks and downlinks to various devices including sat phones, airplanes, trains, ships, and home satellite receivers (set top boxes).
- Fig. 31A is an example of last link HyperSecure communication among devices in an onboard airplane communication network with satellite connectivity.
- Fig. 31B is an example of an airplane satellite communication and antenna module.
- Fig. 32 is an example of last link HyperSecure communication among devices in an onboard ocean cruise ship communication network with multiple channels of satellite connectivity.
- Fig. 33 is an example of last mile HyperSecure communication among devices in an onboard train communication network with radio and satellite connectivity.
- Fig. 34 illustrates HyperSecure last mile communication to an automotive telematics module including cellular last link connectivity.
- Fig. 35 is an example of last link communication between the telematics modules in an automotive communication network with cellular connectivity and in-cabin WiFi connected devices.
- Fig. 36 is an example of HyperSecure inter-vehicular communication with cellular connectivity.
- Fig.37 illustrates HyperSecure trunk line communication over microwave, satellite, and fiber networks.
- Fig. 38 illustrates a comparison of security, identity verification, and caller anonymity features for HyperSecure, secure, and unsecure communication networks.
- Fig. 39 is a schematic representation of single-route last mile HyperSecure communication with static IP addresses.
- Fig. 40A is a schematic IP stack depiction of single-route last mile HyperSecure communication using static IP addresses.
- Fig. 40B is a simplified representation of single-route last mile HyperSecure communication using static IP addresses.
- Fig. 41 is a schematic representation of single-route last mile HyperSecure communication with dynamic client IP addresses.
- Fig. 42A is an IP stack depiction of single-route last mile HyperSecure communication using dynamic client IP addresses.
- Fig. 42B is an alternate IP stack representation of single-route last mile
- HyperSecure communication employing dynamic client IP addresses.
- Fig. 43 is a schematic representation of multi-route last mile HyperSecure communication with static IP addresses.
- Fig. 44A is an IP stack depiction of multi -route last mile HyperSecure communication with static IP addresses using a single PHY last link.
- Fig. 44B is an IP stack depiction of multi-route last mile HyperSecure communication with static IP addresses using multiple PHY last links.
- Fig. 45 is a schematic representation of multi-route last mile HyperSecure communication with dynamic client IP addresses.
- Fig. 46A is an IP stack depiction of multi-route last mile HyperSecure communication with dynamic client IP addresses using a single PHY last link.
- Fig. 46B is an IP stack depiction of multi-route last mile HyperSecure communication with dynamic client IP addresses using multiple PHY last links.
- Fig. 47 is a schematic representation of an alternate version of multi-route last mile HyperSecure communication with dynamic client IP addresses.
- Fig. 48 is an IP stack depiction of an alternate version of multi-route last mile HyperSecure communication with dynamic client IP addresses.
- Fig. 49 is a graphical representation of IPv4 and IPv6 datagrams for Ethernet communication carrying a SD P payload.
- Fig. 50A is a graphical representation of IPv4 and IPv6 Last Link Ethernet packets used in client to SD P-cloud communication.
- Fig. 50B is a graphical representation of IPv4 and IPv6 Gateway Link Ethernet packets used in client to SDNP-cloud communication.
- Fig. 50C is a graphical representation of IPv4 and IPv6 Gateway Link Ethernet packets used in SDNP-cloud to client communication.
- Fig. 50D is a graphical representation of IPv4 and IPv6 Last Link Ethernet packets used in SDNP-cloud to client communication.
- Fig. 51A illustrates successive Ethernet data packets (abridged) used in single route Last Mile communication with static client addressing.
- Fig. 51B illustrates successive Ethernet data packets (abridged) used in single route Last Mile communication with dynamic client addressing.
- Fig. 51C illustrates successive Ethernet data packets (abridged) used in multi- route Last Mile communication with static client addressing.
- Fig. 51D illustrates successive Ethernet data packets (abridged) used in multi- route Last Mile communication with dynamic client addressing.
- Fig. 52A is a table summarizing SDNP Last Mile routing over Ethernet.
- Fig. 52B are topological descriptions of single route Last Mile communication over Ethernet.
- Fig. 52C are topological descriptions of multi-route Last Mile communication over Ethernet.
- Fig. 52D are additional topological descriptions of multi-route Last Mile communication over Ethernet.
- Fig. 53 is a graphical representation of IPv4 and IPv6 datagrams for WiFi communication carrying a SDNP payload.
- Fig. 54A is a graphical representation of IPv4 and IPv6 Last Link WiFi packets used in client to SDNP-cloud communication.
- Fig. 54B is a graphical representation of IPv4 and IPv6 Gateway Link WiFi packets used in client to SDNP-cloud communication.
- Fig. 54C is a graphical representation of IPv4 and IPv6 Gateway Link WiFi packets used in SDNP-cloud to client communication.
- Fig. 54D is a graphical representation of IPv4 and IPv6 Last Link WiFi packets used in SDNP-cloud to client communication.
- Fig. 55 is a graphical representation of IPv4 and IPv6 datagrams for 4G cellular communications carrying a SDNP payload.
- Fig. 56A is a graphical representation of IPv4 and IPv6 Last Link 4G cellular data packets used in client to SDNP-cloud communication.
- Fig. 56B is a graphical representation of IPv4 and IPv6 Last Link 4G cellular packets used in SDNP-cloud to client communication.
- Fig. 57A is a graphical representation of single-media multi-PHY Last Link communication.
- Fig. 57B is a graphical representation of mixed-media multi-PHY Last Link communication.
- Fig. 57C is a graphical representation of alternative implementations of multi- PHY Last Link communication.
- Fig. 58 is a graphical representation of successive client to SDNP-cloud Last Link communications using IPv6 datagrams delivered over multi-PHY Ethernet.
- Fig. 59 is a graphical representation of successive client to SDNP-cloud Last Link communications using IPv6 datagrams delivered over multi-PHY WiFi.
- Fig. 60 is a graphical representation of successive client to SDNP-cloud Last Link communications using IPv6 datagrams delivered over multi-PHY 4G cellular networks.
- Fig. 61 is a graphical representation of successive client to SDNP-cloud Last Link communications using IPv6 datagrams using multi-PHY delivery over Ethernet and WiFi.
- Fig. 62 is a graphical representation of successive client to SD P-cloud Last Link communications using IPv6 datagrams using multi-PHY delivery over and WiFi and 4G cellular networks.
- Fig. 63 is a schematic representation of an OSI layer stack construct of a DOCSIS cable modem communication network illustrating Layer 1 through Layer 7 functionality.
- Fig. 64 is a graphical representation of DOCSIS3 base communication packets made for cable systems carrying a SDNP payload.
- Fig. 65A is a graphical representation of spectrum allocation and carrier modulation methods for various DOCSIS3 protocols.
- Fig. 65B is a graphical representation of a DOCSIS3.1 communication sequence between CTMS and CM.
- Fig. 65C is a graphical representation of DOCSIS3.1 upstream communication.
- Fig. 65D is a graphical representation of DOCSIS3.1 downstream
- Fig. 66 is a schematic representation of a tri-route SDNP network for Last Mile communication.
- Fig. 67 is a schematic representation of a "call request" operation in tri-channel SDNP Last Mile communication.
- Fig. 68 is a schematic representation of an "address request" operation in tri- channel SDNP Last Mile communication.
- Fig. 69 is a schematic representation of an "address delivery" operation in tri- channel SDNP Last Mile communication.
- Fig. 70 is a flow chart illustrating SDNP command and control packet synthesis.
- Fig. 71 is a schematic representation of a "routing instructions" operation in single-route tri-channel SDNP Last Mile communication.
- Fig. 72 is a schematic representation of a "SDNP call" operation in single-route tri-channel SDNP Last Mile communication from a SDNP client to the SDNP cloud.
- Fig. 73A is a schematic representation of SDNP cloud and Last Mile tri-route communication to an SDNP client in a SDNP call.
- Fig. 73B is a schematic representation of SDNP cloud and Last Mile tri-route communication implemented as a "call out" to a non-SDNP client.
- Fig. 74 is a schematic representation of a "routing instructions" operation in multi-route tri-channel SDNP Last Mile communication.
- Fig. 75A is a schematic representation of a "SDNP call" operation in multi -route tri-channel SDNP Last Mile communication in the direction of from a SDNP client to the SDNP cloud.
- Fig. 75B is a schematic representation of a "SDNP call" operation in multi -route tri-channel SDNP Last Mile communication in the direction from the SDNP cloud to the SDNP client.
- Fig. 76 is a schematic representation of group-call "routing instructions" operation in single-route tri-channel SDNP Last Mile communication.
- Fig. 77A is a schematic representation of a "SDNP group call" using SDNP multi-route cloud transport and SDNP Last Mile communication in the direction from a zone Ul client to clients in other zones.
- Fig. 77B is a schematic representation of a "SDNP group call" using SDNP multi- route cloud transport and SDNP Last Mile communication in the direction from a zone U7 client to clients in other zones.
- Fig. 77C is a schematic representation of a "SDNP group call" using SDNP multi-route cloud transport and SDNP Last Mile communication in the direction from a zone U9 client to other clients on the same zone and in other zones.
- Fig. 78 is a schematic representation of a "SDNP group call" using SDNP multi- route cloud transport and Last Mile communication to both SDNP clients and unsecured PSTN devices.
- Fig. 79A is a tabular representation of regular call and private call operation in SDNP group calls.
- Fig. 79B is a tabular representation of regular call and hyper-private call operation in SDNP group calls.
- Fig. 80A is a tabular representation of regular and private push-to-talk operation in SDNP PTT group calls.
- Fig. 80B is a tabular representation of regular and hyper-private push-to-talk operation in SDNP PTT group calls.
- Fig. 81 is a schematic representation of data transport for a write-operation in HyperSecure file storage of fragmented data.
- Fig 82A is a schematic representation of data flow for a write-operation in HyperSecure file storage of fragmented data.
- Fig. 82B is a schematic representation of data flow for a read-operation in HyperSecure file storage of fragmented data.
- Fig. 83 is a schematic representation of data transport for a read-operation in HyperSecure file storage of fragmented data.
- Fig. 84A illustrates various examples of SD P cloud connected file storage solutions.
- Fig. 84B is a schematic representation of a distributed HyperSecure file storage network comprising local and cloud connected storage servers.
- Fig. 86 is a network map for a distributed HyperSecure file storage system using tri-channel network communication.
- Fig. 87A illustrates the file write request operation in a distributed HyperSecure file storage system.
- Fig. 87B illustrates the file server name request operation in a distributed
- Fig. 87C illustrates the signaling server planning operation in a distributed HyperSecure file storage system.
- Fig. 87D illustrates the signaling server client-side Last Mile and SDNP cloud write routing instruction in a distributed HyperSecure file storage system.
- Fig. 87E illustrates the signaling server storage-side Last Mile and SDNP cloud write routing instruction in a distributed HyperSecure file storage system.
- Fig. 88 illustrates file transfer in a distributed HyperSecure file storage system.
- Fig. 89A illustrates link reply confirming file storage and write operation in a distributed HyperSecure file storage system.
- Fig. 89B illustrates file storage server link transfers in a distributed HyperSecure file storage system.
- Fig. 89C illustrates file storage server write confirmation data packet containing FS link.
- Fig. 89D illustrates synthesis of a file storage read link in a client's SDNP messenger
- Fig. 91 is a graph representing storage resiliency as a function of the number of file storage servers and client FS links.
- Fig. 92 is a schematic representation of SDNP-encode and SDNP-decode functions.
- Fig. 93A is a schematic representation of SDNP distributed file storage with client side file security and HyperSecure file transport.
- Fig. 93B is a schematic representation of SDNP distributed file storage with nested file security and HyperSecure file transport.
- Fig. 94 is a simplified schematic representation of HyperSecure encoding in SDNP distributed file storage write operations.
- Fig. 95 is a simplified schematic representation of HyperSecure decoding in SDNP distributed file storage read operations.
- Fig. 96A is a flow chart describing the AAA operations in a HyperSecure file read operation.
- Fig. 96B is a flow chart describing file access and SDNP transport in a
- Fig. 97A illustrates the file read request operation in a distributed HyperSecure file storage system.
- Fig. 97B illustrates the file storage server name request operation in a distributed HyperSecure file storage system.
- Fig. 97C illustrates the file storage server name delivery and signaling server planning operation in a distributed HyperSecure file storage system.
- Fig. 97D illustrates the signaling server storage-side Last Mile and SDNP cloud routing read instruction in a distributed HyperSecure file storage system.
- Fig. 97E illustrates the signaling server client-side Last Mile and SDNP cloud read routing instruction in a distributed HyperSecure file storage system.
- Fig. 98 illustrates storage side file decoding during a read operation in a distributed HyperSecure file storage system.
- Fig. 99 illustrates file data transfers in a distributed HyperSecure file storage system during a read operation.
- Fig. 100 illustrates file data transfers in a distributed HyperSecure file storage system during a link refresh.
- Fig. 101 illustrates file data transfers in a distributed HyperSecure file storage system used to redistribute files.
- Fig. 102 illustrates time stamps in SDNP text messaging.
- Fig. 103 is a flow chart of SDNP registered communication.
- Fig. 104A illustrates end-to-end encryption in Internet OTT communication.
- Fig. 104B illustrates end-to-end encryption in HyperSecure communication.
- Fig. 105A is a schematic representation of a "SDNP call" operation with a SDNP security agent performing invisible monitoring of an outgoing call.
- Fig. 105B is a schematic representation of a "SDNP call" operation with a SDNP security agent performing invisible monitoring of an incoming call.
- Fig. 106 illustrates file storage server link transfers in a distributed HyperSecure file storage system with a SDNP security agent performing invisible monitoring of the FS link routing.
- Fig. 107 is a schematic representation of a "SDNP call" operation with a SDNP security agent performing invisible monitoring of an outgoing call employing multi-route Last Mile communication.
- Fig. 108 is a flow chart of the steps to designate and authorize a SD P security agent
- Fig. 109 illustrates cell phone to tower communication subject to SS7
- Fig. 110 illustrates SDNP communication using phone number camouflaging to repel SS7 attacks.
- Fig. Ill illustrates connectivity of SDNP SoftSwitch -based clouds hosted on separate servers.
- Fig. 112 illustrates connectivity of SDNP SoftSwitch -based clouds hosted on shared servers.
- Fig. 113 illustrates connectivity of SDNP SoftSwitch-Based clouds hosted on overlapping networks.
- Fig. 114 illustrates connectivity of SDNP SoftSwitch -Based clouds accessing global SDNP cloud telco.
- Fig. 115 is an example of a nested SDNP subnet.
- Internet service providers or ISPs form another link in the global chain of communications.
- voice carried over the Internet using VoIP, or "voice over Internet protocol” suffers from numerous quality-of- service or QoS problems, including
- the Internet a packet-switched network, is not designed to deliver IP packets in a timely manner or to support real-time applications with low latency and high QoS
- IP packet routing is made at the discretion of the Internet service provider, which controls the network within which the packet is routed and may adjust routing for balancing its own network's loading or to better serve its VIP clients at the expense at degrading connection quality of general traffic traversing its network.
- Over-the-top or OTT providers such as Line, KakaoTalk, Viber, etc. catching a free ride on the Internet act as Internet hitchhikers and have no control over the network or factors affecting QoS.
- IP packet's payload In unencrypted files, all application and file data encapsulated in the IP packet's payload, including personal and confidential information, login information, application passwords, financial records, videos, and photographs.
- a dialog of communications enabling a cyber party the repeated opportunity to break encrypted files • Numerous opportunities to install malware, including spyware and phishing programs and Trojan horses into communicating devices and routers using FTP, email, and web page based infections
- Encryption To defend against the diverse range of cyber-assaults as described, present day network managers, IT professionals, and application programs primarily rely on a single defense - encryption. Encryption is a means by which to convert recognizable content also known as "plaintext", whether readable text, executable programs, viewable videos and pictures, or intelligible audio, into an alternate file type known as "plaintext"
- the encryption process converting an unprotected file into an encrypted file, involves using a logical or mathematical algorithm, called a cypher, to change the data into equivalent textual elements without revealing any apparent pattern of the
- the receiving device Upon receiving the file, the receiving device, using a process known as “decryption, subsequently decodes the encoded message to reveal to original content.
- decryption a process known as "cryptography”
- E-key One algorithm is used to convert these two prime numbers into an encryption key, herein referred to as an E-key, and a different mathematical algorithm is used to convert the same two secret prime numbers into a secret decryption key, herein referred to also as a D-key.
- the RSA-user who selected the secret prime numbers herein referred to as the "key publisher', distributes or "publishes" this algorithmically generated E-key comprising typically between 1024b to 4096b in size, to anyone wishing to encrypt a file. Because this key is possibly distributed to many parties in an unencrypted form, the E- key is known as a "public key".
- Parties wishing to communicate with the key publisher then use this public E-key in conjunction with a publically available algorithm, typically offered in the form of commercial software, to encrypt any file to be sent to the particular key publisher.
- a publically available algorithm typically offered in the form of commercial software
- the key publisher Upon receiving an encrypted file, the key publisher then uses their secret D-key to decrypt the file, returning it to plaintext.
- the unique feature of the dual-key method in general and RSA algorithm in particular is that the public E-key used to encrypt a file cannot be used for decryption. Only the secret D-key possessed by the key publisher has the capability of file decryption.
- a dual-key, split-key, or multi-key exchange in file encryption and decryption is not limited specifically to RSA or any one algorithmic method, but methodologically specifies a communication method as a sequence of steps.
- a device e.g. a notebook wishing to receive a secure file from a cell phone first generates two keys, an E-key for encryption and a D-key for decryption using some algorithm. The notebook then sends the E-key to the cell phone using a public network communication carrying an IP packet.
- the IP packet in unencrypted form contains the MAC address, IP source address " B" and port address of the notebook along with the destination IP address "CP” and corresponding port of the cell phone as well as the transport protocol TCP and an encrypted copy of an E-key as its payload.
- the cell phone uses an agreed upon encryption algorithm or software package to produce an encrypted file, i.e. ciphertext, carried as a payload of IP packet in a secure communication from the cell phone to the notebook.
- the algorithm decrypts the file using secret decryption key, i.e. D-key. Since the D-key is made consistent with its corresponding E-key, in essence the algorithm employs knowledge of both keys to decrypt the ciphertext back into unencrypted plaintext 697B. While the payload of IP packet 696 is secured in the form of an encrypted file, i.e.
- the rest of the IP packet is still unencrypted, sniffable, and readable by any cyber pirate including the source IP address "CP” and port and the destination IP address "NB" and associated port. So even if the payload itself can't be opened, the
- Virtual Private Networks Another security method, also relying on encryption, is that of a "virtual private network" or VPN.
- VPN a tunnel or secure pipe is formed in a network using encrypted IP packets. Rather than only encrypting the payload, in a VPN the entire IP packet is encrypted and then encapsulated into another unencrypted IP packet acting as a mule or carrier transmitting the encapsulated packet from one VPN gateway to another.
- VPNs were used to connect disparate local area networks together over a long distance, e.g. when companies operating private networks in New York, Los Angeles, and Tokyo wished to interconnect their various LANs with the same functionality as if they shared one global private network.
- the basic VPN concept can be envisioned as encrypted communication between two devices, for example where a first server, as part of one LAN supporting a number of devices wirelessly through RF and wireline connections is connected by a "virtual private network" or VPN comprising encrypted content traversing the VPN tunnel to a second server having wireline connections to desktops, notebooks,, and to other WiFi base station.
- first server may also connects to a supercomputer via a high bandwidth connection.
- the resulting data communications comprises a sequence of data packets comprising an inner VPN packet embedded within an outer IP packet.
- an outer IP packet from server A specifying a source IP address and source port # is sent to server B at destination IP address and destination port #.
- This outer IP packet established communications between the first and second servers to form an encrypted tunnel to one another for data to pass within.
- the VPN payload carried by the outer packet contains a last-mile IP packet, providing direct
- a terminus device e.g. a desktop with source IP address "DT” and its corresponding ad hoc port #
- another terminus device e.g. a notebook with source IP address "NB” and its corresponding ad hoc port #.
- communication session can be initiated, in one example a request for a file transfer is performed through the VPN tunnel.
- the VPN tunnel is created and the session initiated before the actual communication is sent.
- the VPN tunnel may not be carried over the Internet, but instead often is carried by a dedicated ISP or carrier owning their own fiber and hardware network. This carrier oftentimes enters into an annual or long-term contractual agreement with the company requiring VPN services to guarantee a specific amount of bandwidth for a given cost.
- server-to-server communication occurs over a high-speed dedicated link connects directly with no intermediate or "last-mile" connections to disturb the VPN's performance, QoS, or security.
- tunneling In operation, traditional VPNs require a two-step process - one to create or "login" to the VPN, and a second step to transfer data within the secure pipe or tunnel.
- the concept of tunneling can be envisioned hierarchically as outer IP packets carried by 7-layer communication stacks (used for carrying the VPN connection) comprising Layers 1 through Layers 4, where Layer 5 is used to create a virtual VP session 723, and where Layer 6, the presentation layer, is used to facilitate encryption required to form a VPN gateway-to-gateway pipe between servers.
- the VPN connection employs Internet Protocol to send the IP packets
- the VPN' s PHY Layer 1 and VPN data link Layer 2 is often supported by a dedicated carrier to minimize unpredictable routing over the Internet.
- Application Layer 7 data transferred as device-to-device communication between communicating desktops for example, is delivered as tunneled data including all seven OSI layers needed to establish communication as if the VPN were not present.
- the VPN may be envisioned as a communication protocol operating within Layer-7 used to carry VPN inner packets.
- outer IP packet once passed from one communication stack to another is opened to reveal encapsulated data, the true message of the packet.
- the end-to-end communication occurs unaware of the details used to create the VPN tunnel, except that the VPN tunnel must be formed in advance of any attempt to communicate and must be closed after the conversation is terminated.
- Failure to open the VPN tunnel first will result in the unencrypted transmission of an IP packet susceptible to IP packet sniffing, hijacking, infection and more.
- Failure to close the VPN after a conversation is complete may provide a cybercriminal the opportunity to hide their illegal activity within someone else's VPN tunnel, and if intercepted, may result in possible criminal charges levied against an innocent person.
- VPNs are common ways for multiple private local area networks to interconnect to one another using private connections with dedicated capacity and bandwidth
- the use of VPNs over public Networks and the Internet is problematic for two party communications.
- One issue with VPNs is the VPN connection must be established in advance, before it can be used, not on a packet-by-packet basis
- the caller's cell phone must first be loaded with VPN connection application.
- the caller then must send IP packets to VPN host, typically a service provider. These packets are carried through any available last-mile routing, e.g.
- the caller's cell phone may then place a call via any VoIP phone app to any other phone. If the phone being called is not connected to the same VPN, the application must establish a "call out" link over the last mile from the VPN host nearest to the destination cell phone, i.e. the person being called. If the VoIP application is unable or unauthorized to do so, the call will fail and immediately terminate. Otherwise, the inner IP packet will establish an application Layer 5 session between calling and destination cell phones confirming the IP test packets are properly decrypted and intelligible.
- the call necessarily comes from a Layer 7 application running on the caller's phone, i.e. a cell phone app using the carrier's data plan, and not from the phone's normal dialup functions, because the telephonic carrier's SIM card in the phone is not compatible with the VPN tunnel.
- the caller's cell phone transmits a succession of IP packets representing small pieces or "snippets" of sound in accordance with its communication application. These packets are sent from the application in caller's cell phone through the network, e.g. through a WiFi link to a nearby WiFi base station then through a wireline connection to a router, and finally through wireline connection to the VPN host.
- the data is then sent securely to the VPN host through a VPN tunnel to the terminus device of the VPN network, the destination VPN gateway.
- the VPN tunnel doesn't extend all the way to the destination cell phone, but instead stops short of device being called.
- the data is no longer encrypted because the VPN carrier is no longer involved.
- VPN host For data packets leaving the VPN tunnel, VPN host forewords the data onward over the last mile connection of the destination device, e.g. a wireline connection to a nearby router, then by wireline connection to the local cell phone system and tower, transmitting the call as a normal cellular phone call using 2G, 3G or 4G telephony.
- the process of calling from a cell phone app to a phone not running the same app is called a "call out" feature.
- the foregoing example highlights another problem with connecting to a VPN over a public network - the last-mile link from the VPN host to the person being called are not part of the VPN, and therefore do not guarantee security, performance or call QoS. Specifically the caller's last mile comprising connections are all open to sniffing and subject to cyber-assaults. Once the call is completed and the caller's cell phone hangs up, the VPN link must be terminated whereby VPN Layer 5 coordinates closing the VPN session and the caller's cell phone disconnects from VPN host.
- Last mile communication from the destination VPN gateway to the destination cell phone is not secure and is at risk for sniffing and surveillance.
- the last mile communication between the caller's cell phone and the VPN gateway is secure only if the caller uses a data communication based app. If the caller connects to the VPN gateway using a telephonic link, i.e. a dial in feature, then last mile communications from a caller's cell phone to the nearest VPN gateway is not secure and is at risk for sniffing and surveillance.
- a telephonic link i.e. a dial in feature
- the call can only be secured end-to-end if both parties employs data communication and not telephony over their respect last mile links and provided that both parties know to join the same VPN prior to initiating the call.
- the last bullet point highlights the paradox of secure VPN communication - the person being called needs to know they are being called before they are called in order to join the network. To inform the person they are being to be called, they must first be contacted and instructed to log into the VPN before the call can commence. In essence they must receive an un-secured phone call to connect to a secure phone call. The unsecured phone call is easily hacked, sniffed, and surveiled. Moreover, the metadata of the unsecured call exposes who is calling who is being called, and what time the call occurs. Call metadata is extremely useful in tracking a person's activity or to profile them as a target for criminals.
- the VPN may not operate with sufficient low latency to support real-time applications, VoIP or video;
- the VPN last-mile connection from the caller to the VPN gateway or from the VPN gateway to the call recipient may not operate with sufficient low latency to support real-time applications, VoIP or video;
- the nearest VPN gateway to the caller or to the intended recipient i.e. "the last mile” may be very far away, possibly even farther than the distance to the call recipient without the VPN, exposing the connection to excessive latency, network instability, uncontrolled routing through unknown networks, variable QoS, and numerous opportunities for man-in-middle attacks in the unprotected portion of the connection;
- the VPN last-mile connection from the VPN gateway to the call recipient may not support "call out” connections and packet forwarding or support links to local telcos;
- Local carriers or government censors may block calls or connections into or out of known VPN gateways for reasons of national security or regulatory compliance;
- VoIP calls may limited to and from only company employees and specified authorized users, financial transactions and video streaming may be blocked, private email to public email servers such Yahoo, Google, etc. may be blocked, and numerous web sites such YouTube, chat programs, or Twitter may be blocked as per company policy.
- a VPN may get stuck open and retain a permanent session connected to a caller's device until manually reset by the VPN operator. This can lead to lost bandwidth for subsequent connections expensive connection fees.
- the last mile of the caller comprising a cell phone WiFi radio connection, WiFi base station, wireline connections, and router represent the same last-mile connectivity in both implementations.
- the caller's cell phone, cell phone connection, cell base station and tower, wireline connections, and router are identical for both Internet and VPN versions.
- the main difference is that in a public network, the VPN tunnel offering secure communication between VPN hosts is replaced by server/routers carrying insecure communication throughout the cloud.
- OTT communications the call is instantly available, and where using a VPN extra steps are required to set up the VPN and to terminate the VPN session prior to and following the call.
- the last-mile connections offer unpredictable call QoS, exposure to packet sniffing, and the risk of cyber-assaults.
- server/routers carrying a call are likely managed by different ISPs in different locales, one can interpret the servers as existing different clouds.
- the publically open networks owned and operated by Google, Yahoo, Amazon, and Microsoft may be considered as different clouds, e.g. the "Amazon cloud” even though they are all interlinked by the Internet.
- peer-to-peer network comprising a network made of a large number of peers with packet routing managed by the PPN and not by the router or ISP.
- peer-to-peer networks existed in hardware for decades, it was Napster who popularized the concept as a means to avoid the control, costs, and regulation of Internet service providers.
- the progenitors of Napster jumped ship, invading the early OTT carrier Skype.
- Skype's network converted from a traditional OTT into a Napster-like PPN.
- every device that makes a login connection to the PPN becomes one more node in the PPN.
- a cell phone with PPN software installed logs into the peer-to-peer network, it like all the other connected devices in the region becomes part of the network. Calls placed by any devices hops around from one device to another to reach is destination, another PPN connected device.
- another PPN connected device For example, if a caller's cell phone uses its PPN connection to call another PPN connected device, e.g. destination cell phone, the call follows a circuitous path through any device(s) physically located in the PPN between the two parties.
- the call emanating from a caller's cell phone connects by WiFi through a local WiFi base station to a nearby desktop, then to another person's notebook, to a different desktop, onto another desktop, and finally to the destination cell phone through a local cell phone base station and tower.
- all routing was controlled by the PPN and the Internet was not involved in managing the routing. Since both parties utilize, the PPN software used to connect to the network also acts as the application for VoIP based voice communication.
- the routing may necessarily include the Internet on some links, especially to send packets across oceans or mountain ranges.
- the first part of the routing in the local geography proceeds in a manner similar to the prior example, starting from the caller's cell phone and routed through a WiFi base station, desktop, notebook, more desktops, and so on. At this point, if the nearest notebook is connected to the network, the call will be routed through it, otherwise the call must be routed through a local cell phone base station and tower to the destination cell phone, and then back to cell phone base station and tower before sending it onwards.
- the call is then necessarily routed up to the Internet to 3 rd party server/router in a hosted cloud and onward through connections to 3 rd party server/routers in a different cloud.
- the call then leaves the Internet and enters the PPN in the destination geography first through a desktop which in turn connects to WiFi, to a notebook, and to a base station. Since WiFi does not run the PPN app, the actual packet entering WiFi must travel to either a tablet or cell phone in the WiFi subnet and back to WiFi before being sent on to cell phone base station and tower via a wireline connection.
- the caller cell phone call connects to the destination cell phone, which is not a PPN enabled device.
- the connection thereby constitutes a "call out" for the PPN because it exits PPN network.
- placing a call involves first registering a calling device to the PPN network by completing a PPN login. Thereafter, the call can be placed using the PPN app.
- the advantage of the PPN approach is little or no hardware is needed to carry a call over a long distance, and that since every device connected to the PPN regularly updates the PPN operator as to its status, loading and latency, the PPN operator can decide a packet' s routing to best minimize delay.
- a comparative summary of ad hoc VPN providers, Internet OTT providers, and PPN peer networks is contrasted below.
- Entire Packet (Last Mile) As shown, while VPN and the Internet comprise fixed infrastructure, the nodes of a peer-to-peer network vary depending on who is logged in and what devices are connected to the PPN.
- the cloud bandwidth defined in the context of this table as the networks' high-speed long-distance connections, e.g. networks crossing oceans and mountain ranges, is contractually guaranteed only in the case of VPNs, and is otherwise unpredictable.
- the last-mile bandwidth is local provider dependent for both Internet and VPN providers but for PPN is entirely dependent on who is logged in.
- Latency the propagation delay of successively sent IP packets is unmanageable for OTTs and VPNs because the provider does not control routing in the last mile but instead depends on local telco or network providers, while PPNs have limited ability using best efforts to direct traffic among the nodes that happen to be online at the time in a particular geography. Likewise, for network stability, PPNs have the ability to reroute traffic to keep a network up but depend entirely on who is logged in. The Internet, on the other hand, is intrinsically redundant and almost certain to guarantee delivery but not necessarily in a timely manner. Network stability for an ad hoc VPN depends on the number of nodes authorized to connect to the VPN host. If these nodes go offline, the VPN is crippled.
- VPNs can involve a complex login procedure.
- All three networks listed suffer from variable VoIP QoS, generally lagging far behind commercial telephony carriers.
- All three options are bad with the last mile completely exposed to packet sniffing with readable addresses and payloads.
- VPNs offer encryption of the cloud connection but still expose the IP addresses of the VPN hosts. As such no network option shown is considered secure. As such, encryption is used by various applications to try to prevent hacking and cyber-assaults, either as a Layer 6 protocol or as an embedded portion of the Layer 7 application itself.
- AES cipher To combat the ever-present risk of code breaking, new algorithms and "bigger key” encryption methods such as the "advanced encryption standard" or AES cipher adopted by US NIST in 2001 have emerged.
- the design principle known as a substitution-permutation network combines both character substitution and permutation using different key and block sizes.
- the algorithm comprises fixed block sizes of 128 bits with keys comprising varying lengths of 128 bits, 192 bits, and 256 bits, with the corresponding number of repetitions used in the input file transformation varying in rounds of 10, 12, and 14 cycles respectively.
- AES cipher may be efficiently and rapidly executed in either software or hardware for any size of key.
- AES256 encryption In cryptography vernacular, an AES based encryption using a 256b key is referred to as AES256 encryption.
- AES512 encryption employing a 512b key is also available.
- each data packet shown comprises a sequence of data or sound arranged sequentially in time or pages unaltered from its original order when it was created. If the content of a data packet is textual, reading the unencrypted plaintext file in the sequence 1A-1B-1C-1D-1E-1F will result in "legible” text for communique number "1". If the content of a data packet is audio, converting, i.e. "playing", the unencrypted plaintext file in the sequence 1 A-1B-1C-1D-1E-1F through a corresponding audio CODEC, essentially a software based D/A converter, will result in sound for audio file number "1".
- each data slot represented by fixed size boxes comprises a prescribed number of bits, e.g. two bytes (2B) long.
- the exact number of bits per slot is flexible just so long as every communication node in a network knows what the size of each data slot is.
- Contained within each data slot is audio, video, or textual data, identified in the drawings as a number followed by a letter.
- the first slot of data packet 790 contains the content 1 A where the number "1" indicates the specific communication #1 and the letter "A" represents the first piece of the data in communication #1.
- the second slot of data packet 790 contains the content IB where the number "1" indicates it is part of the same communication #1 and the letter "B" represents the second piece of the data in communication #1, sequentially following 1A.
- homogeneous communications e.g. where all the data is for communication #1 are easier to analyze and read than those mixing different communications.
- Data arranged sequentially in proper order makes it easy for a cyber-attacker to interpret the nature of the data, whether it is audio, text, graphics, photos, video, executable code, etc.
- the packet's source and destination IP addresses remain constant, i.e. where the packets remain unchanged during transport through the network in the same form as the data entering or exiting gateway servers 21 A and 2 IF, because the underlying data doesn't change, a hacker has more chances to intercept the data packets and a better chance to analyze and open the files or listen to the conversation.
- the simple transport and one-dimensional security i.e. relying only on encryption for protection, increases the risk of a cyber-attack because the likelihood of success is higher in such overly simplified use of the Internet as a packet-switched network.
- Client or Client Device A device, typically a cell phone, tablet, notebook, desktop, or IoT device connected to an SDNP Cloud over a Last Mile.
- Concealment The encoding process by which the contents of a SDNP packet or portions thereof are rendered unrecognizable using any sequential combination of security operation such as scrambling, splitting, junk data insertions, and encryption. Recovery of concealed data requires execution of the anti-function or decoding processes in reverse order, e.g. decryption, junk data removal, mixing and unscrambling.
- Decryption A mathematical operation used to convert data packets from ciphertext into plaintext.
- Disaggregated Data Storage The process of fragmenting data files and concealing their content before storing the various fragmented files on different data storage nodes.
- DMZ Server A computer server not accessible directly from the SDNP network or the Internet used for storing selectors, seed generators, key generators and other shared secrets.
- a DMZ may also be referred to as an "air gapped" server, i.e. a computer with no wired network connection or access.
- Dynamic Encryption / Decryption Encryption and decryption relying on keys that change dynamically as a data packet traverses the SDNP network.
- Dynamic Mixing The process of mixing where the mixing algorithms (the inverse of splitting algorithms) change dynamically as a function of a seed based on a state, such as the time, state, and zone when a mixed data packet is created.
- Dynamic Scrambling / Unscrambling Scrambling and unscrambling relying on algorithms that change dynamically as a function of a state, such as the time when a data packet is created or the zone in which it is created.
- Dynamic Splitting The process of splitting where the splitting algorithms change dynamically as a function of a seed based on a state, such as the time, state, and zone when a data packet is split into multiple sub-packets.
- Encryption A mathematical operation used to convert data packets from plaintext into ciphertext.
- Fragmented Data Transport The routing of split and mixed data through the SDNP network.
- Junk Data Deletions (or “De-junking"): The removal of junk data from data packets in order to restore the original data or to recover the data packet's original length.
- Junk Data Insertions The intentional introduction of meaningless data into a data packet, either for purposes of obfuscating the real data content or for managing the length of a data packet.
- a key is used to select an algorithm for encrypting or decrypting the data in a packet from a selector.
- a key can be used to safely pass information regarding a state over public or unsecure lines.
- Key Exchange Server A computer server, often third party hosted and
- Last Link The network connection between a Client' s device and the first device in the network with which it communicates, typically a radio tower, a WiFi router, a cable modem, a set top box, or an Ethernet connection.
- the Last Link comprises a physical "tethered" (i.e. wired) connection to a cable modem or optical fiber modem.
- WiFi connectivity e.g. in a cafe
- the Last Link comprises a WiFi router connected to a DSL, cable, or fiber network.
- the Last Link comprises the radio link between the cellular tower and the mobile phone, which may comprise, for example a 3G or 4G/LTE connection.
- Last Mile The network connection between a Client and a gateway media node in an SDNP or other type of network or cloud, including the Last Link.
- the Last Mile typically comprises communication over networks owned and operated by local telco's and cable companies, e.g. Comcast cable, Verizon cellular, Korean Telecom, British Telecom, etc.
- Mixing The combining of data packets from different sources, which may include different data types, to produce one longer data packet (or a series of smaller sub- packets) having unrecognizable content. In some cases previously split data packets are mixed to recover the original data content.
- the mixing operation may also include junk data insertions and deletions and parsing.
- Multiple PHY or Multi-PHY Communication involving alternating transport of related sequential data packets over multiple physical mediums, e.g. optical fiber and 4G, different WiFi channels and frequencies, 4G and WiFi, Ethernet WiFi, etc.
- Parsing A numerical operation whereby a data packet is broken into shorter sub- packets for storage or for transmission.
- Router A device that directs the routing of a datagram to the destination address specified in its IP header.
- the IP address employed may represent a valid Internet IP address (one recognized by a DNS server) or may represent the NAT address assigned by a network address translator operated by the local network provider (e.g. Comcast assigns its own internal IP addresses for communication within the Comcast cable/fiber network).
- Scrambling An operation wherein the order or sequence of data segments in a data packet is changed from its natural order into an unrecognizable form.
- Splitting An operation wherein a data packet (or a sequence of serial data packets) is split into multiple sub-packets, which are routed to multiple destinations.
- a splitting operation may also include junk data insertions and deletions.
- SoftSwitch Software comprising executable code performing the function of a telecommunication switch and router.
- SDNP An acronym for "Secure Dynamic Communication Network
- SDNP Address An address used for routing SDNP packets through the SDNP cloud or over the Last Mile comprising the ad hoc IP address of the next destination device, i.e. only enough information to execute a single hop.
- SDNP Administration Server A computer server used to distribute executable code and shared secrets to SDNP servers globally or in specific zones.
- SDNP Bridge Node A SDNP node connecting one SDNP Zone or Cloud to another SDNP Zone or Cloud having dissimilar security credentials.
- SDNP Client or Client Device A network connected device, typically a cell phone, tablet, notebook, desktop, or IoT device running a SDNP application in order to connect to an SDNP Cloud, generally connecting over a Last Mile.
- SDNP Cloud A network of interconnected SDNP Servers running SoftSwitch executable code to perform SDNP Communications Node operations.
- SDNP Gateway Node A media node connecting an SDNP Cloud to a Client Device via a Last Mile. SDNP Gateway nodes require access to at least two Zones - that of the SDNP Cloud and of the Last Mile.
- SDNP Media Node SoftSwitch executable code that processes incoming data packets with particular identifying tags in accordance with instructions from the signaling server or another computer performing the signaling function, including encryption / decryption, scrambling / unscrambling, mixing / splitting, tagging and SDNP header and sub-header generation.
- An SDNP Media Node is responsible for identifying incoming data packets having specific tags and for forwarding newly generated data packets to their next destination.
- SDNP Media Server A computer server hosting a SoftSwitch performing the functions of a SDNP Media Node in dual-channel and tri-channel communications and also performing the tasks of a SDNP Signaling Node and a SDNP Name- Server Node in single-channel communications.
- SDNP Name Server A computer server hosting a SoftSwitch performing the functions of a SDNP Name-Server Node in tri-channel communications.
- SDNP Name Server Node SoftSwitch executable code that manages a dynamic list of every SDNP device connected to the SDNP cloud.
- SDNP Network The entire hyper-secure communication network extending from client-to-client including last link and last mile communication, as well as the SDNP cloud.
- SDNP Node A SDNP communication node comprising a software-based "SoftSwitch” running on a computer server or alternatively a hardware device connected to the SDNP network, functioning as an SDNP node, either as Media Node, a Signaling Node, or a Name Server Node.
- SoftSwitch software-based "SoftSwitch” running on a computer server or alternatively a hardware device connected to the SDNP network, functioning as an SDNP node, either as Media Node, a Signaling Node, or a Name Server Node.
- SDNP Server A computer server comprising either a SDNP Media Server, a SDNP Signaling Server, or a SDNP Name Server and hosting the applicable SoftSwitch functions to operate as an SDNP node.
- SDNP Signaling Node SoftSwitch executable code that initiates a call or communication between or among parties, determines all or portions of the multiple routes for fragmented data transport based on caller criteria and a dynamic table of node- to-node propagation delays, and instructing the SDNP media how to manage the incoming and outgoing data packets.
- SDNP Signaling or Signal Server A computer server hosting a SoftSwitch performing the functions of a SDNP Signaling Node in dual-channel and tri-channel SDNP communications, and also performing the duties of the SDNP Name-Sever Node in dual-channel communications.
- SDNP Tag A source address, SDNP zip code, or any other code used to identify an incoming data packet or a sub-packet thereof.
- Security Operation The process of modifying a data packet to perform
- Security Settings or Security Credentials Digital values, such as seeds and keys, that are generated by seed generators or key generators using secret algorithms in conjunction with a constantly changing input state, such as network time, and that can therefore be safety transmitted over public or insecure lines.
- Seed A disguised digital value that is generated by inputting a state, such as time, into a seed generator, which uses a secret algorithm to generate the seed.
- a seed is used to select an algorithm for scrambling, encrypting or splitting the data in a packet from a selector.
- a seed can be used to safely pass information regarding a state over public or unsecure lines.
- Selector A list or table of possible scrambling, encryption or splitting algorithms that are part of the shared secrets and that are used in conjunction with a seed or key to select a particular algorithm for scrambling, unscrambling, encrypting, decrypting, splitting or mixing a packet or packets.
- Shared Secrets Confidential information regarding SD P node operation, including tables or selectors of scrambling /unscrambling, encryption / decryption, and mixing / splitting algorithms, as well as the algorithms used by seed generators, key generators, zone information, and algorithm shuffling processes stored locally on DMZ servers not accessible over the SDNP network or the Internet.
- Single PHY Communication of related data packets transported over a single physical medium, e.g. exclusively over optical fiber, or Ethernet, or WiFi, or a cellular network.
- Unscrambling A process used to restore the data segments in a scrambled data packet to their original order or sequence. Unscrambling is the inverse function of scrambling.
- Zone A network of specific interconnected servers sharing common security credentials and shared secrets. Last mile connections comprise separate zones from those in an SDNP Cloud.
- SDNP Secure Dynamic Communication Network And Protocol
- Unauthorized inspection or sniffing of a data packet should provide no context as to where the packet came from, where it is going, or what is in it.
- Data packet payloads should be dynamically re-encrypted, i.e., decrypted and then encrypted again using a different encryption algorithm, with no risk of being hacked in any reasonable time.
- data packet payloads may still contain incomprehensible payloads comprising a dynamically scrambled mix of multiple conversations and unrelated data mixed with junk packet fillers.
- the SDNP employs one or more dedicated clouds comprising telco, i.e. telecommunication system, soft-switch functions realized using proprietary command and control software not accessible through the Internet.
- All intra-cloud communication occurs using dedicated SDNP packet routing within proprietary clouds based on SDNP addresses and dynamic ports (i.e. proprietary NAT addresses), not on DNS recognized IP addresses. SDNP addresses are not usable or routable over the Internet or outside the SDNP cloud.
- the SDNP network constantly identifies and dynamically routes all real-time communication through the lowest latency paths available.
- No secure or real-time communication is routed outside the SDNP cloud or over the Internet except in cloud-to-cloud and last-mile communication, and then generally using single-hop routing with invisible addresses.
- Routing data contained within a data packet identifies the routing for a single hop between two adjacent devices, identifying only the last and next server's SDNP or IP addresses
- the phone number or IP addresses of the caller and the call recipient i.e. the clients' respective source and destination addresses, are not present in the IP packet headers nor are they present in the encrypted payload ⁇ Command and control related shared secrets exist in system software installed in secure DMZ servers not accessible through the Internet.
- ⁇ SDNP packet communication may occur through three independent channels - a "name server” used to identify elements within the SDNP cloud, "media servers” used for routing content and data, and “signaling servers” used for packet and call command and control.
- Routing information may be supplied to all participating media servers through an
- the signaling server supplies the media servers with only the last and next destination of a packet traversing the network.
- Media packets contain fragmented data representing only a portion of a call, document, text or file, dynamically mixed and remixed with other packets containing fragmented data from other sources and of different types.
- ⁇ Special security methods are employed to protect the first- and last-mile communication, including separating signaling server-related communications from media and content-related packets.
- Packet transport is content-type dependent, with voice and real- time video or streaming based on an enhanced UDP, while signaling packets, command-and-control packets, data files, application files, systems files, and other files which are sensitive to packet loss or latency utilize TCP transport.
- the disclosed "secure dynamic communication network and protocol” or SD P utilizes an inventive “dynamic mesh” network comprising
- Multichannel communication separating media and content from signaling, command and control, and network addresses
- SDNP communication relies on multi-route and meshed communication to dynamically route data packets. Contrasting single-path packet communication used for Internet OTT and VoIP communications, in SDNP
- the content of data packets is not carried serially by coherent packets containing information from a common source or caller, but in fragmented form, dynamically mixing and remixing content emanating from multiple sources and callers, where said data agglomerates incomplete snippets of data, content, voice, video and files of dissimilar data types with junk data fillers.
- the advantage of the disclosed realization of data fragmentation and transport is that even unencrypted and unscrambled data packets are nearly impossible to interpret because they represent the combination of unrelated data and data types.
- these hybridized packets of dynamically encrypted, scrambled, fragmented data comprise meaningless packets of gibberish, completely unintelligible to any party or observer lacking the shared secrets, keys, numeric seeds, and time and state variables used to create, packet, and dynamically re-packet the data.
- each packet's fragmented content, and the secrets used to create it remain valid for only a fraction of a second before the packet is reconstituted with new fragments and new security provisions such as revised seeds, keys, algorithms, and secrets.
- the limited duration in which a cyber-pirate has available to break and open the state-dependent SD P data packet further enhances SD P security, requiring tens of thousands of compute years to be processed in one tenth of a second, a challenge twelve orders of magnitudes greater than the time available to break it.
- the disclosed secure dynamic communication network and protocol is referred to herein as a
- “HyperSecure” network Data Packet Scrambling—
- secure communication over a packet-switched network relies on several elements to prevent hacking and ensure security, one of which involves SDNP packet scrambling.
- SDNP packet scrambling involves rearranging the data segments out of sequence, rendering the information incomprehensible and useless.
- FIG. 2A an unscrambled data packet, data packet 923, processed through scrambling operation 924, results in scrambled data packet 925.
- the scrambling operation can use any algorithm, numerical method, or sequencing method.
- the algorithm may represent a static equation or include dynamic variables or numerical seeds based on "states," such as time 920 when the scrambling occurred, and a numerical seed 929 generated by seed generator 921, which may generate seed 929 using an algorithm that is also dependent on a state such as time 920 at the time of the scrambling. For example, if each date is converted into a unique number ascending monotonically, then every seed 929 is unique. Time 920 and seed 929 may be used to select a specific algorithm and may also be used to select or calculate a specific scrambling operation 924, chosen from a list of available scrambling methods, i.e. from scrambling algorithms 922. In data flow diagrams, it is convenient to illustrate this packet-scrambling operation and sequence using a schematic or symbolic
- the unscrambling operation shown in FIG. 2B illustrates the inverse function of scrambling operation 924, specifically unscrambling operation 927, where the state or time 920 and corresponding seed 929 used to create scrambled data packet 925 are re- used for undoing the scrambling to produce unscrambled data, specifically unscrambled data packet 923.
- the same scrambling method must be used again in the unscrambling operation 927 as selected from scrambling algorithm list 922.
- scrambling algorithm list 922 references the term "scrambling"
- the same algorithm table is used to identify and select the inverse function needed for performing "unscrambling", i.e.
- scrambling algorithm list 922 contains the information needed both for scrambling data packets and for unscrambling data packets. Because the two functions involve the same steps performed in reverse order, list 922 could also be renamed as "scrambling / unscrambling" algorithms list 922. For clarity's sake however, the table is labeled only by the function and not by its anti -function.
- FIG. 2C Examples of such reversible functions are illustrated by the static scrambling algorithms shown in FIG. 2C including mirroring and phase-shift algorithms.
- mirroring algorithms the data segments are swapped with other data segments as a mirror image around a line of symmetry defined by the modulus or "mod" of the mirroring process.
- mod-2 mirroring every two data segments of original input data packet 930 are swapped, i.e. where 1A and IB are switched in position, as are IC and ID, IE and IF and so on, to produce scrambled output data packet 935, with a line of symmetry centered between the first and second data segments, between the third and fourth data segments, and so on, or mathematically as 1.5 th , 3.5 th , 5.5 th , ... , (1.5 + 2n) th position.
- data segments 1 A and IC are swapped while IB remains in the center of the triplet
- data segments ID and IF are swapped while IE remains in the center of the triplet, and so on, to produce scrambled data packet output 936.
- the line of symmetry is centered in the 2 nd , 5 th , 8 th , ... , (2+3n) th position.
- the first and fourth data segments and the second and third of every four data segments are swapped, and so on to produce scrambled output data packet 937 from input data packet 931. Accordingly, data segment 1 A is swapped with ID; data segment IB is swapped with IC; and so on.
- the line of symmetry is centered between the second and third data segments of every quadruplet, e.g. between the 2 nd and 3 rd data segments, the 6 m and ⁇ data segments, and so on, or mathematically as 2.5 th , 6.5 th , ... , (2.5 + 4 ⁇ ) ⁇ position.
- the m th data segment of input data packet 932 is swapped with the first, i.e. the 0 th data segment; the 0 th data segment is swapped with the m 111 element; and similarly the ⁇ ⁇ element is swapped with the (m-n) 111 data segment to produce scrambled output data packet 938.
- Another scrambling method also shown in FIG. 2C is a frame-shift, where every data segment is shifted left or right by one, two, or more frames. For example, in a single frame phase shift, every data segment is shifted by one frame, where the first data segment is shifted to the second position; the second data segment is shifted to the third frame, and so on to produce scrambled output data packet 940.
- the last frame of input data packet 930, frame IF in the example shown, is shifted to the first frame previously occupied by data segment 1 A.
- the first data segment 1 A of input data packet 930 is shifted by two frames into the position previously occupied by data segment 1C, the 4 th frame ID is shifted into the last position of scrambled output data packet 941, the next to the last data segment IE is shifted into the first position and the last position IF is shifted into the second position.
- the data segments of input data data packet 930 are shifted by four places with first frame 1 A replacing the frame previously held by IE, IB replacing IF, 1C replacing 1 A, and so on, to produce scrambled output data packet 942.
- phase-shifting one frame beyond the maximum phase shift results in output data unchanged from the input.
- the examples shown comprise phase-shifts where the data was shifted to the right.
- the algorithm also works for phase shifts-to the left but with different results.
- parametric scrambling means the scrambling method is chosen from a table of possible scrambling algorithms, e.g. sort # A, sort # B, etc., based on a value derived from data contained within the data packet itself. For example, assume each data segment can be converted into a numerical value based on a calculation of the data contained within the data segment.
- One possible approach to determine the numerical value of a data segment is to employ the decimal or hexadecimal equivalent of the bit data in the data segment. If the data segment contains multiple terms, the numeric equivalent can be found by summing the numbers in the data segment. The data segment data is then combined into a single number or "parameter" and then used to select which scrambling method is employed.
- unscrambled data packet 930 is converted parametrically in step 950 into a data table 951, containing a numeric value for each data segment.
- data segment 1 A the 0 th frame
- data segment IB the 1 st frame
- a single data packet value is then extracted in step 952 for the entire data packet 930.
- sum 953 represents the linear summation of all the data segment values from table 951, parametrically totaling 1002.
- this parametric value i.e. sum 953, is compared against a condition table, i.e.
- Sort # C summarized in table 957, comprises a set of relative moves for each data segment.
- the first data segment of scrambled data packet 959, the 0 th frame is determined by moving the ID data segment to the left by three moves, i.e. a 3 shift.
- the 1 st frame comprises data segment IB, unchanged from its original position, i.e. a move of 0 places.
- the 2 nd frame comprises IE, a data segment shifted left by two moves from its original position.
- the same is true for the 3 rd frame comprising data segment IF shifted left by two moves from its original position.
- the 4 th frame of scrambled data packet output 959 comprises data segment 1C shifted right, i.e. +2 moves, from its original position.
- the 5 m frame comprises data segment 1 A, shifted five moves to the right, i.e. +5, from its original position.
- every data segment is moved uniquely to a new position to create a parametrically determined scrambled data packet 959.
- the process is reversed, using the same sort method, sort # C.
- the parametric value 953 of the data packet cannot be changed as a consequence of the scrambling operation. For example, using a linear summation of the parametric value of every data segment produces the same numerical value regardless of the order of the numbers.
- Dynamic scrambling utilizes a system state, e.g. time, to be able to identify the conditions when a data packet was scrambled, enabling the same method to be selected to perform the unscrambling operation.
- the state is used to generate a disguised numerical seed, which is transmitted to the sender or recipient of the package, which then uses the seed to select a scrambling algorithm from a table.
- the state itself may be transmitted to the sender or recipient, the state may be used by a hidden number generator located in the sender or recipient to generate a hidden number, where the hidden number is used to select a scrambling/unscrambling algorithm.
- a state e.g. time 920
- hidden number generator 960 is used to generate a hidden number 961, using hidden number generator 960
- hidden number 861a is used to select a scrambling method from scrambling algorithm list 962.
- Hidden number generator 960 also may input the hidden number HN 961b directly to scrambling operation 963, where HN may serve as a variable in executing the scrambling operation.
- scrambling operation 963 converts unscrambled data packet 930 into scrambled data packet 964.
- the state 920 may be passed directly to hidden number generator 960 or state 920 may be passed to hidden number generator via seed generator 921.
- the benefit of using a hidden number to select a scrambling algorithm instead of just a numeric seed is it eliminates any possibility of a cybercriminal recreating the scrambling table by analyzing the data stream, i.e. statistically correlating repeated sets of scrambled data to corresponding numeric seeds.
- the seed may be visible in the data stream and therefore subject to spying
- the hidden number generator and the hidden number HN it creates is based on a shared secret.
- the hidden number HN is therefore not present in the data stream or subject to spying or sniffing, meaning it is not transmitted across the network but generated locally from the numeric seed.
- This mathematical operation of a hidden number generator thereby confers an added layer of security in thwarting hackers because the purpose of the numeric seed is disguised.
- the numeric seed may also be used as an input variable in the algorithm of scrambling process 963. Dual use of the numeric seed further confounds analysis because the seed does not directly choose the algorithm but works in conjunction with it to determine the final sequence of the scrambled data segments.
- seed 929 (or alternatively the state or time 920) must be passed from the communication node, device or software initially performing the scrambling to any node or device wishing to unscramble it.
- the algorithm of seed generation 921, hidden number generator 960, and the list of scrambling algorithms 962 represent "shared secrets," information stored in a DMZ server (as described below) and not known to either the sender or the recipient of a data packet.
- the shared secret is established in advance and is unrelated to the communication data packets being sent, possibly during installation of the code where a variety of authentication procedures are employed to insure the secret does not leak.
- shared secrets may be limited to "zones" so that knowledge of one set of stolen secrets still does not enable a hacker to access the entire communication network or to intercept real-time communiques.
- a seed based on a "state" is required to scramble or unscramble the data.
- This state on which the seed is based may comprise any physical parameter such as time, communication node number, network identity, or even GPS location, so long as there is no ambiguity as to the state used in generating the seed and so long as there is some means to inform the next node what state was used to last scramble the data packet.
- the algorithm used by the seed generator to produce a seed is part of the shared secrets, and hence knowledge of the seed does not allow one to determine the state on which the seed is based.
- the seed may be passed from one communication node to the next by embedding it within the data packet itself, by sending it through another channel or path, or some combination thereof.
- the state used in generating a seed may comprise a random number generated by a counter and subsequently incremented by a fixed number each time a data packet traverses a communication node, with each count representing a specific scrambling algorithm.
- a random number is generated to select the scrambling method used.
- This random number is embedded in the data packet in a header or portion of the data packet reserved for command and control and not subject to scrambling.
- the embedded number is read by the communication node and used by the software to select the proper algorithm to unscramble the incoming data packet.
- the number i.e. the "count” is next incremented by one count or some other predetermined integer, the packet is scrambled according to the algorithm associated with this new number, and the new count is stored in the data packet output overwriting the previous number.
- the next communication node repeats the process.
- a random number is generated to select the initial scrambling algorithm and this number is forwarded to every communication node used to transport the specific data packet as a "shared secret".
- a count e.g. starting with 0, is also embedded in the data packet in a header or portion of the data packet reserved for command and control and not subject to scrambling.
- the data packet is then forwarded to the next communication node.
- the server reads the value of the count, adds the count to the initial random number, identifies the scrambling algorithm used to last scramble the data packet and unscrambles the packet accordingly.
- the count is then incremented by one or any predetermined integer, and the count is again stored in the data packet's header or any portion of the data packet reserved for command and control and not subject to scrambling, overwriting the prior count.
- the random number serving as a shared secret is not communicated in the communication data packet.
- the server When the data packet arrives at the next communication node, the server then adds the random number shared secret added to the revised counter value extracted from the data packet. This new number uniquely identifies the scrambling algorithm employed by the last communication node to scramble the incoming packet. In this method, only a meaningless count number can be intercepted from the unscrambled portion of a data packet by a cyber-pirate, who has no idea what the data means.
- a hidden number may be employed to
- a hidden number combines a time-varying state or a seed, with a shared secret generally comprising a numeric algorithm, together used to produce a confidential number, i.e. a "hidden number" that is never communicated between communication nodes and is therefore not sniffable or discoverable to any man-in-the middle attack or cyber-pirate.
- the hidden number is then used to select the scrambling algorithm employed. Since the state or seed is meaningless without knowing the algorithm used to calculate the hidden number and because the shared-secret algorithm can be stored behind a firewall inaccessible over the network or Internet, then no amount of monitoring of network traffic will reveal a pattern. To further complicate matters, the location of the seed can also represent a shared secret.
- a number carried by an unscrambled portion of a data packet and observable to data sniffing comprises a long number where only a portion of the number represents the seed. If for example, the third through eighth digits represent the seed, then the real seed is not the entire number but only the bolded numbers 27482567822552213, i.e. the seed is 48256. This seed is then combined with a shared secret algorithm to generate a hidden number, and the hidden number is used to select the scrambling algorithm, varying dynamically throughout a network.
- the data traversing the network can be referred to as "plaintext" because the actual data is present in the data packets, i.e. the packets have not been encrypted into ciphertext.
- plaintext the character string comprising the original data, whether scrambled or not, is translated into a meaningless series of nonsense characters using an encryption key, and cannot be restored to its original plaintext form without a decryption key.
- packet "re-scrambling" is required, as shown in FIG. 3.
- the process of packet re-scrambling returns a scrambled data packet to its unscrambled state before scrambling it again with a new scrambling algorithm.
- re-scrambling means unscrambling a data packet and then scrambling it again, typically with a different scrambling algorithm or method. This approach avoids the risk of data corruption that could occur by scrambling a previously scrambled package and losing track of the sequence needed to restore the original data.
- scrambled data packet 1008 is "re-scrambled,” first by unscrambling it with unscrambling operation 928, using the inverse operation of the scrambling algorithm used to scramble the data, and then by scrambling the data packet anew with scrambling operation 926, using a different scrambling algorithm than used in the prior scrambling operation 926.
- the resulting re-scrambled data packet 1009 differs from the prior scrambled data packet 1008.
- Re-scrambling operation 1017 comprises the successive application of unscrambling followed by scrambling, referred to herein as "US re-scrambling," where "US” is an acronym for "unscrambling-scrambling.”
- US is an acronym for "unscrambling-scrambling.”
- the final packet unscrambling operation 928 requires using the inverse function of the same algorithm used to last re-scramble the data packet.
- the static and dynamic scrambling of data renders interpretation of the unscrambled data meaningless, reordering sound into unrecognizable noise, reordering text into gibberish, reordering video into video snow, and scrambling code beyond repair.
- scrambling provides a great degree of security.
- scrambling is only one element utilized to provide and insure secure communication free from hacking, cyber-assaults, cyber-piracy, and man-in-the-middle attacks.
- Packet Encryption In accordance with the disclosed invention, secure communication over a packet-switched network relies on several elements to prevent hacking and ensure security, one of which involves SDNP encryption.
- encryption from the Greek meaning "to hide, to conceal, to obscure” represents a means to convert normal information or data, commonly called “plaintext", into “ciphertext” comprising an incomprehensible format rendering the data unreadable without secret knowledge.
- this secret knowledge generally involves sharing one or more "keys" used for encrypting and decrypting the data.
- the keys generally comprise pseudo-random numbers generated algorithmically.
- SDNP communication is based on the premise that all encrypted files have a limited "shelf life", metaphorically meaning that encrypted data is good (secure) for only a finite period of time and that the confidential data must be re-encrypted dynamically at regular intervals, ideally far more frequently than the best estimates of the time required to crack its encryption with state-of-the-art computers. For example, if it is estimated by cryptologists that a large server farm of crypto-engines can break a given cipher in one year, then in SDNP communication a data packet will be re-encrypted every second or even every 100ms, intervals many orders of magnitude shorter than the best technology's capability to crack it. As such, SDNP encryption is necessarily dynamic, i.e.
- time variant and may also be spatially variant, i.e. depending on a communication node's location in a packet-switched network or geography.
- re-encrypting or “re-encryption” refer to decrypting a data packet and then encrypting it again, typically with a different encryption algorithm or method.
- SD P encryption therefore involves converting data from unencrypted plaintext into ciphertext repeatedly and frequently, rendering the information incomprehensible and useless. Even if a given packet's data encryption is spontaneously broken, by employing SD P's dynamic encryption methods, the next data packet utilizes a completely different encryption key or cipher and requires a completely new effort to crack its encryption. By limiting the total content of each uniquely encrypted data packet, the potential damage of unauthorized access is mitigated because an exposed data packet contains, by itself, a data file too small to be meaningful or useful by a cyber-pirate. Moreover, by combining dynamic encryption with the aforementioned SDNP scrambling methods, communication security is enhanced tremendously. Even in its unencrypted form, the intercepted data file contains only a small snippet of data, voice, or video scrambled into a meaningless and incomprehensible sequence of data segments.
- SDNP encryption is dynamic and state-dependent.
- an unencrypted data packet comprising plaintext 930, processed through encryption operation 1020, results in an encrypted data packet comprising ciphertext 1024 or 1025.
- the entire data packet of plaintext 930 is encrypted in toto, treating data segments 1 A through IF as a single data file.
- each data segment 1 A through IF of plaintext 930 is encrypted separately and distinctly, and is not merged with other data segments.
- First data segment 1 A is encrypted into a corresponding first ciphertext data segment shown for illustration purposes by a string of characters starting with 7$ and comprising a long string of characters or digits not shown.
- second plaintext data segment IB is encrypted into second ciphertext data segment comprising a long string of characters shown for illustrative purposes starting with * A .
- the characters 7$ and * A are meant to illustrate the beginning of meaningless strings of symbols, digits, and alphanumeric characters and not to limit or imply anything about the specific data in the plaintext source or the length of the character strings being encrypted.
- Encryption operation 1020 can use any algorithm, cryptographic, or cipher method available.
- the encryption operation uses dynamic variables or "states” such as time 920 when encryption occurs, and an encryption generator 1021 to produce "E-key" 1022, which also may be dependent on a state such as time 920 at which the encryption was performed.
- states such as time 920 when encryption occurs
- an encryption generator 1021 to produce "E-key” 1022, which also may be dependent on a state such as time 920 at which the encryption was performed.
- the date and time of encryption may be used as a numeric seed for generating an encryption key that cannot be recreated even if the encryption algorithm were discovered.
- Time 920 or other "states” may also be used to select a specific algorithm from an encryption algorithms list 1023, which is a list of available encryption algorithms.
- a padlock may also symbolically represent secure and encrypted data.
- Padlocks with a clock face located atop the padlock specifically indicate a secure delivery mechanism, e.g., encrypted files that, if not received within a specific interval or by a specific time, self-destruct and are lost forever.
- a secure delivery mechanism e.g., encrypted files that, if not received within a specific interval or by a specific time, self-destruct and are lost forever.
- the decryption operation shown in FIG. 4B illustrates the inverse function of encryption operation 1020, specifically decryption operation 1031, where the state or time 920 and other states used to create ciphertext 1024, along with a decryption key or "D-key" 1030 generated by D-key generator 1029 are re-used for undoing the encryption, i.e. decrypting the file, to produce unencrypted data comprising original plaintext data packet 990.
- D-key decryption key
- the same encryption operation that was selected from encryption algorithm list 1023 may be used again in the decryption operation 1031.
- encryption algorithm list 1023 references the term "encryption”, the same algorithm table is used to identify and select the inverse function needed for performing "decryption", i.e. encryption algorithm list 1023 contains the information needed both for encrypting and decrypting data packets. Because the two functions involve the same steps performed in reverse order, table 1023 could also be renamed as "encryption / decryption” algorithms table 1023. For clarity's sake however, the table is labeled only by the function and not by its anti-function.
- decryption operation 1031 will fail to recover the original unencrypted data 990 and the packet data will be lost.
- data flow diagrams it is convenient to illustrate this packet decryption operation and sequence using a schematic or symbolic representation, as depicted herein by the symbol shown for decryption operation 1032.
- an encrypted, scrambled data packet 1024 involves the successive combination of scrambling operation 926 and encryption operation 1026 to convert un-scrambled plaintext data packet 990 first into scrambled plaintext data packet 1008 and then into ciphertext 1024 of the scrambled data packet.
- the inverse functions must be applied in reverse sequence first by decryption operation 1032 to recover scrambled plaintext data packet 1035, then by unscrambling operation 928 to recover unscrambled plaintext data packet 990.
- scrambling and encryption represent complementary techniques in achieving secure communication.
- Unencrypted scrambled data traversing the network is referred to as "plaintext" because the actual data is present in the data packets, i.e. the packets have not been encrypted into ciphertext.
- Encrypted data packets, or ciphertext comprise scrambled or unscrambled character strings translated into a meaningless series of nonsense characters using an encryption key, and cannot be restored to its original plaintext form without a corresponding decryption key.
- the encryption and decryption keys may comprise the same key or distinct keys mathematically related by a predefined mathematical relationship.
- scrambling and encryption represent complementary techniques in achieving secure communication in accordance with the disclosed invention for SDNP communication.
- the two methods, scrambling and encryption can be considered independently even when used in combination, except that the sequence used to restore the original data packet from an encrypted scrambled data packet must occur in the inverse sequence to that used to create it. For example, if the data packet 990 was first scrambled using scrambling operation 926 and then encrypted using encryption operation 1026, then to restore the original data packet, the encrypted scrambled data packet 1024 must first be decrypted using decryption operation 1032 and then unscrambled using unscrambling operation 928.
- a scrambling operation F scrambles a string of bits or characters into an equivalent scrambled version and an unscrambling operation F "1 undoes the scrambling, whereby
- the sequence is reversible. For example, if the data packet is first encrypted and then scrambled, then to restore the original data packet the scrambled ciphertext must first be unscrambled and then decrypted.
- unscrambling operation 928 as unscrambling decrypted packet operation 1042.
- These hybridized operations may be employed in static and dynamic SDNP communication in accordance with this invention.
- One means to enhance to enhance security in any implementation using static scrambling encryption is to insure that each data packet sent is subjected to different scrambling and/or encryption methods, including changes in state, seeds, and/or keys at time ti when each data packet enters the communication network.
- a more robust alternative involves dynamically changing a data packet's encryption or scrambling, or both, as the packet traverses the network in time.
- re-scramble i.e., unscramble and then scramble
- re-encrypt i.e., unencrypt and then encrypt
- re-packet or “re-packeting” will sometimes be used to refer to the combination of "re-scrambling” and "re- encryption,” whether the packet is initially decrypted before it is unscrambled or unscrambled before it is decrypted.
- the unscrambling and decryption operations at a given node should be performed in an order that is the reverse of the scrambling and encryption operations as the packet left the prior node, i.e., if the packet was scrambled and then encrypted at the prior node, it should first be decrypted and then unscrambled at the current node. Typically, the packet will then be scrambled and then encrypted as it leaves the current node.
- the "re-packet" operation at a communication node is illustrated in FIG. 6, where an incoming ciphertext data packet 1040 is first decrypted by decryption operation 1032, then unscrambled by unscrambling operation 928 to recover the unscrambled plaintext data packet 990 containing the content of the original packet. If any information within the packet must be inspected, parsed, split, or redirected, the unscrambled plaintext file is the best format in which to perform such operations. The plaintext data packet 990 is then again scrambled using scrambling operation 926 followed by a new encryption performed by encryption operation 1026 to produce a new scrambled ciphertext data packet 1043.
- the acronym DUSE re-packet operation 1045 is used herein to denote the disclosed technique in accordance with this invention.
- the state or time, the decryption key, and any seeds used for performing decryption operation 1032 and unscrambling operation 928 are preferably different than the state or time, seeds or encryption keys used for executing scrambling operation 926 and encryption operation 1026.
- Packet Mixing and Splitting Another key element of the secure dynamic communication network and protocol disclosed herein is its ability to split data packets into sub-packets, to direct those sub-packets into multiple routes, and to mix and recombine the sub-packets to reconstruct a complete data packet.
- the process of packet splitting is illustrated in FIG. 7A, where data packet 1054 is split, using splitting operation 1051 combined with algorithmic parse operation 1052 and with junk operation 1053, which has the ability to insert or remove non-data "junk" data segments.
- junk data segments are inserted by junk operation 1053, to extend or control the length of a data packet, or as needed to remove them.
- Junk operation 1053 is especially important when there is an inadequate amount of data to fill a packet.
- the presence of junk data segments inserted into a data packet also makes it difficult for cyber-pirates to distinguish real data from noise.
- a "junk" packet or data segment is a packet or data segment that consists entirely of meaningless data (bits). These junk bits can be introduced into a stream of data packets obfuscating real data in a sea of meaningless bits.
- parse operation 1052 The purpose of parse operation 1052 is to break data packet 1054 into smaller data packets, e.g. data sub-packets 1055 and 1056, for processing of each of the constituent components. Breaking data packet 1054 into smaller pieces offers unique advantages such as supporting multipath transport, i.e. transmitting the data packets over multiple and different paths, and facilitating unique encryption of constituent sub-packets using different encryption methods.
- the splitting operation can use any algorithm, numerical method, or parsing method.
- the algorithm may represent a static equation or include dynamic variables or numerical seeds or "states" such as time 920 when the incoming data packet 1054 was first formed by a number of sub-packets, and a numerical seed 929 generated by seed generator 921, which also may be dependent on a state such as time 920 at the time of the data packet's creation. For example, if each date is converted into a unique number ascending monotonically, then every seed 929 is unique. Time 920 and seed 929 may be used to identify a specific algorithm chosen from a list of available methods, i.e. from algorithm 1050.
- Packet splitting, or un-mixing comprises the inverse procedure of mixing, using the same algorithm executed in the precise reverse sequence used previously to create the specific packet. Ultimately everything that is done is undone but not necessarily all in one step. For example, a scrambled encrypted data packet might be decrypted but remain scrambled.
- un-split incoming data packet 1054 is converted into multiple data packets, e.g. split fixed-length packets 1055 and 1056 using parse operation 1052 to algorithmically perform the operation.
- this packet splitting operation 1051 including parsing 1052 and junk operation 1053 using a schematic or symbolic representation, as depicted herein by the symbol shown for splitting operation 1057.
- the term “splitting” may include parsing, which refers to the separation of a packet into two or more packets or sub-packets, and it may also include the insertion of junk packets or sub-packets into the resulting "parsed” packets or sub- packets or the deletion of junk packets or sub-packets from the resulting "parsed" packets or sub-packets.
- the inverse function, packet-mixing operation 1060 shown in FIG. 7B combines multiple packets 1055 and 1056 together to form mixed packet 1054.
- the packet mixing operation can use any algorithm, numerical method, or mixing method.
- the algorithm may represent a static equation or include dynamic variables or numerical seeds or "states" such as time 920 used to specify the conditions when incoming data packets 1055 and 1056 are mixed.
- the mixing operation used to create the data packet may utilize numerical seed 929 generated by seed generator 921, which also may be dependent on a state such as time 920. Time 920 and seed 929 may be used to identify a specific mixing algorithm chosen from a list of available mixing methods, i.e. from mixing algorithms 1050. In data flow diagrams, it is convenient to illustrate this packet mixing operation using a schematic or symbolic representation, as depicted herein by the symbol shown for mixing operation 1061.
- FIG. 8 illustrates three of many possible mixing techniques comprising concatenation, interleaving, or algorithmic methods.
- concatenation the data segment sequence of data packet 1056 is appended onto the end of data packet 1055 to create mixed packet 1054.
- interleaving the data segments of data packets 1055 and 1056 are intermixed in alternating fashion, i.e. as 1A, 2A, IB, 2B, etc. to form mixed data packet 1065.
- Other methods used for packet mixing involve an algorithm.
- an algorithm comprising interleaved reflective symmetry alternates the data segments in the order of 1 A, 2A, IB, 2B, 1C, 2C in the first half of the mixed packet 1066, and in the opposite order for the second half, i.e. 2D, ID, 2E, IE, 2F, IF.
- FIG. 9A summarizes SDNP functional elements including functions and their corresponding inverse operation, i.e. anti-functions, as well as dynamic components of the corresponding functions, i.e. the state or time of each function when executed on a data packet.
- SDNP function including scrambling operations comprising packet scrambling 926 and its anti-function packet unscrambling 928; fragmentation operations comprising splitting 1057 and its anti- function mixing 1061, deception operations comprising junk insertion 1053 A and junk deletion 1053B, along with encryption operations comprising encryption 1026 and decryption 1032. All these functions occur uniquely in accordance with time or state variables 920.
- the application of data packet mixing and splitting, along with scrambling, unscrambling, encryption, decryption, and deception in Last Mile communication collectively comprise the SD P Last Mile security operation.
- This SD P Last Mile security operation is "directional" meaning the operation performed for and on all outgoing data packets is different than the operations performed on incoming data packets.
- the SDNP Last Mile security operation is also symmetric and reversible over the Last Mile, meaning that using local security credentials such as keys, seeds, shared secrets specific to the particular Last Mile, the operations performed on an outbound data packet in a client's device are undone in the SDNP gateway, generally by performing the anti-function, i.e. the mathematical inverse, or every functional operation originally executed by the client's device but in reverse sequence. As such, the SDNP gateway is enabled to recover the original content in preparation for routing through the SDNP cloud. Similarly, for incoming data packets into a client's device using zone-specific security credentials for the Last Mile, the SDNP Last Mile security operation executed in the client device undoes each security operation performed by the SDNP gateway by executing the anti-function in reverse sequence. In this manner, the client device can recover the original data on all incoming data packets.
- the SDNP Last Mile security operation is dynamic and localized, i.e. zone specific, using state dependent conditions, e.g. location, time, etc. to determine which parameters were used at the time the data packet was prepared and for what region, geography, or locale specific for a particular Last Mile.
- state dependent conditions e.g. location, time, etc.
- data packet preparation performed in different regions and over different Last Mile connections never have the same coding or use identical security credentials.
- these Last Mile security credentials always differ from those used in the SDNP cloud.
- the state used for creating the data packets changes constantly, further obfuscating the actual security process performed on each data packet and rendering no two data packets alike.
- FIG. 9B specifically for serial SDNP payloads used in single-route Last Mile communication, i.e. where a client's device communicates to a single SDNP gateway.
- the process involves two directional operational sequences, one for outgoing data packets, the other for incoming data packets.
- outgoing data packets shown in the upper half of the illustration, "data to be sent" is first scrambled using packet-scrambling operation 926, then deception is performed by the insertion of junk data 1053 A.
- an entire packet may comprise entirely junk data, further confusing data mining attempts by hackers.
- IP packet preparation in preparation for
- incoming data from the Last Link comprising a serial SDNP payload 1199B, i.e. from "IP packet recognition” is first decrypted in pieces or as a whole by decryption operation 1032 followed by mixing operation 1061 to recover the true data stream.
- the data packets are then de-junked, i.e. the junk data is removed from the data packets using de- junk operation 1053B, followed by packet unscrambling operation 928 to recover the "data received". All operations performed on incoming data packets must use the state 920B used when the SDNP gateway created the data packet, i.e.
- state 920B containing information of a particular time or with a specific state 920B at the packet's birth.
- This state information may be sent through a different communication by a signaling server or may be carried in the incoming data packet as plaintext or alternatively as static ciphertext, i.e. with a decryption key already known by the SDNP Last Mile security operation.
- Details of state 920B cannot however, be encrypted using a key requiring the state information contained within state 920B, or otherwise the code will be unable to open and use its own security credentials.
- FIG. 9C Another example of SDNP Last Mile security operation is illustrated in FIG. 9C specifically for parallel SDNP payloads used in multi-route Last Mile communication, i.e. where a client's device communicates to multiple SDNP gateways.
- the process involves two directional operational sequences, one for outgoing data packets, the other for incoming data packets.
- outgoing data packets shown in the upper half of the illustration, "data to be sent" is first scrambled using packet-scrambling operation 926, then deception is performed by the insertion of junk data 1053C.
- an entire packet may comprise entirely junk data, further confusing data mining attempts by hackers.
- IP packet preparation IP data packet preparation
- incoming data from the Last Link comprising parallel SDNP payloads 1199F, 1199G, and 1199H, i.e. from "IP packet recognition" are first decrypted piecewise by decryption operation 1032 followed by mixing operation 1061 to recover the true data stream.
- the data packets are then de-junked, i.e. the junk data is removed from the data packets using de-junk operation 1053D, followed by packet unscrambling operation 928 to recover the "data received". All operations performed on incoming data packets must use the state 920D used when the SDNP gateway created the data packet, i.e.
- This state information may be sent through a different communication by a signaling server or may be carried in the incoming data packet as plaintext or alternatively as static ciphertext, i.e. with a decryption key already known by the SDNP Last Mile security operation.
- outgoing data packets use SDNP Last Mile Security operation 1190A while incoming data packets use SDNP Last Mile Security operation 1190B.
- outgoing data packets may carry data representing any combination of real time data sources from transducers or sensors, or may contain files made prior to communication.
- sound 1198 A converted into electrical signals by microphone 1180 and video signals from camera 1181 are converted into an equivalent digital format by audio video CODEC 1182A.
- the formats created generally involve standards such png, pic, mpeg, mov, etc. interpretable and interoperable with standard devices in accordance with OSI Layer 6, the presentation layer. Using standard audio video formats avoids the need to transmit proprietary code for opening a file between source and destination addresses.
- the digital output of audio video CODEC 1182A is then mixed with textual data from virtual keyboard 1183 (a keypad realized on a touch screen) and with data files 1179A using content mixer 1184.
- This mixer sends data files to SDNP Last Mile security operation 1190 A, and provides SDNP header information to IP packet preparation operation 1191 A in order to identify and label real time data packets from static files.
- SDNP Last Mile security operation 1190 A then passes the secure data packets to IP packet preparation operation 1191 A, which thereafter embeds the SDNP payloads into IP data packets in accordance with routing instructions received by the SDNP signaling server 1603.
- the data packets my be distributed into multiple IP packets for multi-route Last Mile communication or may be concatenated into a serial data string and embedded and fit into one or more serial data packets for singe route Last Mile communication. These packets are then passed in to the client PHY operation 1192 A to add Layer 1 and Layer 2 data to complete the IP data packet.
- IP packet recognition operation 119 IB identifies the incoming data as a valid message or as an unknown and possibly malicious data packet.
- Valid messages are identified using SDNP tags, seeds, keys, and other identifiers communicated beforehand to the client device and to IP packet recognition operation 119 IB by signaling server 1603.
- IP packet recognition operation 119 IB expects and even anticipates valid incoming data packets. Unexpected data packets lacking proper identification are discarded and never opened or processed further. In this manner, a hacker cannot disguise themselves and send valid data to any SDNP node without first registering their identity to the SDNP cloud.
- IP packet recognition operation 119 IB passes the valid data packets to SDNP Last Mile security operation 1190B, which in turn performs all necessary operations to reconstruct the true content of the data packet - data comprising a serially arranged amalgamate of video, audio, text, and data files.
- Content de-mux 1193 a de-multiplexer that undoes the mixing operation used in data packet creation, e.g. it un-mixes the serial data file created by mixer operation 1184 performed in the other caller's phone, is then used to separate the various file types.
- Outputs of content de-mux 1193 include text shown displayed in messenger window 1196, data files 1179A, and real time data sent to audio video CODEC 1182B.
- Audio video CODEC 1182B converts the digital presentation layer data into live video images 1195 or via speaker 1194 into sound 1198B.
- data For Last Mile data transport, data must be embedded or wrapped in a multi-tiered arrangement shown in FIG. 9E similar to the aforementioned Babushka Russian nesting doll model. Accordingly, SDNP payload 438 represents the transport payload 437, which together with transport header 436 comprises IP payload 435.
- the combination of IP payload 435 with IP header 434 represents an IP datagram, equivalent to MAC payload 432.
- MAC payload 432 within MAC header 431 and MAC footer 433 results in the MAC "frame", the frame being equivalent to physical layer 490, also known as the PHY Layer 1 content, comprising a physical media such as electrical signals, light, radio waves, or microwaves.
- MAC header 431 in Layer 2 describes the MAC connection for the Last Link, i.e. the connection between the client device and the first device in the Last Mile link.
- header 434 in Layer 3 specifies the end points of routing over the Last Mile. Because the Last Mile is not part of the SDNP cloud however, the precise route data packets take over the Last Mile is not explicitly stated or controllable.
- transport header 436 in Layer 4 specifies UDP is used for SDNP real time payloads, and also specifies the ad hoc assigned SDNP port address used in each packet - an address changing dynamically to thwart port interrogation cyber-attack strategies.
- SDNP payload 438 the payload of the Last Mile IP packet, contains SDNP preamble 1198 containing zone information, keys, and seeds, and SDNP data field 1199A, a serial string of multiple segments of independently encrypted ciphertext.
- the decrypted form of the ciphertext comprises plaintext files 1 197A, 1997B, and 1197C, each containing their own unique SDNP header, and corresponding data files data 91, data 92, and data 93 respectively.
- the individual sub-headers include information involving tag, zips, addresses, urgency, and QoS data as applicable.
- a signaling server instructs the client device and the SDNP gateway or gateways how to communicate with one another to make a call, send a file, or open a session.
- the instructions are communicated to both devices using a command and control data packet with TCP transport prior to sending any media data packets.
- the minimum data required in the Last Mile communication between the client and the SDNP gateway is a tag or address used to identify the incoming packet.
- the SDNP data packet can carry additional data in its preamble and packet headers.
- the data packet and accompanying table 1177 shown in FIG. 9F illustrates one exemplary format used to carry SDNP information within SDNP payload 438.
- the data packet comprises SDNP preamble 1198 and one to eight data field headers 1178X with their corresponding data fields "Data X Field".
- Each data field such as "data 1 field”, "data 2 field” etc. is preceded by its own corresponding header Hdr 1, Hdr 2, etc. and carries the content of a communique including voice, text, video, pictures, movies, files, etc.
- the number of data fields can vary from one to eight as determined by the 4b long field #, i.e. from binary 0001 to binary 1111.
- the length of SDNP preamble 1198 and SDNP payload 438 is affected by the Field # specification.
- each data field specified by L Fid X can vary from zero or 0B (a null data field), to a maximum hexadecimal length of FFFF or 65,535B.
- the maximum data packet length for any one field is preferably limited to 1500B or hexadecimal 05DC, and the aggregate length of all data fields should not exceed the jumbo packet size of 9000B or hexadecimal 2328.
- the specified length of each data field can vary independently.
- Data directed to single destination may be contained within a single data field, or for purposes of deception may be split into multiple data fields and merged with junk data.
- the size of the data fields may vary independently.
- Data fields may also be included containing purely junk data or alternatively entire data packets may be generated containing only junk data.
- data targeted for different destinations should be partitioned into separate data fields each with their own unique headers.
- the SDNP packet format is applicable for end-to-end transport throughout the entire SDNP network including across multiple clouds and zones such as the SDNP cloud or in Last Mile communication. Although the contents of the SDNP data packets change as they traverses the network, the SDNP packet format remains unchanged. Since this format includes minimal data overhead, the SDNP data packet format is equally applicable for large payloads or for time critical real-time communication.
- the packet format is applicable for bidirectional data flow, i.e. for data flow from the Last Mile into an SDNP gateway and across the SDNP cloud, or conversely for delivery of data packets emanating from the cloud, exiting a SDNP gateway for transport across the last mile to the destination client device.
- the direction of SDNP data routing is determined by the Network Layer-3 source and destination addresses described within IP header 434 of FIG. 9E.
- Each packet is loaded with its source and destination addresses at the time the media node prepares the packet for transmission to the next media node on its route.
- the SDNP or IP address of a packet's destination is delivered from a signaling server to the media nodes as a command and control (C&C) packet prior to outgoing packet preparation.
- the signaling server is able to send C&C instructions to every node in a communication path including both sending (caller) and destination (callee) devices.
- only single channel communication is available, e.g.
- the signaling server is unable to pre-warn a media node of an incoming packet or what to do with it.
- the routing addresses are carried within the incoming data packet in SD P payload 438.
- the media server follows default instructions on how to process the incoming packet using data fields contained within the incoming SDNP packet including routing and state information as well as security credentials.
- Payload 438 is made of two portions, a readable portion comprising preamble 1198, and an unreadable potion 1199a containing data in a "concealed form".
- the content of this packet may employ any number of concealment techniques to obscure its content such as encryption, scrambling, and possibly containing junk data.
- the concealment method must be undone to extract usable content 1197a, 1997b and 1197c.
- These packets contain the destination addresses of the future outgoing packets. The addresses exist only in an unconcealed or decrypted form for only a brief moment before the next packets can be prepared and encrypted.
- SDNP preamble 1198 comprises information relevant to the entire packet. Aside from the data field specifications, FIG. 9F illustrates SDNP preamble 1198 also includes the SDNP zone where the SDNP packet was created, e.g. zone Ul, two numeric seeds, and two keys. These keys and seeds may be used as zone specific security credentials in the scrambling/unscrambling, junk insertion/deletion, mixing/splitting, and encryption/ decryption process.
- the seeds and keys can be used as the exclusive means for the delivery of security credentials needed in opening and reading the data fields, or may be used in conjunction with command and control packets sent to the client's device and to the SDNP gateway from the signaling server, a network of command and control computers not involved in carrying communique content in media packets.
- Seeds and keys can be delivered securely in public, i.e. in non-encrypted form, because the data lacks the information needed to use them - they comprise only part of the security credential.
- the other portions of security credentials, the missing pieces, may be sent previously in another data packet, or may comprise shared secrets of algorithms, look-up tables, and codes not delivered over the network and not part of the message.
- Encryption keys may be symmetric keys, where both the sender and the recipient hold the key, or public keys, where the public, including the sender, has access to the encryption key but only the recipient, i.e., the party generating the encryption key, holds the decryption key.
- all the security credentials are limited to a specific security zone, e.g.
- Last Mile communication the intermediate routers between the client's device and the SDNP gateway do not process, interpret or open the transported data packets because they are not part of the SDNP network and lack the ability to query or interpret the SDNP packet data contained within. Instead, all security operations are exclusively executed at the two end points, the SDNP client and the SDNP gateway because only these devices operate as SDNP communication nodes. Since each end point executes SDNP protocols dynamically, the Last Mile communication is HyperSecure over the entire Last Mile. If the other calling party also runs SDNP software, then the second party's Last Mile is also secured by the aforementioned SDNP methods and HyperSecure communication is guaranteed "end to end" - from one caller to the other.
- Last Link router can be enabled with SDNP firmware, and the Last Link can be reasonably secured from special functions performed by the SDNP enabled router even though it is not SDNP enabled.
- This alternative Last Link security method is described in greater detail in subsequent sections of this disclosure and will not be elaborated upon in this section. The described method, while applicable for securing Last Link communication, is not sufficient for protecting other portions of the Last Mile.
- each and every SDNP data field is accompanied by a SDNP data field header 1178X containing information uniquely applicable to its associated data field but not useful for other data fields.
- each header contains a data type field describing what kind of data is contained within the associated data field, a destination address field used for identifying the specific data field and its destination, a field zone used to carry forward zone information from one zone to another, as well as urgency and delivery information.
- each SDNP data payload 438 contains one SDNP preamble 1198, and one or more SDNP data field headers 1178x and corresponding data x fields, where x describes the number of separate payloads which may range from 5 to 50 depending on the size and urgency of the payloads.
- the signaling server may supply most of the described information to the SDNP client and SDNP gateway, one fundamental component necessarily carried by the Last Mile data packet is an "address field" or tag needed to identify the data packet.
- the field referred to as the SDNP payload's destination address (abbreviated in the illustration as "Dest Addr"), may comprise any unique identifier sufficient to distinguish the identity of one data field from another. Its purpose is similar to the function of bar codes used to tag and track luggage in an airport or boxes shipped by a courier. Address types may for example comprise a numeric tag, a SDNP zip, an IPv4 or IPv6 address, a NAT address, or even a POTS regular phone number, so long that the identifier is unique to prevent conflict in identifying the data packet.
- the size of the destination address field varies with the type of address type selected.
- SDNP Zip code a data packet from an SDNP client arrives at a SDNP gateway.
- the SDNP payload is decrypted and then each data field header is inspected for the identifying destination addresses. Before the data header can be inspected, the data packet must be decrypted or processed to undo the concealment methods used in the packet's creation.
- the signaling server 1603 has previously informed the SDNP gateway about the planned arrival of the data packet and its corresponding identification marking and security credentials.
- the gateway when the SDNP gateway receives data packet 438A comprising Last Mile communication sent from a SDNP client, the gateway performs SDNP last mile security operation 1190D in order to convert the SDNP payload from ciphertext into plain text data packet 438B.
- a security operation describes the processing of modifying an outgoing data packet to conceal its content and the process to modify an incoming data packet to reveal its content.
- the security operation performed on an incoming data packet is used to recover its content by undoing concealment operations performed on it before its transport, including using decryption to undo encryption, unscrambling to undo scrambling, dejunking to remove junk insertions, and mixing to undo splitting. These processes are performed in accordance with the state and zone of the data packet when it was created.
- a security operation involves concealing the contents of a data packet prior to transport by performing encryption, scrambling, junk insertions, and packet splitting in accordance with the state and zone when the data packet is created.
- the unencrypted seed and key data fields in the data packet 438 A can be neglected or optionally used in conjunction with signaling server information to decrypt the ciphertext.
- the resulting operation reveals data field 1 and its associated data field header 117D labeled as Hdr 1 containing the data field's destination address, data type, urgency and delivery information.
- the destination address is not a routing address but only a SDNP Zip, i.e. a tag used to identify the packet is part of a particular conversation.
- the data field is extracted, optionally mixed with other related content by mixer 1184Z and rewrapped into a new IP or SDNP datagram by SDNP packet preparation operation 1191Z for delivery to its next destination.
- the new data packet headed into the cloud includes an SDNP header 434Z containing the destination of the new packet and the data content, SDNP payload 435Z.
- the destination supplied by the signaling server 1603 to the gateway media node as an IP address or SDNP address may comprise another SDNP server operating as a SDNP cloud node or may involve Last Mile communication to another SDNP client.
- the destination address is not really an address but a means to identify the packet, where its next destination is already known by the SDNP gateway.
- the data packet is then processed by SDNP cloud security operation 1190Z in accordance with Zl security credentials for the cloud, not Ul credentials used in the Last Mile.
- a signaling server is unable to advise the SDNP gateway in advance of the imminent arrival of a data packet and its data fields, either because (i) there is no signaling server operating in the local network, (ii) the signaling servers are temporarily offline, or (iii) the signaling server is too busy and unable to preemptively route the packets in time.
- the data packet 438 A from the SDNP client must carry the necessary security credentials Zone Ul, Seed 1, Seed 2, Key 1 and Key 2 to decrypt the data packet using SDNP Last Mile security operation 1190D converting ciphertext data packet 438 A into plaintext data packet 438B.
- the standard SDNP data packet format reserves these data fields even if the contents of the field is not required by a particular media node. For example if a specific concealment process used to create a data packet does not use the Key 2 field, the data in that field is meaningless and is not used by the destination node. Nonetheless, the data packet reserves the same number of bytes for the field used or not, so that all SDNP data packets are homogeneous in format.
- IP packet recognition process 119 ID combines the data fields for A Type and Destination Address from Hdr 1 field header 1178D for two reasons - firstly in tri- channel communications to confirm the incoming packet is expected, and secondly to produce a new SDNP address.
- This new SDNP address is combined with D Type, Urgency and Delivery fields and processed by SDNP packet preparation operation 1191Z to create SDNP header 434Z in the outgoing data packet.
- the content of Data 1 Field is also extracted from incoming plaintext data packet 438B, and its content is optionally mixed 1184Z with other outgoing content to create outgoing SDNP payload 435Z.
- the packet is then processed by SDNP cloud security 1190Z in preparation for forwarding. In this way, the address field performs multiple functions, both to identify an incoming data packet and to provide a forwarding address when needed.
- a media node receives a data packet without first receiving instructions from a signaling server, the media node will revert to default instructions as to how to process the incoming data packet, and how to prepare outgoing data packets. Should the media node not hold any instructions on how to handle unannounced incoming packets, the data packet will be discarded. If the media node is enabled with instructions on how to process unidentified packets, the media node will first confirm in accordance with security credentials that the packet is a valid SDNP packet, and process it accordingly. If the sender cannot, however, be identified, e.g. if an encryption code, seed, or source address is invalid, then the packet will be discarded as a fraud.
- the packet field labeled "Field Zone” describes the zone where a specific field was created, i.e. whether a past encryption or scrambling was performed with, for example, Ul or U2 zone settings.
- unscrambling, decrypting, or undoing concealment of a data packet requires additional information, e.g. a key, seed, time or state, in which case the packet field labeled "Field Other" may be used to carry the field- specific information.
- these fields are not employed except in nested security protocols, e.g. where an encrypted data field is then scrambled or encrypted a second time. Care must be taken when employing nested security methods to perform the recovery of data in precisely the reverse order of the data packet's preparation, or the content will be lost forever.
- Data Type The packet field labeled "Data Type", if used, facilitates context-specific routing, distinguishing data, pre-recorded video, text and computer files not requiring real time communication from data packets containing time sensitive information such as voice and live video, i.e. to distinguish real-time routing from non-real-time data.
- Data types include voice, text, real-time video, data, software, etc.
- Urgency includes snail, normal, priority, and urgent categories. Delivery includes various QoS markers for normal, redundant, special, and VIP categories.
- the binary size of the various data fields as shown in table 1177 is chosen to minimize the required communication bandwidth. For example, data fields as shown may range from 0 to 200B whereby eight data fields of 200B per data field means that a SD P packet can carry 1,600B of data.
- FIG. 9G and FIG. 9H illustrate the case where a client device sends data packets in zone Ul over the Last Mile to a gateway node.
- the gateway node then processes the incoming data packets to undo the Last Mile security and concealment methods employed using zone Ul security credentials.
- the gateway nod may then mix the content of the packet with the content of other packets in mixing process 1184Z to create a new packet (or packets) bound for transport through the SDNP cloud using the security credentials of Zone Z 1.
- a similar process is employed when the SDNP gateway receives a data packet from the cloud (including another gateway) and sends the data packet to a client device, e.g. from the SDNP cloud to the client's phone (the callee).
- a client device e.g. from the SDNP cloud to the client's phone (the callee).
- dual- channel or tri-channel communication signaling server 2603 has previously informed the SDNP gateway about the planned arrival of the data packet and its corresponding identification marking and security credentials coming from the cloud.
- the gateway performs SDNP cloud security operation 2190D in order to convert the SDNP payload from ciphertext into plain text data packet 2438B.
- the unencrypted seed and key data fields in the data packet 2438 A can be neglected or optionally used in conjunction with signaling server information to decrypt the ciphertext.
- the use of the data fields depends on the algorithms employed in concealing the packet's payload. For example, if encryption is not used then the fields containing encryption keys are neglected.
- the resulting operation extracts a number of data fields.
- a subsequent operation splits these data fields in content-splitting operation 2184Z to extract specific content comprising data field 1 and its associated data field header 2117D labeled as Hdr 1 using recognition operation 2191D.
- Header Hdr 1 contains the data field's destination address, data type, urgency, and delivery information.
- the extracted data field is then rewrapped into a new IP or SDNP datagram by SDNP packet preparation operation 1191Z for delivery to its next destination.
- the new data packet headed into the cloud includes an SDNP header 2434Z containing the destination of the new packet (the IP address corresponding to the person's phone number) and the data content, SDNP payload 2435Z.
- the outgoing packet then processed by SDNP Last Mile security operation 2190Z in accordance with Ul security credentials for the Last Mile, not Zl credentials used in the cloud.
- the media node must process an incoming data packet using instructions previously delivered it as a default instruction. In such instances, the incoming data packet is checked against criteria needed to confirm the sender is a valid SDNP client (such as a SD P zip code or an authentication code delivered previously as a predetermined shared secret). If the packet is determined to be valid, the packet is processed in accordance with the default instructions. If not, the packet is discarded.
- criteria needed to confirm the sender such as a SD P zip code or an authentication code delivered previously as a predetermined shared secret.
- the aforementioned methods are exemplary and not intended to limit the processing and routing of data packets to a particular data packet format.
- Last Mile communication An important consideration in Last Mile communication is a network's ability to support both secure communication and private communication. Although privacy and security are often associated, they are not the same thing. Security as the term is used in communication is considered the "discipline to prevent unauthorized access to communication data in recognizable form". Security does not however, cover cases where an individual or agency has the right to access or monitor a communication.
- Privacy is defined as "the state or condition of being free from being observed or disturbed by other people and in being free of public attention”. In legal terms privacy is defined to be a person's right to control access to his or her personal information.
- the network's Last Mile and its connected devices When assessing the privacy and security capabilities of a network, the network's Last Mile and its connected devices must be considered carefully. Depending on the security credentials used to establish information access privileges, the Last Mile and its connected devices frequently determine a network's security and privacy, i.e. the Last Mile represents the weakest link.
- Four possible combinations of communication networks must be considered:
- Unsecure networks lacking privacy.
- a network that is not secure and has no privacy provisions (such as Internet OTT carriers today) represents a severe risk to any individual, group, club, company, or government using the communication channel. Because a cyber-hacker can easily access calls and data, any malevolent party can use this information for any purpose they choose.
- unsecure communication channels can be commandeered to invoke chaos, flood networks with spam, initiate denial of service attacks, and create damaging mischief.
- unsecure communication can be used to leak sensitive information to precipitate political change, discredit government officials, stimulate riots, or even topple governments (see the historical fiction movie "The Fifth Estate” (DreamWorks ⁇ 2013) as an example chronicling WikiLeaks release of hundreds of thousand of sensitive government documents precipitating a firestorm of international repercussions).
- cyber- criminals such as those associated with organized crime and mafia, attacks focus on money crimes, for example, theft, diversion of funds, fraud, identity theft, money laundering, extortion, blackmail, and other felonies.
- unsecure communication can be monitored to track the location, movements, and actions of their competitors, enemies, and targeted victims for purposes of planning and implementing violent crimes such as assaults, kidnapping, murder, bombings, or acts of terrorism.
- unsecure communications can be used to illegally hack databases containing individuals' private information including social security numbers, passports, banking information, credit card information, medical records, and other personal confidential information.
- Secure networks lacking privacy Examples of secure networks lacking privacy commonly include corporate accounts where the IT (information technology) manager or security department have the right and authority to monitor all corporate communications to insure no inappropriate or illegal communication is occurring over the company's network. Even though the network is secure from hackers and cyber-criminals, the communications on such a network are not private and may be monitored by authorized agents to detect wrongdoing including unauthorized personal use of company communication infrastructure, corporate espionage, violation of confidentiality agreements, unauthorized disclosure of intellectual priority (IP leaks), sexual harassment, violations of the fair disclosure regulation (reg. FD), insider trading, violation of FCPA (foreign corrupt practices act), graft, bribery, fraud, financial reporting violations, securities violations, and more. In corporate communication, an individual is informed upon j oining the company that their corporate
- a quasi-private unsecure network is one where the network carrying the data can be hacked, e.g. wire tapped, but private transactions can be confidentially performed despite the lack of security provided certain conditions are met. In this manner privacy is established by confirming the identity of a caller (or callers) by various means using shared secrets, undiscoverable even by a hacker intercepting the call.
- a common example of a private unsecure communication is a voice banking transaction. The caller confirms their identity by answering a series of ever- changing questions to which an imposter would be unlikely to know the answers, e.g. "we see you ate dinner last night and paid with our credit card.
- the bank must either have access to non-public information (such as credit card statements) or the bank and its clients must establish a set of shared secrets when the account was first set up, generally in person and not electronically. After the identity if the caller is confirmed, the client can instruct the institution to perform certain actions that would not benefit a cybercriminal. For example, “please move $10,000 from my savings to my checking account.” If the money transfer is wired to another bank, however, even a more rigorous verification must occur to insure the client's privacy.
- quasi-private meaning conditional privacy is referred to as quasi-private meaning conditional privacy.
- Another example or quasi-private communication over a unsecure network can be performed by utilizing a security token, a device issued by the bank that only the client possesses. The pseudo- random number generated by the device is told to the bank' s operator who confirms the number is consistent with the bank's authorized numbers. Since the number is 8 or more digits the chance of guessing the right code the first time is miniscule. If the wrong token number is reported, the call is terminated, the account is frozen, and the fraud department is alerted to investigate. In any such case, the importance of insuring privacy over an unsecure network depends on being able to communicate without verbally revealing any confidential details such account numbers, PINs, credit card information, etc., i.e. the communication is only quasi -private.
- Identity verification also known as "authentication”
- Reliable identity verification is important in national security, law enforcement, IP ownership, business enterprise, and in individual rights.
- Example of the importance of identity verification include the following:
- caller identity verification is important in tracing the identity of criminals, spies, terrorists, drug traffickers, and anyone divulging national secrets or threatening national security. It is equally important to be able to identify individuals who are authorized to access, read, or send confidential, secret, or top secret communiques, data, and files.
- caller identity verification is important in identifying individuals or organizations involved in criminal activities such as robberies, arson, drug trafficking, smuggling, prostitution and human trafficking, extortion, blackmail, and other felonies. It is equally important to be able to identify individuals who are authorized law enforcement agents including police, fire, paramedic, park ranger, air marshal, TSA and airport security, port authority, customs, and coast guard services.
- identity identification is important in identifying individuals, organizations, and entities engaged in piracy and the unauthorized distribution of copyrighted material such as music, movies, books, videos, etc. It is equally important in confirming the valid and legal distribution of IP and copyrighted material.
- identity verification of its employees is important to track the intentional or accidental release of material non-public information, to identify those engaged in commercial espionage, to identify individuals engaged in the illegal disclosure of intellectual property, and those committing other crimes such as fraud or personal use of company communication. It is equally important in confirming the identity of those to which company confidential information is available, and specifically to authorize which specific types of data they have access. For example, the engineering department of a company should not have access to the personnel records of the marketing department in order to compare how much the marketing staff is being paid.
- identity verification is to confirm a person's identity, i.e. to authenticate they are who they claim to be, and to identify, block, and ultimately apprehend those misrepresenting their identity.
- Authentication is the first "A" of the triple-A security model, or AAA standing for "authentication, authorization, and administration". Numerous methods such as a PIN code, passwords, fingerprints, tokens, and query response methods may be used to verify a person's identity and to authenticate they have an account on the system.
- the third "A" in AAA stands for administration. Administration is the
- a network's ability to perform AAA procedures is paramount to insure privacy and to prevent corruption of the network from unauthorized users or network operators. Any network unable to insure the identity of its users can be corrupted for illegal purposes. Network corruption by unauthorized users is unavoidably problematic in OTT communication because no means exist is to validate caller identity. Unauthorized access and network communication by unidentified users, i.e. anonymity, is a significant risk in modern communication.
- Anonymity The principle of anonymity in communication is the practice of intentionally hiding a caller's identity in order to communicate without traceability.
- a nearly symbolic example of anonymous communication is a payphone.
- payment is by, untraceable cash
- the payphone number is public, and anyone can use the phone, meaning the identity of the caller is not known and there is no certain means to determine if a caller is who he or she claims to be.
- the phone number is unlisted, no individual owns the number and (except through sophisticated voice recognition software) there is no way to identify the caller's identity.
- the identity of the device's owner can be traced through the phone number, but the identity of the caller may still remain unknown.
- the phone may be stolen, or a pay-per-use SIM card may be used to obscure the caller's true identity.
- a notebook, tablet, or cell phone can be connected through WiFi in a public cafe, offering similar anonymity as any public payphone or phone booth.
- OTT carriers have chosen to operate a VoIP phone service as a payphone, with no identity verification of its subscribers.
- CNN Money revealed "An app called Telegram is the 'hot new thing among terrorismists”.
- Research confirms the Telegram application was instrumental in ISIS terrorists secretly planning its attack on Paris.
- Tegram founder knew Isis was using the app to communicate before Paris attacks," (http://www.independent.co.uk/life-style/gadgets-and- tech/news/telegram-knew-isis-communicate-paris-pavel-durov-a6742126.html),
- Caller verification and authentication is especially important for corporations and business enterprises to control access to company confidential data including intellectual property, engineering developments, product evaluations, manufacturing knowhow, confidential financial reports and projections, business status, sales forecasts, inventory and WIP, quality audits, business and IP contracts, customer lists, employee records, and other trade secrets.
- identity verification is important to confirm who is present on the call and to insure that no one is listening without their need-to-know.
- caller verification can be used to thwart criminals and deter corporate espionage
- identity verification is beneficially useful to insure a caller's privacy. If both parties in a call or text chat confirm their identity through some prescribed authentication procedure, imposters have no access to a call or its data, protecting the call from criminal attacks.
- An anonymous caller is an individual who disguises their true identity from the network on which they are communicating.
- An anonymous call does not require the caller has anonymity from the network, just that their true identity during communication is obfuscated in the call data packets.
- a registered account holder on the SD P network can, in accordance with this disclosure, place a call or send data using anonymous data transport even though the network knows their identity and phone number. In this way, law-abiding citizens can communicate anonymously without the need to hide their identity from the SDNP network operator. If a caller is engaged in normal private calls, entertainment, or business, their SDNP call remains private and secure even though the network knows their identity as stored in the SDNP name server database.
- Examples of the need for legal anonymous communication includes global gaming where it is important to protect a gamer's identity, especially that of children.
- Another case potentially benefitting from anonymity is in vehicle-to-vehicle (V2V) communication to prevent drivers with road rage from exacting revenge by identifying the personal data of other drivers aggravating their driving.
- V2V vehicle-to-vehicle
- law officials can (in accordance with applicable law) gain access to their calls and data transmissions. In this manner the network operator can satisfy the requirements of court orders and subpoenas without exposing the identity or opening the calls of law abiding citizens.
- a more pragmatic solution to governing communications is to focus monitoring on Last Mile communications, i.e. to intercept and monitor calls and call data where the source and / or destination of a call occurs within a country's borders.
- This approach has several advantages over intercepting bulk through-data traffic including (i) the magnitude of the data is smaller, i.e.
- the last mile communication carrier or network operator is subject to the laws of the country in which it resides (iii) the last mile carrier or network operator may be subpoenaed to surrender any available encryption keys, (iv) the device of the caller must electronically "register" itself to connect to the last mile network and in so doing relinquish information about the caller, and (v) the location of any network connected device can be determined using network addresses, GPS data, or radio signal tri angulation.
- Last Mile communication and call termination are wholly the right of the nation in which the Last Mile network operator resides.
- a nation's government can insist on the level of access it requires in Last Mile communications, including combinations of the following:
- Metadata includes data packet information regarding who is calling who, how long the call lasted, where the callers were located at the time of the call, etc. without actually accessing the call data itself.
- metadata comprises the data header of an IP packet but not its payload.
- the monitoring of calls and data communication involves access to the payload itself, not just the header data.
- the government may insist on the network operator supplying it with master encryption keys, should they exist.
- Last Mile communication is particularly problematic because the data may be carried on networks not hosted by the SDNP operator, packet routing may involve conventional IP packet routing, and the last mile network's intrinsic security may be unknowingly compromised by a cybercriminal, possibly complicitous with a last mile network operator.
- Last Mile communication necessarily involves the transport of IP datagrams outside of the data cloud network using a packet format different from data packets within the SDNP cloud.
- the SDNP cloud comprising servers 1201 (represented schematically by soft-switch enabled SDNP nodes ⁇ , ⁇ through Mo,f.) transports VoIP, video, text, and data using SDNP datagrams shown in exemplary data packets 1222B, 1222C, and 1222F.
- An SDNP datagram contains SDNP Layer 3 source and destination addresses, not Internet IP addresses. SDNP addresses differ from IP addresses in that they are recognizable only by SDNP name servers or other servers performing the function of SDNP name servers, and not the Internet's DNS name servers.
- SDNP packets change dynamically as they move through the network, with updated routing addresses and constantly changing payloads performed in accordance with shared secrets and dynamic "states" (such as time).
- data packet 1222B sent by node ⁇ , ⁇ comprises Layer 3 SDNP datagram B with unique SDNP addresses and uniquely encrypted payload.
- data packet 1222C output from node ⁇ , ⁇ comprises Layer 3 SDNP datagram C with different SDNP addresses and a re-encrypted payload.
- node Mo,f which processes the data and forwards data packet 1223G comprising IP datagram G over the Last Mile.
- the original packet data can be recovered by performing a series of anti-function operations executed in the inverse order to which they were performed.
- the SDNP functional sequence comprising the steps of scrambling, junk insertion (deception), and encryption can be undone by the inverse sequence decryption, junk deletion, and unscrambling, provided the same state used to execute the function is invoked to perform the corresponding anti -function.
- State data for a packet may be carried as a time, a seed, or a key either embedded in the packet's payload or sent in advance of the packet.
- Data transport and processing within the SDNP cloud operate using SDNP cloud specific shared secrets and security credentials.
- the media nodes sharing a common set of shared secrets and security credentials may be referred to as a security "zone".
- the zone used for security credentials operating within the SDNP cloud cannot be revealed to any user's communication outside the SDNP cloud. As such, all Last Mile communication must comprise a different SDNP security zone than the SDNP cloud.
- server 1201 A and server 1201F hosting corresponding nodes ⁇ , ⁇ and Mo,f operate as SDNP gateways, i.e. they communicate with devices outside of the SDNP cloud as well as with other intra-cloud SDNP nodes.
- Last Mile Communication from these gateways to communication devices outside the cloud represents "Last Mile" communication. Accordingly, the gateway nodes must understand the zone security credentials of both the SDNP cloud and the Last Mile network to which they connect, acting as a translator during packet routing. Semantically, the term Last Mile is an abstraction meaning communication outside the SDNP cloud and does not specifically refer to a distance of one mile. Instead the term Last Mile covers any communication between a client device and the SDNP cloud of any distance, regardless of whether the client device is operating as an SDNP client, i.e. running SDNP application software or firmware, or not.
- Last Mile also applies to both the client device initiating the call and the client device being called. While literally speaking, the caller's data represents the "first mile" of the call rather than the last - the distinction between first and last miles is arbitrary. Specifically, in any duplex conversion or in any IP communication "session", the device receiving the call necessarily responds to the call or session request by sending a reply to the caller. In any two-way communication, the first mile connection is therefore invariably functioning as the last mile in the reply data path. In essence the first mile for the caller is concurrently the last mile for the response. As such the defined term Last Mile is used to throughout this application to mean both the first mile and last mile, regardless of which device initiated the call or communication session.
- data packet 1223 A comprises "IP datagram A" constructed using an SDNP payload with an IP address, not a SDNP address.
- IP datagram G comprises a data packet 1223G containing a SDNP payload routed using an IP address.
- the IP source and destination addresses represent any IPv4 or IPv6 address recognizable by the network on which it is routed.
- the IP addresses may comprise Internet addresses recognized by the Internet' s DNS servers or alternatively may comprise NAT addresses used for routing across local networks defined by a local network service provider.
- Last Mile communication may vary significantly and may include phone lines, fiber communication, cable TV networks, 3G and 4G radio networks, microwave communication towers, and satellites
- analysis of Last Mile communication must be considered for a variety of Layer 1 physical networks and their corresponding Layer 2 data link formats employed. Formats may, for example, include analog (POTS), Ethernet, WiFi, 3G, 4G/LTE, and DOCSIS3.
- POTS analog
- Ethernet Ethernet
- WiFi Wireless Fidelity
- 3G 3G
- 4G/LTE Wireless Fidelity
- DOCSIS3 DOCSIS3
- any call leaving a defined network to be transported across a separate (and generally dissimilar) network is commonly referred to as a "call out", a term meaning data or voice leaves one network to be transported on another.
- a call out a term meaning data or voice leaves one network to be transported on another.
- communication within between clients running Skype applications is commonly referred to as a Skype call, but placing a call from a Skype client to a regular or cell phone number is referred to as a Skype call out feature, or "Skype out" call.
- Skype call outs to regular phones involve some additional cost, either as a subscription or as a pay-per-use fee.
- FIG. 11 schematically represents two examples of SDNP Call Out routing onto an unsecure Last Mile.
- communication occurs using analog signals to an analog device such as a telephone or payphone 6A.
- the SDNP gateway has to include a digital-to-analog converter. Otherwise, a modem or conversion device may be added at the gateway.
- the information is carried by an analog signal 1221, not a data packet.
- Analog phone signals while efficient for carrying voice, are not well equipped for high-speed data
- the SDNP Call Out occurs across a digital network to any digital device (such as cell phone 32) not enabled as an SDNP client, i.e. not enabled with SDNP software or firmware.
- data packet 1223 carries the call or data, generally using in accordance with Internet protocol, i.e. IP packet format consistent with the 7-layer OSI model.
- IP datagram includes IP or NAT addresses in its source and destination address fields, and IP or VoIP data as its payload.
- the digital path may involve various forms of digital data such as Ethernet, WiFi, or 4G/LTE that vary along the Last Mile connection.
- the call is not secure and is subject to hacking, spying, wire tapping, and other cyber assaults.
- unsecured lines and connections for the Last Mile whether twisted-pair copper wires, coax cable, fiber, Ethernet, WiFi, cellular, or satellite, are intrinsically not secure unless special security methods such as encryption are inserted in the end-to-end data path.
- the security of the most secure data cloud or VPN is therefore compromised by its weakest link - in this example, the Last Mile.
- Even encryption does not guarantee security, especially on a single well-defined electrical, microwave, or radio wave connection.
- the schematic examples do not include any mechanism for identity verification. Incapable of authentication, the Last Mile has no guarantee of privacy.
- the exemplary schematics therefore represent unsecure Last Mile networks lacking caller privacy.
- FIG. 12 illustrates a SDNP gateway 1201 A executing a SDNP call-out to an unsecured Last Mile lacking privacy, connecting to a public switched telephone network or PSTN gateway 1 A over digital network service provider NSP hosted wired or fiber link 24.
- the PSTN gateway 1 A then is routed to a plain old telephone system POTS switch 3 over an analog communication connection 4.
- POTS switch 3 then places conventional phone calls over twisted copper pair wire 7 to home phone 6, to cordless phone system 5, or to payphone 6A.
- the entire Last Mile is neither private nor secure.
- communication of data packet 1222 A containing SDNP datagram- A uses SDNP addressing and SDNP payloads within the SDNP network, once the data enters the Last Mile the HyperSecurity benefits are lost.
- data packet 1223B comprising IP datagram B carried by NSP network hosted wired or fiber link 24 employs conventional IP addressing recognizable by Internet DNS servers and contains a conventional IP payload sniffable in by any cyber-pirate.
- Analog lines 4 and 7 are equally vulnerable as they carry simple analog audio signals as analog call data 1221.
- the SDNP gateway can support unsecured non-private call outs, it is ill-advised to connect SDNP secured calls to unsecure Last Mile networks lacking privacy provisions.
- FIG. 13 schematically illustrates examples of SDNP Call Out routing onto an unsecure Last Mile but with two different types authentication.
- the upper example illustrates a SDNP Call Out from SDNP gateway 1220A over an analog or POTS line to a business office desktop phone 9.
- operator 1225 performs authentication manually to confirm the account holder's identity and to confirm their account ID.
- the call carried by analog sound 1221 is unsecure, and remains private only if no secrets or account information is revealed aurally in the conversation, i.e. if no secrets are revealed the information is private but if information is revealed then the communication is no longer private.
- the term quasi-private is used herein to refer to authenticated communication over unsecure lines, i.e. conditionally private communication.
- the lower schematic illustrates an SDNP call-out from SDNP gateway 1220 A onto an unsecured digital Last Mile.
- Data carried by IP datagram 1223 to an electronic device such as desktop PC 36, while unsecured, can be authentication using an electronic ID verification method such as token 1226 to which a cyber-attacker does not have access. Because the line is unsecure and sniffable, care must be taken in the digital dialogue not to reveal account numbers or confidential data.
- FIG. 14 identity verified unsecured Last Mile communication is illustrated between the SDNP network and an office desktop phone 9, for example a private banker's phone.
- the account holder's call if placed internationally for example, would be routed across the globe using HyperSecure communication in the SDNP network and finally connected to the Last Mile as an SDNP call out through SDNP gateway 1201 A.
- the long distance portion of the call occurs using dynamically changing SDNP datagrams such as data packet 1222 A containing SDNP datagram A with a SDNP payload.
- Data packet 1222A is then converted by SDNP gateway 1201 A from SDNP datagram A into IP datagram B shown by data packet 1223B.
- IP datagram B contains a sniffable IP payload.
- Data packet 1223B is transported by network service provider (NSP) operated wired or fiber link 24 to public switched telephone network or PSTN gateway 1 A.
- NSP network service provider
- This gateway in turn is connected to company switchboard 8A over POTS line 4 carrying analog call 1221.
- Company switchboard 8A connects to desktop phone 9 over analog private branch exchange or PBX line 7 A to desktop phone 9 and also to personal authentication operator 1225.
- the account holder contacts the private banker on desktop phone 9 but before they can commence engaging in any transactions, personal authentication operator 1225 joins the call to confirm the identity of the caller, and thereafter leaves the call so that the caller's privacy is maintained. Because the call is not secure however, care must be taken by both the private banker and the account holder not to verbally reveal confidential information such as account numbers, passwords, or PINs. As such the call is quasi-private, i.e. conditionally private.
- identity verified unsecured Last Mile communication is illustrated between the SDNP network and desktop computer 36.
- desktop computer 36 communicates to SD P gateway 1201 A using IP datagram B carried over several digital mediums.
- Ethernet 106 A carries data packet 1223D comprising IP datagram B from desktop computer 36 to Ethernet based local router 27B.
- the Ethernet local router in turn communicates to network router 27 over Internet service provider (ISP) wired or fiber link 24 A using data packet 1223C comprising IP datagram B.
- ISP Internet service provider
- Network service provider line NSP operated wired or fiber link 24 carries data packet 1223B comprising IP datagram-B on the final leg of the Last Mile between network router 27 and SDNP gateway 1201 A. Because IP datagrams are employed, the Last Mile is unsecure.
- Digital methods for ID verification such as login window 1227 and security token 1228 can be used for authentication to insure
- Last Mile communication is an amalgamate of digital and analog connections including NSP wired or fiber link 24 carrying data packet 1223B comprising IP datagram B to network router 27, followed by wired or fiber link 24A carrying IP datagram B within data packet 1223C to PSTN bridge 3A, and POTS or analog lines 30B carrying digital PCM (pulse code modulated) data as analog calls 1221A connected to point of sale (POS) terminal 38 and gas pump POS terminal 38A.
- NSP wired or fiber link 24 carrying data packet 1223B comprising IP datagram B to network router 27, followed by wired or fiber link 24A carrying IP datagram B within data packet 1223C to PSTN bridge 3A
- POTS or analog lines 30B carrying digital PCM (pulse code modulated) data as analog calls 1221A connected to point of sale (POS) terminal 38 and gas pump POS terminal 38A.
- Authentication in financial transactions is based on bankcard data 1229 which may include smartcard integrated circuit based electronic validation and by dynamic PIN 1228. Authentication involves confirmation with financial institution 1230 connected to the SDNP network either through SDNP gateway 1201 A or through a different Last Mile.
- HyperSecure Last Mile Communication By adapting techniques of the secure dynamic communication network and protocol, HyperSecure communication can be achieved over the Last Mile.
- the connected device must execute SDNP code as a "SDNP client".
- the SDNP client comprises operating instructions, shared secrets, and SDNP connectivity information, hosted on the connected communication device.
- the SDNP client may comprise software running on an operating system, firmware running on a microcontroller or programmable IC, or in a dedicated hardware or integrated circuit.
- FIG. 17 schematically represents an example
- SDNP gateway 1201 A connects to a device running a SDNP client, in this example SDNP app 1335 running on desktop computer 36.
- the SDNP client is hardware and operating system specific. For mobile devices separate apps are required for different mobile device platforms using Android, iOS, and Windows Mobile. Similarly, distinct OS-specific applications are required for notebooks, desktop PCs, and servers including Windows 10, MacOS, Unix and Linux, etc. Hardware hosting of SDNP clients in devices lacking higher-level operating systems such as POS terminals, hotspots, IoT, etc. must be adapted to the programmable device executing the code.
- Programmable integrated circuits frequently require programming in a chip-specific development environment unique to the IC's vendor, e.g. Qualcomm, Broadcom, Intel, AMD, NVidia, Microchip, etc.
- SDNP gateway 1201 A and the SDNP app 1335 communicate using a SDNP payload 1222
- caller identities and call payloads are incomprehensible to packet sniffing, specifically the SDNP payload 1222 contains source and destination SDNP pseudo-addresses unrecognized by DNS servers and the payload comprises SDNP data that may be scrambled, fragmented, mixed with junk data insertions, and dynamically encrypted.
- SDNP payload 1222 is embedded in IP datagram 1223, which directs routing over the Last Mile using IP addresses or NAT addresses of the cellular, cable, or ISP carrier' s network used for Last Mile connectivity rather than an SDNP address.
- any SDNP client is intrinsically capable of authentication and identity verification. Privacy features, therefore are not based on the network's ability to achieve privacy to support AAA, but whether not the client software or firmware are designed to facilitate the verification process. Because any HyperSecure Last Mile is identity verification capable, it should be understood that the following HyperSecure Last Mile examples apply both to private and non-private secure communication. So unlike unsecure last mile networks with quasi-privacy features, private communication over a HyperSecure Last Mile is determined by the SDNP client, not the network, and capable of supporting any degree of single-factor or multi-factor authentication procedure desired by the client.
- HyperSecure calls are shown in several examples to follow.
- FIG. 18 HyperSecure Last Mile communication is illustrated between the SDNP network and various cellular mobile devices with a WiFi Last Link.
- data packet 1222A comprising SDNP datagram A and containing a SDNP payload is converted by SDNP gateway 1201 A for Last Mile communication into data packet 1223B comprising IP datagram B also containing a SDNP payload. Since the
- HyperSecure Last Mile utilizes different shared secrets, numeric seeds, encryption keys, and other zone-specific security credentials than the SDNP cloud employs, the SDNP payload in IP datagram B is different than the SDNP payload in SDNP datagram A.
- SDNP gateway 1201 A translates the SDNP datagrams into IP datagrams by changing the payload from one security zone to another, and by embedding SDNP routing information as source and address SDNP addresses not recognizable by DNS servers.
- This zone-specific SDNP payload is next wrapped in an IP datagram packet with an IP header containing last mile network specific IP addresses, either NAT or Internet addresses, to facilitate packet routing between SDNP gateway 1201 A and the
- data packets 1223B, 1223C, and 1223D are identically constructed datagrams, all comprising SDNP datagram B with identical SDNP payloads - payloads that do not change as the packets hops from device to device along the Last Mile.
- an SDNP network node or an SDNP client can reconstruct an SDNP payload embedded in a Level 3 datagram, whether an IP datagram or a SDNP datagram.
- data packet 1223B comprising IP datagram B is carried by NSP operated wired or fiber link 24 to network router 27, followed by data packet 1223C also comprising IP datagram B carried by ISP operated wired or fiber link 24A to WiFi router 26.
- WiFi router 26 then facilitates Last Link communication using data packet 1223D comprising IP datagram B over WiFi link 29 with mobile devices such as cell phone 32 and tablet 33, both running SDNP app 1335 A.
- these devices function as a SDNP client capable of interpreting the data contained within data packet 1223D comprising IP datagram B, including decrypting, de-junking, unscrambling and mixing the payload's content with data fragments from other data packets to recreate the original message or sound.
- HyperSecure Last Mile communication is illustrated between the SDNP network and various cellular mobile devices with a cellular radio Last Link.
- data packet 1223B comprising IP datagram B is carried by NSP operated wired or fiber link 24 to network router 27, followed by data packet 1223C also comprising IP datagram B carried by mobile network operator (MNO) wired or fiber link 24B to cellular base station 17 to create cellular network 25.
- MNO mobile network operator
- Cellular base station 17 then facilitates Last Link communication using data packet 1223D comprising IP datagram B over 3G, 4G/LTE cellular link 28 with mobile devices such as cell phone 32 and tablet 33, both running SDNP app 1335A.
- data packets 1223B, 1223C, and 1223D are identically constructed datagrams, all comprising SDNP datagram B with identical SDNP payloads - payloads that do not change as the packets hops from device to device along the Last Mile.
- HyperSecure Last Mile communication is illustrated between the SDNP network and various tethered (non-mobile) devices with Ethernet Last Link.
- data packet 1223B comprising IP datagram B is carried by NSP operated wired or fiber link 24 to network router 27, followed by data packet 1223C also comprising IP datagram B carried by Internet service provider ISP wired or fiber link 24A to Ethernet router 103 A.
- Ethernet router 103A then facilitates Last Link communication using data packet 1223D comprising IP datagram B over Ethernet 106A with tethered devices such as desktop computer 36 running SDNP app 1335C and desktop phone 37 running SDNP firmware 1335B.
- data packets 1223B, 1223C, and 1223D are identically constructed datagrams, all comprising SD P datagram B with identical SD P payloads - payloads that do not change as the packets hops from device to device along the Last Mile.
- HyperSecure Last Mile communication is illustrated between the SDNP network and cable service clients.
- data packet 1223A comprising IP datagram B is carried by NSP wired or fiber link 24 to cable CMTS 101, the command, communication and content distribution center of a cable operator.
- cable operators provide broad services such as cable TV, pay-per-view, phone services, Internet connectivity, business services, and more.
- the CMTS 101 head unit then connects to clients via cable 106 using fiber or coax modulated in accordance with DOCSIS3 and trellis formatting (described in the background section of this disclosure) to optimize bandwidth and real time services.
- the cable operator may maintain the datagram format or alternatively package the IP datagrams into a proprietary datagram format.
- These data packets herein referred to as CMTS datagram C, use cable specific NAT addressing, and encapsulate the SDNP payload as n nested payload within the data packet 1224C for delivery on cable 106.
- cable CMTS 101 routes CMTS datagram C to cable modem 103, which in turn extracts the payload data packet 1223B comprising IP datagram B with the unaltered SDNP payload for Last Link delivery.
- the Last Link to SDNP client enabled devices may occur in several formats including over Ethernet 106 A to desktop computer 36 running SDNP client app 1335C, or over copper twisted pair 7 to cordless phone 5A running SDNP client firmware 1335B.
- Cable CMTS 101 also routes CMTS datagram C to cable modem 103, which in turn extracts the original IP datagram, e.g. IP datagram B, and sends it and other video content to cable TV set top box over cable 106. Cable set top box then forwards IP datagram B and content via HDMI-2 107 to UHD interactive TV 39, running SDNP app 1335D.
- SDNP firmware can be hosted by cable TV set top box 102.
- HyperSecure Last Mile communication is illustrated between the SDNP network and a WiFi home network connected via a cable service provider.
- data packet 1223B comprising IP datagram B is carried by NSP wired or fiber link 24A to cable CMTS 101, the command, communication and content distribution center of a cable operator.
- the CMTS 101 head unit then connects using wired or fiber link 24 A over coax or fiber to a specific client' s cable (WiFi) modem router 100B to create WiFi access point 26.
- the routing a data packet 1224C may comprise an IP datagram with Internet addresses or contain a proprietary CMTS datagram C with NAT addressing.
- the routing between SDNP gateway 1201 A and the cable (WiFi) modem router 26 represents the wireline leg of the HyperSecure Last Mile.
- the Last Leg in a home network comprises WiFi link 29 connecting cable (WiFi) modem router 26 to various home devices by data packet 1223D comprising IP datagram B wirelessly.
- WiFi wireless
- data packet 1223D comprising IP datagram B wirelessly.
- WiFi wireless
- notebook 35 and desktop computer 36 operate as SDNP clients using computer app 1335C
- cell phone 32 and tablet 33 operate as SDNP clients using mobile app 1335A.
- IoT devices, in this case refrigerator 34K are able to operate as an SDNP client if their control system is loaded with SDNP firmware 1335E. If however, such devices do not or cannot embed the SDNP client's software, end-to-end security must be achieved by other means.
- FIG. 23 schematically represents the use of SDNP remote gateway 1350 in Last Mile communication.
- SDNP remote gateway 1350 comprises any communication device enabled by SDNP firmware 1335H to function as a remote gateway.
- a SDNP connection between SDNP gateway 1201A and SDNP remote gateway 1350 comprises IP datagram 1223 A including IP or NAT source and destination addresses and SDNP payload 1222.
- the SDNP payload 1222 includes a SDNP address not recognizable by DNS servers and a nested SDNP payload using Last Mile zone specific security credentials.
- This SDNP connection is HyperSecure capable of supporting identity verification and caller privacy.
- SDNP remote gateway 1350 Between SDNP remote gateway 1350 and any connected device other than a SDNP client (such as desktop computer 36), communication is performed by a local area network or LAN connection such as Ethernet, WiFi or other protocols. Security is facilitated by LAN security protocols and device pairing between the communication device and the SDNP remote gateway. Device pairing is the process whereby an authentication sequence between two communicating devices establishes the identity of the two devices, preventing unauthorized access.
- an SDNP enabled router 1351 i.e. a router running SDNP firmware 1335H performs the function of a remote SDNP gateway.
- This gateway converts data packet 1223A comprising IP datagram A into data packet 1223B comprising IP datagram B.
- SDNP firmware 1335H can interpret SDNP payload contained in IP datagram A, the connected devices are not SDNP clients. Instead SDNP router 1351 converts SDNP payload into a conventional IP payload. Unless additional security methods are introduced in a device this Last Link is unsecure. For home use, this unsecure device connection is often not a concern because the Last Link occurs inside the home. Unless a hacker physically invades a house to connect a wiretap, such wireline connections are not sniffable. Examples of wired in-home Last Links to non-SDNP devices include Ethernet 106 A, shown by example connected to desktop computer 36 and to modem 103 C or HDMI-2 connected to a TV 39.
- the Last Link must rely on authentication and encryption to achieve security on wireline connections.
- Ethernet such security can utilize any number of security methods (http://www.computerweekly.com/feature/iSCSI-security-Networking- and-security-options-available) including iSCSI operating on Layers 1 through Layer 3, such as virtual local area network operation or VLAN utilizing encryption among authenticated devices.
- security can be achieved using Layer 4 to Layer 6 methods using the "IP Security" or IPSec framework.
- IP Security IP Security
- IPSec offers two security modes. In the "Authentication Header" mode, the receiving device is able to authenticate the sender of data.
- ESP Encapsulating Security Payload
- tunnel mode the entire IP packet, including the IP header is encrypted, and nested in a new unencrypted IP packet so that routing can function properly and the packet can reach its correct network destination.
- security relies on authenticating devices to allow them to connect to the network.
- home networks e.g. personal networks connecting to computers, shared storage drives, IoT and other device connections
- network-connected hardware does not change frequently.
- authentication essentially involves a registration process of a device gaining access to a network or router. Rather than identifying a specific user's identity, this type of authentication is between devices, i.e. device-to-device, generally using some device tag, name, or ID number to identify and recognize the devices approved for connection.
- Establishing a network connection involves a setup phase when the devices are first introduced to one another and approved by the user for connection, followed by an automated authentication sequence each time a wireline device is physically connected to the other or for WiFi whenever the two devices come within range of one another.
- the setup phase referred to herein as identity pairing, may also be referred to as device registration, device bonding, device pairing, pairing, or pair bonding.
- a similar process is used with devices to connect a Bluetooth headphone to a cell phone or to pair bond a Bluetooth cell phone to a car's hands free audio system.
- Protocols include challenge handshake authentication protocol or CHAP, Kerberos V5, Simple Public-Key Generic Security Services Application Programming Interface (GSSAPI), Secure Remote Password (SRP), and Remote Authentication Dial-In User Service (RADIUS).
- CHAP challenge handshake authentication protocol
- Kerberos V5 Simple Public-Key Generic Security Services Application Programming Interface
- GSSAPI Simple Public-Key Generic Security Services Application Programming Interface
- SRP Secure Remote Password
- RADIUS Remote Authentication Dial-In User Service
- Ethernet communication protects identity -paired devices such as Ethernet modem 103C
- the output of the modem comprising analog telephone signals conducted over copper twisted pair conductors 7 to cordless phone 5A and to desktop phone 37
- the Last Link is not secure.
- the communication format of cordless phone 5A is not secure and subject to interception and monitoring. For this reason, the use of home phones in secure communication is ill advised.
- the distribution of video content is another subject of interest in security.
- HDMI High Definition Multimedia Interface
- DP DisplayPort
- DVI Digital Visual Interface
- GVIF Gigabit Video Interface
- UMI Unified Digital Interface
- HDCP High- bandwidth Digital Content Protection
- DHCP uses authentication to prevent non-licensed from receiving data, it encrypts data to prevent eavesdropping of information, and key revocation of compromised devices.
- HDMI now embeds a high-speed bidirectional data channel known as HEC or HDMI Ethernet Channel.
- HEC high-speed bidirectional data channel
- This data channel means HDMI connected devices can send and receive data via lOOMC/sec Ethernet, making them ready for IP -base application such as IP-TV.
- the HDMI Ethernet Channel allows Internet- enabled HDMI devices to share an Internet connection via the HDMI link, with no need for a separate Ethernet cable. As such secure communication can be facilitated over HDMI using the same security protocols and identity pairing available in Ethernet.
- an SD P enabled WiFi router 1352 i.e. a WiFi router running SDNP firmware 1335J performs the function of a remote SDNP gateway.
- This gateway converts data packet 1223A comprising IP datagram A into data packet 1223B comprising IP datagram B.
- SDNP firmware 1335J can interpret SDNP payload contained in IP datagram A, the connected devices are not SDNP clients. Instead SDNP WiFi router 1352 converts SDNP payload into a conventional IP payload and wirelessly communicates with the connected devices using WiFi access point 26 to facilitate communication over WiFi link 29. Unless additional security methods are introduced in a device this Last Link is unsecure.
- WiFi communications in the home or office security is a concern because the data packets can be sniffed from a distance.
- WiFi connected home and office devices include desktop computer 36, notebook 35, tablet 33, cell phone 32, speakers 34B, printer/scanner 34A, and shared data drive 34C.
- CCMP Counter Mode Cipher Block Chaining Message Authentication Code Protocol based on AES processing with a 128-bit key and a 128-bit block size.
- CCMP provides data confidentiality, requires authentication, and sets access control. Authentication involves identity pairing at setup. Re-pairing must be performed manually.
- CCMP security while good, is not HyperSecure, lacking anonymous data packets and dynamic nature of the SDNP communication provided from a SDNP client.
- an SDNP enabled WiFi router 1352 i.e. a WiFi router running SDNP firmware 1335J performs the function of a remote SDNP gateway.
- This gateway converts data packet 1223A comprising IP datagram A into data packet 1223B comprising IP datagram B.
- SDNP firmware 1335 J can interpret SDNP payload contained in IP datagram A, the connected IoT devices are not SDNP clients.
- SDNP WiFi router 1352 converts SDNP payload into a conventional IP payload and wirelessly communicates with the connected devices using WiFi link 29 from WiFi access point 26. Unless additional security methods are implemented, this Last Link is insecure - especially since WiFi data packets can be sniffed from a distance.
- Examples of WiFi connected IoT devices in the home include central heating and air conditioning 34D, lighting 34G, blinds 34F, large appliances 34K, portable and room HVAC 34E, garage doors 34L, home monitoring 34J, and home central security system 34H.
- the framework discovers devices, creates sessions, and facilitates secure communication.
- the framework is designed to support IoT device connectivity using numerous Layer 2 transport layers, including WiFi, Ethernet, serial bus communication, and power line PLC.
- Applications may be based on C, C++, Obj . C, and Java operating on numerous platforms including Linux, Windows, MacOS, Android, iOS, RTOS real time operating system, and open source development environment
- AllJoyn compliant applications authenticate one other and exchange encrypted data to enable end-to-end application level security.
- Authentication and data encryption are executed on application Layer 7.
- Transport layer 2 also referred to as the router layer, transmits security-related messages between application endpoints but does not implement any security logic itself.
- Security is achieved using AES128 peer-to-peer encryption.
- AllJoyn employs identity pairing in an authentication process in advance of executing command and control sequences. Supported authentication methods include a pre-shared key or PSK, secure remote password (SRP) key exchange or logon with username and password.
- SRP secure remote password
- the protocol also supports ephemeral (elliptic curve Diffe- Hellman) key exchange (i) with no authentication, (ii) authenticated with a pre- exchanged key, and (iii) authenticated with an X.509 ECDSA certificate.
- ephemeral elliptic curve Diffe- Hellman
- FIG. 27 example of IoT connected devices in a home network
- an SDNP enabled WiFi and Ethernet router 1352Z i.e. a Ethernet and WiFi router running SDNP firmware 1335J performs the function of a remote SDNP gateway.
- This gateway converts data packet 1223A comprising IP datagram A into data packet 1223B comprising IP datagram B.
- SDNP firmware 1335 J can interpret SDNP payload contained in IP datagram A
- the connected IoT devices are not SDNP clients.
- SDNP and Ethernet WiFi router 1352Z converts SDNP payload into a conventional IP payload communicates with the connected devices using both WiFi link 29 and Ethernet 106 A.
- this Last Link is insecure - especially for WiFi data packets that can be sniffed from a distance.
- WiFi connected IoT business devices include central heating and air conditioning 34D, lighting 34G, surveillance systems 34J, security systems 34H, POS terminals 38, and WiFi Hotspot connected devices such as tablet 33.
- Business enterprise wireline connected devices depend on the nature of the business. In banking, devices include Ethernet connected ATM machine 38D. In gas stations, devices include by example Ethernet connected gas pump 38 A.
- Last Link can be secured with non-SDNP clients communicating with a SDNP remote gateway. In this manner the majority of the Last Mile is
- Last Mile data transport outside the SDNP cloud necessarily employs IP datagrams, i.e. data packets using Internet source and destination addresses, or alternatively using NAT addresses of the network operator.
- IP datagrams i.e. data packets using Internet source and destination addresses, or alternatively using NAT addresses of the network operator.
- private networks e.g. those operating within office buildings, or in cooperation with local network service providers willing to host SDNP soft-switches on their servers, it is also possible to utilize SDNP datagrams to achieve HyperSecure communications on portions of Last Mile.
- HyperSecure communication relies on servers to host SDNP soft-switch software or firmware and to communicate using SDNP datagrams and anonymous addresses, not with IP datagrams within the SDNP cloud, these SDNP soft- switch enabled servers are referred to as SDNP nodes, as designated by the SDNP node notation ⁇ , ⁇ , ⁇ , ⁇ , ⁇ , ⁇ , etc.
- 14/803,869 also disclosed communication between multiple independent SDNP clouds connected by SDNP bridges - SDNP gateways routing IP datagrams to other SDNP clouds.
- the concept of an SDNP bridge can similarly be adapted for portions of Last Mile communication.
- two or more servers must be enabled by SDNP bridge software or firmware.
- SDNP bridge operation is used for routing data, not to operate as the final connection.
- two or more adjacent SDNP bridges can operate as a standalone SDNP bridge network, SDNP mini-cloud or SDNP ad hoc network.
- the SDNP bridge function represents a Layer 3 construct analogous to Layer 2 description of bridge mode operation of a WiFi router.
- communication occurs using SDNP datagrams. Communication to the SDNP -bridge from outside the SDNP -bridge or SDNP bridge network uses IP datagrams with SDNP payloads.
- FIG. 28 Operation of a SDNP bridge within Last Mile communication is exemplified in the schematic representation shown in FIG. 28 comprising an SDNP network with SDNP gateway 1201A, a SDNP bridge comprising SDNP bridge routers 1350 and 1352Z running SDNP firmware 1335H and 1335 J respectively, and a connected client device that is not an SDNP client, shown here as notebook 35.
- communication between SDNP gateway 1201A and SDNP -bridge 1350 comprises a secure connection utilizing IP datagram 1223A with IP address and SDNP payload.
- SDNP payload 1222A in turn contains SDNP routing information and secure SDNP payload encoded using zone specific security credentials. HyperSecurity is thereby achieved using the SDNP payload even though IP address routing is employed.
- HyperSecure communication occurs using SDNP datagram 1222B.
- SDNP routing information is extracted from the SDNP addressing contained within SDNP payload 1222A.
- the SDNP-bridge and SDNP connection comprise a HyperSecure wireline leg of Last Mile communication, capable of supporting identity and account verification and supporting privacy.
- HyperSecure is secured by any of the aforementioned Ethernet and WiFi security protocols such as iSCSI, IPSec, WPA, AllJoyn, and others.
- SDNP bridging is a Layer 3 protocol operating agnostically from Layer 1 PHY and Layer 2 Transport layer realizations.
- two SDNP bridge Ethernet routers 1351 A each running SDNP firmware 1335H communicate over an Ethernet (wireline) bridge using SDNP datagram 1222.
- two SDNP -bridge routers 1352Z each capable of Ethernet and WiFi communication and running SDNP firmware 1335 J, communicate over an WiFi (wireless) bridge using SDNP datagram 1222.
- SDNP firmware 1335H communicates over an Ethernet (wireline) bridge using SDNP datagram 1222 with SDNP-bridge router 1352Z, capable of Ethernet and WiFi communication running SDNP firmware 1335J.
- SDNP bridge comprising two or more SDNP enabled routers can route or distribute SDNP datagrams throughout a building or across a private network even though they operate outside the SDNP cloud in the Last Mile.
- the SDNP-bridge can be extended to systems utilizing proprietary hardware, such as cable TV systems.
- two cable CMTS "head" servers are modified to run SDNP firmware or software 1335L to operate as cable CMTS SDNP bridges 101 and communicate over an a cable or fiber (wireline) bridge using SDNP datagram 1222.
- the SDNP-bridge can extend from the CMTS head into the subscriber's home.
- cable CMTS SDNP bridge 101 running SDNP firmware or software 1335L communicates using SDNP datagram 1222 over cable (coax) bridge to cable TV set-top-box or cable modem 102 running SDNP firmware 1335M. In this manner the SDNP bridge extends HyperSecure communication into the home or office.
- the SDNP-bridge methods disclosed can also be used to transport data over radio networks.
- two cellular base stations and radio towers running SDNP firmware or software 1335N function as cellular base station SDNP bridges 17X and 17Y to communicate wirelessly over cellular network comprising cellular bridges 25X and 25Y using SDNP datagrams 1222.
- a terrestrial microwave base station running SDNP firmware or software 13350 functions as a ground-to-satellite link SDNP bridge 92C to communicate as a microwave satellite bridge using SDNP datagrams 1222 to an orbiting satellite running SDNP firmware or software 1335P, i.e. to satellite SDNP bridge 93. The satellite then in turn communicates with subscribers or with other satellites.
- SDNP bridge communication can be adapted to automotive applications employing automobiles as a peer-to-peer ad hoc communication network.
- the telematics module in car 1390A running SDNP firmware 1335F communicates over an automotive radio bridge using SDNP datagram 1222 with a nearby car 1390B also running SDNP firmware 1335F.
- Each car enabled with SDNP firmware forms another communication node in a dynamic telematics SDNP bridge network. This communication does not represent information being sent to a particular car or driver but instead forms a communication network able to pass information along a highway even where no cell tower is present locally.
- SDNP bridge networks are especially beneficial for communication over large geographies and in transportation and shipping involving cars, trucks, emergency vehicles, trains, airplanes, boats and ocean ships.
- satellite networks are required.
- the system typically involves network connectivity with the satellite operator referred to as a satellite bridge or backhaul, and the satellites link to its clients and subscribers also known as satellite distribution.
- FIG. 30 schematically represents a variety of satellite connections adapted for SDNP HyperSecure communication.
- SDNP gateway 1201 A communicates with terrestrial satellite antenna dish 92C running SDNP firmware or software 13350 using wireline connection 94A carrying data packet 1222A comprising SDNP datagram A and SDNP payload which in turn relays the same SDNP datagram A as data packet 1222B over satellite bridge 95 A to satellite 93 running SDNP firmware or software 1335P.
- Distribution of HyperSecure communication data packets to various clients from SDNP enabled satellite 93 comprises data packet 1222C and SDNP data packet-A containing a SDNP payload.
- Satellite communication is bidirectional, with the downlink from satellite 93 to terrestrial clients capable of a higher signal strength and faster data rate than the uplink connection. In other words, a satellite can transmit higher data rates and with stronger signal intensity to an earthly client than the client's response.
- satellite 93 links to subscribers include satellite link 95B to dish Internet subscriber 92G running SDNP firmware 1335T, to sat phone 92F running SD P firmware 1335S, to satellite antenna array 92H sitting atop high speed train 1360C running SDNP firmware 1335G, to satellite antenna array 92E sitting atop ocean vessel 1360B running SDNP firmware 1335R, and to satellite antenna array 92D sitting atop aircraft 1360 A running SDNP firmware 1335Q.
- FIG. 31A illustrates a commercial aircraft where satellite antenna module 92D running SDNP firmware 1335X mounted atop the fuselage of aircraft 1360 A connects to communication central server 1361 running SDNP software 1335Z.
- Communication central server 1361 links to a variety of systems including instrumentation 1367, data recorder and black box 1368, media storage module 1363, and WiFi router module 1362, optionally running SDNP firmware 1335L.
- WiFi router module 1362 connects to an array of WiFi antennas 1361 located throughout the airplane to support WiFi Hotspot communications. All communications except for radio based flight control occurs through a common satellite communication link using antenna module 92D shown by example in FIG. 31B.
- the antenna module includes satellite transmit antenna 1360 A, satellite receive antenna 1368A, antenna control unit 1369, and 40W voltage regulator 1370.
- Satellite receive antenna 1368A is smaller than satellite transmit antenna 1360A because the satellite broadcast power and signal strength is greater than the antenna's broadcast strength and uplink capability.
- Ocean vessel satellite ship communication utilizes multiple bands of satellite communications including high altitude and near earth orbit satellites.
- FIG. 32 illustrates the use of multiple band communication including Ku band satellite antenna 1383A, and low-earth-orbit satellite antennas 1383B and 1383C.
- High altitude satellites offer no or limited uplink capability but are able to cover wide areas from great altitudes including geosynchronous orbits. Because of their high altitude, area coverage of each satellite is substantial as shown in map 1384.
- map 1385 low earth orbit satellites cover smaller areas, requiring more satellites and therefore a higher cost to cover a broadcast area.
- access to low earth orbit satellites may be intermittent based on the satellites' orbital positioning.
- Ku band satellite antenna 1383 A is primarily used for distribution of TV and movie content, SDNP security is not generally required. Tracking and positioning is performed by antenna control 1383. Multi-channel data from satellite antenna 1383 A is fed into L-band multiswitch 1381 separating signals into fixed video broadcast data routed to TV receivers and tuners 1382 and digital video broadcasting DVB data. Video content is fed into central communication servers 1380. If, however, secure
- Ku band satellite antenna 1383 A can be adapted to execute SDNP software.
- the communication system is also capable of communication using 4G/LTE cellular network 25 hosted by cellular base station 17 running SDNP firmware 1335N.
- Communications through servers 1380 are distributed throughout the ship using SDNP WiFi router 1362 running SDNP firmware 1335L.
- WiFi Hotspot communication of WiFi access point 26 is distributed throughout the ship using WiFi antennas 1361.
- Communication to SDNP clients such as cell phone 32 running SDNP app 1335 facilitates end-to-end HyperSecure communication. Devices not enabled as SDNP clients, must rely on identity pairing using WAP, AllJoyn, or other security protocols.
- FIG. 33 illustrates the application of multi-band communication applied to high- speed trains.
- train data center server 1380 running SDNP software 1335Z connected to SDNP gateway 1201 A communicates to high speed train 1360C through multiple PHY connections including satellite microwave 95B, 400MHz radio 1372, and 60Ghz microwave 1373.
- SDNP data center 1380 relays data through satellite antenna 92C running SDNP firmware 1335D to satellite 93 running SDNP firmware 1335P.
- the satellite communicates with train antenna array 1383V connected to server 1361 running SDNP software 1335Y.
- Alternative communication occurs from SDNP data center 1380 through 400MHz antenna 1381 or 60GHz antenna 1382 positioned at regular intervals alongside the train tracks.
- These satellites also communicate with antenna array 1383B connected to train communication SDNP server 1361 running SDNP software 1335Y. Communication received by SDNP server 1361 is then distributed throughout the train by WiFi bridges 1335Z, and to clients as WiFi Hotspots.
- FIG. 34 illustrates an exemplary HyperSecure Last Mile connection between a vehicle and the SDNP cloud.
- the particular data carriers involved transporting packets across the Last Mile may vary dramatically by location.
- the example is shown to represent HyperSecure communication regardless of the data carriers involved.
- SDNP gateway 1201 A connects to a network router 67A over a network service provider (NSP) managed wired or fiber link 24, converting data packet 1222A comprising SDNP datagram A into data packet 1223A comprising IP datagram B containing a SDNP payload.
- NSP network service provider
- Network router 67A then routes IP datagram B as data packet 1223B to a cellular base station 17 over a wired or fiber link 24A owned or operated by a mobile network operator (MNO).
- IP data packet B is then wirelessly communicated over cellular network 25 as data packet 1223C comprising SDNP datagram B containing SDNP payload to the telematics module within automobile 1390A using cellular link 28, either using 2.5G, 3G, 3.5G, or 4G/LTE depending on the mobile network operator in the region.
- SDNP firmware 1335F operating within the telematics module then interprets the SDNP payload embedded within incoming data packet 1223C to complete the HyperSecure communication link.
- an automotive cellular Last Link functions as part of HyperSecure Last Mile communication.
- the telematics module in automobile 1390 A then utilizes the secure information for a variety of functions controlled by infotainment interface 1377.
- Internal WiFi Hotspot 1362D also distributes data packets 1223B and 1223C containing IP datagram B and IP datagram C, respectively.
- IP datagram B contains a SDNP payload that facilitates end-to-end HyperSecure communication to any SDNP client such as cell phone 32B running SDNP app 1335.
- IP datagram C using only a conventional IP payload is less secure, but works devices not operating as SDNP clients such as cell phone 32A and tablet 33A.
- Identity pairing can be used to improve Last Link security for non-SDNP devices using WPA, AllJoyn or other protocols.
- V2V communication vehicle-to- vehicle communication also referred to as V2V communication.
- the purpose of V2V communication is primarily for collision avoidance. But in accordance with the disclosed SDNP methods herein, V2V communications can also function as a HyperSecure ad hoc peer-to-peer network.
- Such inter-vehicle SDNP communication is illustrated in FIG. 36 where automobiles 1390A, 1390B, and 1390C running SDNP firmware 1335F form a peer-to-peer network with one another and with cellular base station 17 connected to SDNP gateway 1201 A. Communication among the vehicles can be performed using either IP datagrams or SDNP datagrams.
- SDNP gateway 1201A converts SDNP datagram A with a SDNP payload into data packet 1223A comprising IP datagram B with an embedded SDNP payload.
- cellular base station 17 communicates to automobile 1390A over a 2.5G or 3G cellular link 28A using data packet 1223B containing IP datagram B with an embedded SDNP payload but is able to communicate to automobile 1390C over a 3.5G or 4G/LTE cellular link 28B using data packet 1223C also containing IP datagram B with an embedded SDNP payload.
- the SDNP payload is distributed independent of the network used to carry the data packets.
- Automobiles enabled with SDNP firmware 1335F may also form an ad hoc peer- to-peer SDNP bridge or bridge network.
- automobile 1390 A communicates with automobile 1390B over a V2V radio link 1391 A using data packet 1222B containing SDNP datagram C rather than an IP datagram.
- automobile 1390B communicates with automobile 1390C over a V2V radio link 1391B using data packet 1222C containing SDNP datagram D, and does not rely on IP datagrams.
- the embedded content remains HyperSecure using SDNP payloads.
- SDNP ad hoc V2V network Another feature of the SDNP ad hoc V2V network is its ability to perform tunneling functions, i.e. passing data through one vehicle to another without the intervening car being able to monitor or interpret the data it is passing through.
- cellular link 28B fails because automobile 1390C is out of range
- cellular base station 17 can utilize the SDNP bridge network to reach the same caller, in the example shown through cellular link 28 A, V2V radio link 1391 A, and finally through V2V radio link 1391B.
- data packets 1223B, 1222B and 1222C change from IP datagram B to SDNP datagram C and finally to SDNP datagram D. Since the SDNP payload intended for automobile 1390C is uniquely created for the destination automobile, automobile 1390B and its occupants cannot hack or monitor the contents of SDNP datagram C even though are relaying data packet 1222B through the ad hoc network.
- the same SDNP bridge technology can be used to send large amounts of data using HyperSecurity over long distances, i.e. digital trunk communication.
- Three such example are shown in FIG. 37, namely microwave trunk 98, fiber trunk 90, and satellite trunks 95 A and 95B. While this function may be considered as part of a SDNP cloud, the single data route is similar to that of Last Mile communication, and therefore employs similar methods to insure HyperSecurity.
- servers 21A and 21B operating SDNP software 1335Z may communicate over microwave trunk 98 via microwave towers 96A and 96B running SDNP firmware 1335W using data packet 1222 comprising SDNP datagrams, or alternatively servers 21 A and 21B may communicate directly over fiber trunk 98 also using data packet 1222 comprising SDNP datagrams.
- servers 21 A and 21B may communicate with satellite 93 running SDNP firmware 1335V by means of microwave satellite trunks 95A and 95B, using earth based satellite antennae 92 A and 92B, both running SDNP firmware 1335U.
- satellite trunk communication utilizes data packet 1222 comprising SDNP datagrams.
- FIG. 38 contrasts four different combinations representing, in order from bottom to top, increasing security and privacy. In each case, three factors are considered, (i) security, the ability to prevent unauthorized access to the communiques, (ii) ID verification, the ability to authenticate the user and adjust access and privileges based on their identity, and (iii) anonymity, the ability to disguise the identity of callers from surveillance.
- SDNP gateway 1395 communicates openly with a non- SDNP client lacking any security provisions using data packet 1223C comprising an IP datagram with a sniffable IP address and an IP payload. As such the Last Mile connection is not secure and not private.
- SDNP gateway 1395 communicates with a non-SDNP client offering features of device authorization and identity pairing. Communication is by means of data packet 1223B comprising an IP datagram with a sniffable IP address but using an encrypted payload comprising ciphertext where only the identity-paired device can perform decryption. While the communication is not private or anonymous, it does offer enhanced security, at least for limited durations.
- SDNP gateway 1395 can route communications through any bridge or router 1397 and still achieve HyperSecurity, provided that data packet 1223A comprises a SDNP payload within the IP datagram.
- the level of security achieved depends only on the end device, not on the router.
- communication between a SD P gateway 1395 and a SD P Client 1396 using data packets 1222 comprising SDNP datagrams with SDNP addressing, i.e. using source and destination addresses not recognizable by Internet DNS name servers, and using SDNP secured payloads is HyperSecure, offering superior security, full privacy provisions, and anonymous packet routing.
- FIG. 39 illustrates single route Last Mile communication between SDNP client 1400 and SDNP gateway 1401 using fixed IP addresses.
- IP datagram 1405 includes the IP destination address of ⁇ , ⁇ (the SDNP gateway), and the IP address of the data packet's source Ci,i, the SDNP client.
- Last Link communication occurs through a single route 1404 to router 1402A.
- the data is routed through any number of routers R, e.g. router 1402B, to the SDNP gateway ⁇ , ⁇ .
- FIG. 40A is an IP stack depiction of single-route last mile HyperSecure communication using static IP addresses.
- client device comprising SDNP client Ci,i establishes a single route Last Mile connection 1409 with SDNP gateway 1401 comprising SDNP gateway ⁇ , ⁇ through routers 1402A and 1402B where router 1402A comprises a WiFi router and router 1402B is an Ethernet router.
- Client device 1400 connects to router 1402A through Last Link 1404 where the PHY Layer 1 physical connection and the corresponding data link Layer 2 of client IP stack 141 1 connects to corresponding Layer 1 and Layer 2 in router IP stack 1412A.
- router 1402 A connects to router 1402B using Ethernet where the PHY Layer 1 physical connection and the corresponding data link Layer 2 of the WiFi router' s IP stack 1412A connects to corresponding Layer 1 and Layer 2 in Ethernet router IP stack 1412B.
- router 1402B connects to SD P gateway server 1401 using Ethernet where the PHY Layer 1 physical connection and the corresponding data link Layer 2 of the Ethernet router's IP stack 1412B connects to corresponding Layer 1 and Layer 2 in the gateway' s IP stack 1422.
- routers carry data undisturbed, so that network Layer 3 IP datagrams, flow from one IP stack to another transparently, specifically from Layer 3 in IP stack 141 1 to 1412A, 1412B and finally to 1422. In this manner, the network carries the IP datagrams as single route data across a virtual Last Mile connection 1409 even if the data physically passes through multiple devices
- Layer 3 network data flows through the Last Mile independent of the physical connections used to carry the IP datagrams, i.e. Layer 3 Last Mile communication operates agnostically to the underlying Layer 1 and Layer 2
- IP datagram 1405 flows over Last Mile connection 1409 regardless of the media or the number of routers used in the data packet delivery process.
- the Last Mile may be therefore be considered as a "data construct", i.e. an abstraction to mean any and all physical means be which the IP datagram is transported between and among devices.
- the Last Link has more of a physical meaning because the connected device of the caller must be able to connect to the upstream router of the communication link cannot be established.
- Last Mile communication Another consideration of Last Mile communication is that the payload of IP datagram 1405 contains all the information for upper OSI layers, including the transport Layer 4 data, session Layer 5 data, presentation Layer 6 data, and application Layer 7 data. Aside from Layer 4 data needed to select UDP or TCP transport protocols, the remaining data in the IP datagram's payload is specific to the disclosed SDNP
- Last Mile communication cannot be interpreted by routers operating along the last mile unless they themselves run SDNP software or firmware. Accordingly, only the end devices, i.e. the caller or SDNP client and the SDNP gateway, can interpret Last Mile communication even though the Last Mile network itself may comprise an amalgamate of different devices, carriers, and network operators.
- IP deception is beneficial, i.e. misdirecting cyber-attackers by dynamically changing the source and destination addresses in the IP datagram.
- IP deception can be accomplished by dynamically changing the IP address of the caller' s connected device, herein referred to as "dynamic client addressing", or by
- IP datagrams A, B, and C sent successively comprise three different source addresses.
- IP datagram A 1405A includes IP source address Ci,i
- IP datagram B 1405B includes IP source address Ci,2
- IP datagram C 1405C includes IP source address Ci,3. So although the packets entering router 1402A all emanate from SDNP client 1400, the clients source address Ci,n changes dynamically obfuscating the true IP address and appearing to be more than one communicating device. To complete the charade, the MAC address of the communicating device should also change correspondingly with the dynamic source address. This method is illustrated using IP stacks in FIG.
- the shared PHY layer comprises WiFi standard frequencies and the data link layer connecting the devices follows established standards such as 802.1 lac or 802.1 In.
- Each sequential IP packet also includes a corresponding payload SDNP 1, SDNP 2, SDNP 3, and so on. Note that although this description refers to each IP address using mathematical shorthand notation IP Ci,n, it is understood that the IP addresses comprise real IP addresses made in accordance with IPv4 or IPv6 international standards and exclude any reserved IP addresses.
- first data packet 1405A comprises payload SDNP 1 with IP source address Ci,i and destination address ⁇ , ⁇ .
- Data packet 1405A is then routed over Last Link 1404A through routers 1402 A and 1402B to SDNP gateway 1401 A.
- a second data packet 1405B comprises payload SDNP 2 with IP source address Ci,i and destination address ⁇ , ⁇ Data packet 1405B is then routed over Last Link 1404B through router 1402C to SDNP gateway 1401B.
- a third data packet 1405C comprises payload SDNP 3 with IP source address Ci,i and destination address Mo,3. Data packet 1405C is then routed over Last Link 1404C through router 1402D and 1402E to SDNP gateway 1401C.
- the IP datagrams are routed through multiple Last Links 1404A, 1404B, and 1404C to multiple routers 1402A, 1402B, and 1402C.
- These routers may comprise (i) completely independent routers employing identical physical mediums such as WiFi or Ethernet, (ii) multiple router channels in a common hardware device, e.g. multiple trellis channels in a DOCSIS3 cable modem or (iii) different physical mediums for communication, e.g. one routed through WiFi, another through 3G, etc.
- FIG. 44A illustrates an IP stack depiction of the aforementioned multi -route last mile HyperSecure communication over a common PHY Last Link 1404 using static IP addresses.
- SD P client Ci,i communicates with routers 1401 A, 1402B, and 1402C as a single device connection using common PHY, data link, and network layers.
- Address deception is performed using successive IP datagrams comprising a static client address IP Ci,i but with changing SDNP gateway addresses IP ⁇ , ⁇ , IP ⁇ , ⁇ , and IP Mo,3. Packet misdirection may occur algorithmically or randomly.
- the 10 th outgoing datagram from client device 1400 will include a destination address IP Mo,3 and a source IP address IP Ci,i.
- Replies from SDNP gateway server 1401C return to client device 1400 in the reverse path, i.e. with a source IP address IP Mo,3 and destination address IP Ci,i.
- the PHY and data link between the client device 1400 and the routers 1402A, 1402D, and 1402C comprises a single medium, e.g. WiFi.
- the Last Link connections are represented as single lines splitting into three it should be understood that the physical connections are all made point-to-point and not by electrical Y connectors used to create parallel wires. Instead the depiction means the connections are to indicate the effect of the connection, i.e. the PHY layer of client IP stack 141 1 expands one PHY connections into three, i.e. connecting to the PHY layer of IP stacks 1412A, 1412C, and 1412D.
- this Last Link operates as a single output to three input expander where one client connects to three router functions, regardless of whether the router functions are contained into one common electronic apparatus or carved into distinct and separate routers.
- Last Link 1404 constitutes a single type of communication media - either cable, fiber, WiFi, Ethernet, or cellular. The remaining portions of the Last Mile however may comprise any media, not necessarily the same as the Last Link.
- An alternative Last Link involves multiple dissimilar PHY layers connecting to independent routers. Such an implementation, an IP stack executing multi-route last mile HyperSecure communication using static IP addresses over multiple PHY last links is illustrated in FIG. 44B.
- IP stack 1411 A connects to router 1402A over Last Link 1404A directing IP datagram comprising source address IP Ci,i and destination address IP ⁇ , ⁇ traversing router 1402B.
- IP stack 141 IB connects to router 1402C over Last Link 1404B directing IP datagrams comprising source address IP Ci,i and destination address IP ⁇ , ⁇ .
- IP stack 1411C connects to router 1402D over Last Link 1404C directing IP datagrams comprising source address IP Ci,i and destination address IP Mo,3 traversing router 1402E.
- first data packet 1405A comprises payload SDNP 1 with dynamic IP source address Ci,i and destination address ⁇ , ⁇ .
- Data packet 1405A is then routed over Last Link 1404A through routers 1402A and 1402B to SDNP gateway 1401 A.
- a second data packet 1405B comprises payload SDNP 2 with dynamic IP source address Ci,2 and destination address ⁇ , ⁇ Data packet 1405B is then routed over Last Link 1404B through router 1402C to SDNP gateway 1401B.
- a third data packet 1405C comprises payload SDNP 3 with dynamic IP source address Ci,3 and destination address Mo,3. Data packet 1405C is then routed over Last Link 1404C through routers 1402D and 1402E to SDNP gateway 1401C.
- each successive data packet contains changing SDNP payloads, employs dynamically changing source addresses, routed through different Last Links to unique SDNP gateways.
- Last Links 1404A, 1404B, and 1404C either a single router with multiple IP inputs such as a DOCSIS3 cable modem with trellis encoding, or over multiple forms of media, e.g. multiple bands of WiFi, combinations of radio and WiFi, or other combinations of wireline and wireless communication are used.
- FIG. 46A depicts an IP stack of multi-route last mile HyperSecure communication using dynamic client IP addresses over a single PHY last link 1404.
- Client device 1400 illustrates a shared physical interface comprising Layer 1 and Layer 2 communication shown in IP stack 1411 A.
- IP stack 1411 A On network Layer 3, IP stack 1411 A generates client address Ci,i directed to SDMP gateway ⁇ , ⁇ , IP stack 141 IB generates client address Ci,2 directed to SDMP gateway ⁇ , ⁇ , and IP stack 1411C generates client address Ci,3 directed to SDMP gateway Mo,3.
- client device 1400 contains three IP stacks 1411 A, 141 IB, and 1411C transporting IP datagrams with corresponding IP addresses IP Ci,i, IP Ci,2, and IP Ci,3 over
- Last Links 1404 A, 1404B, and 1404C to SDNP gateway having IP addresses IP ⁇ , ⁇ , IP ⁇ , ⁇ , and IP M 0 , 3 .
- Last Link comprises a single route, where beyond the first router multiroute data transport is employed.
- first data packet 1405A comprises payload SDNP 1 with dynamic IP source address Ci,i and destination address ⁇ , ⁇ .
- Data packet 1405A is routed over Last Link 1404 and through routers 1402A and 1402B to SDNP gateway 1401 A.
- a second data packet 1405B comprises payload SDNP 2 with dynamic IP source address Ci,2 and destination address ⁇ , ⁇ Data packet 1405B is routed over Last Link 1404 and through routers 1402 A and 1402C to SDNP gateway 140 IB.
- a third data packet 1405C comprises payload SDNP 3 with dynamic IP source address Ci,3 and destination address Mo,3. Data packet 1405C is successively routed over Last Link 1401 and through routers 1402 A, 1402D and 1402E to SDNP gateway 1401C.
- each successive data packet contains changing SDNP payloads, employs dynamically changing source addresses, routed through a common Last Links to unique SD P gateways.
- This Last Mile connection is illustrated using IP stacks in FIG. 48 where IP stack 141 1 in SDNP client device 1400 with a Last Link 1404 exclusively with router 1402 A sends data packets on network Layer 3 to stack 1412A comprising three different network addresses, specifically IP Ci,i, IP Ci,2, and IP Ci,3. As such client device 1400 appears to router 1402A as three separate clients even though it actually comprises a single client. Once the IP datagrams reach router 1402 A, they split and take different routes to different destination gateways.
- Packets with source address IP Ci,i may for example, be routed through router 1402B to destination IP ⁇ , ⁇ , packets with source address IP Ci,2, may routed through router 1402C to destination IP ⁇ , ⁇ , and packets with source address IP Ci,3, may be routed through routers 1402D and 1402E to destination IP Mo,3.
- the routing table for directing a data packet with a given dynamic client address Ci,nto a specific SDNP gateway is not pre-fixed and can be varied dynamically. IP addresses can be assigned on a packet-by-packet basis, further obfuscating the fact that the apparently unrelated data packets are all part of a single fragmented communication between two callers.
- Last Mile Routing may comprise communication over a variety of media, including Ethernet, WiFi, cellular, or DOCSIS3 enabled cable and fiber links. Regardless of the medium used, routing of data packets over the Last Mile is primarily controlled by three variables, namely,
- MAC addresses control the physical media used to perform each hop in the Last Mile communication, i.e. Layer 1 and Layer 2 information
- the IP addresses identity the client device and the SDNP gateway, i.e. the devices at the two ends of the Last Mile.
- the payload used in HyperSecure communication follows the protocols defined in accordance with the secure dynamic communication network and protocol
- intermediate devices in the Last Mile i.e., routers and other devices on the route of a packet between the client device and the gateway, are generally not enabled to execute SD P functions because of the lack of SD P executable code in such devices. Therefore, the SDNP payload has no bearing on the routing of Last Mile HyperSecure data packets.
- Ethernet for Last Mile communication. Adapting the Ethernet data packet described previously in FIG. 9E for SDNP Last Mile
- FIG. 49 is a graphical representation of IPv4 and IPv6 datagrams for Ethernet communication carrying a SDNP payload.
- Layer 1 Ethernet packet 188 comprises data frame header, i.e. preamble 180, start frame delimiter SFD 181, and Layer 2 Ethernet packet 189.
- Ethernet packet 189 includes destination and source MAC addresses 182 and 183, an optional 802.1Q tag 184 for VLAN implementation, Ethertype field 185 used to specify the type of data link employed (either Ethernet II or the length specification according to IEEE802.3), and frame check 186 comprising a 32-bit CRC checksum of the entire data link packet.
- Ethernet packet 189 also contains variable length MAC payload 187 used to encapsulate the IP datagram's SDNP content 1430.
- MAC payload 187 contains an IP header 434 and an IP payload 435 comprising transport-header 436 and SDNP payload 1430.
- IP header 434 varies depending on whether the IP datagram follows the IPv4 or IPv6 protocol as determined by protocol field 447 comprising binary 4 or protocol field 448 comprising binary 6.
- Preambles 440 and 444 both contain a transport header flag 470 used to determine the Layer 4 transport method employed, e.g. TCP, UDP or the maintenance functions ICMP and IGMP.
- TCP transport is employed for software and data files, while UDP is employed for real time data such as VoIP and video.
- the length and format of the transport header 436 varies in accordance with transport header 470.
- IP header 434 contains IPv4 source and destination addresses 441 and 442 or IPv6 source and destination addresses 445 and 446.
- Last Mile routing of Ethernet packets depends both on the IP addresses and the MAC addresses, represented by exemplary names of the devices to which the IP or MAC address refer to, e.g. MAC Ci,i or IP ⁇ , ⁇ .
- the symbolic names representing a numeric address made in accordance with the Ethernet formatted Internet protocol, are used in lieu of numerical addresses for the sake of clarity.
- IP address IP Ci,i follows different formats and employs a different number of bytes for IPv4 and IPv6 names.
- the format for the MAC address varies with the Layer 2 data link protocol employed. As such, the MAC address MAC Ci,i for cellular radio is not the same as the MAC address for the same device communicating using WiFi or Ethernet.
- MAC addresses have no relationship to IP addresses, i.e. the IP address and MAC address for the same client have no relationship.
- Sequential Last Mile routing of Ethernet packets is shown in the examples of FIG. 50A through FIG. 50D.
- Each illustration contains two Ethernet packets - a top one comprising an IPv4 datagram and a lower one comprising an IPv6 datagram. Because IPv4 and IPv6 use different formats with varying field lengths, the two Ethernet packets shown are generally not of the same length even when carrying identical payloads.
- SDNP payload-A travels from SDNP client 1400 to router 1402 A over Last Link 1404 and then across gateway link 1414 to the SDNP gateway 1401.
- a response from the SDNP gateway to the client involves SDNP payload G traveling from SDNP gateway 1401 over gateway link 1414 to router 1402 A, then across Last Link 1404 to client 1400.
- SDNP client 1400 has numeric MAC and IP addresses MAC Ci,i and IP Ci,i
- router 1402A has numeric MAC address MAC R
- SDNP gateway has numeric MAC and IP addresses MAC ⁇ , ⁇ and IP ⁇ , ⁇ . The IP address of router 1402A is not used in the data packets.
- FIG. 50A illustrates IPv4 and IPv6 Last Link Ethernet packets used for single- PHY routing to router 1402A comprising source MAC address MAC Ci,i, destination MAC address MAC R, source IP address IP Ci,i, destination address IP ⁇ , ⁇ , and a SDNP payload.
- FIG. 50A illustrates IPv4 and IPv6 Last Link Ethernet packets used for single- PHY routing to router 1402A comprising source MAC address MAC Ci,i, destination MAC address MAC R, source IP address IP Ci,i, destination address IP ⁇ , ⁇ , and a SDNP payload.
- 50B illustrates the corresponding Ethernet packets transporting SDNP payload A over gateway link 1414.
- the source and destination IP addresses remain unchanged at IP Ci,i and IP ⁇ , ⁇ while the MAC source and destination addresses change from their original values to MAC R and MAC ⁇ , ⁇ .
- SDNP payload G traverses the same network in reverse sequence, i.e. where the source and destination addresses are swapped.
- the source and destination IP addresses comprise IP ⁇ , ⁇ and IP Ci,i respectively while the MAC addresses include source address MAC ⁇ , ⁇ and destination MAC R.
- MAC addresses change to source address MAC R and destination MAC Ci,i while the source and destination IP addresses remain unchanged to IP ⁇ , ⁇ and
- One convenient means to represent Last Mile communication from an SDNP client is by utilizing "abridged" data packets containing data fields containing source and destination MAC addresses, source and destination IP addresses, and the SDNP payload.
- the abbreviated form is convenient for illustrating data flow in any communication "session", i.e. the constructing of successive data packets transmitted across the Last Mile to the SDNP gateway, and the responses thereto.
- successive Ethernet packets shown in abridged form
- Each row represents successive data packets containing SDNP payloads, A, B, and C.
- the leftmost column illustrates the data packets in the Last Link while the right column illustrates data packets carrying the same payloads over the gateway link.
- all packets specify IP Ci,i as the source IP address and IP ⁇ , ⁇ as the destination IP address.
- Last Mile Since only one pair of IP addresses are employed the Last Mile is referred to herein as a SDNP single route Last Mile communication. Furthermore, since the source IP address used by SDNP client 1400 to transport successive data packets is unchanging, the Last Link employs "static client addressing".
- the MAC addresses in different segments of the Last Mile necessarily change. As shown, all successive packets traveling across the Last Link from the client to the router employ source and destination MAC addresses MAC Ci,i and MAC R. Since a single MAC address is used for the client in successive data packets, the Last Link comprises a single physical medium, i.e. a single-PHY Last Link. Transport over the gateway link employs source and destination MAC addresses MAC R and MAC ⁇ , ⁇ respectively.
- the data packet shown encloses a SDNP payload
- routing over the Last Mile necessarily uses sniffable MAC and IP addresses - addresses that can be interpreted by monitored by unauthorized listeners.
- an unauthorized listener can deduce that the data packets are likely part of the same conversation or session and even though they cannot open the SDNP payload, they can still gather metadata such as call times, files sizes, data rates, etc. to develop a profile of the caller.
- metadata such as call times, files sizes, data rates, etc.
- a hacker can potentially trace a call's origin to the end device, i.e. the client device, and thereafter personally identify the caller.
- a superior way to prevent client device tracing, obfuscate related call packets, and inhibit the gathering of metadata is to dynamically change MAC and IP addresses in Last Mile and Last Link communication.
- inventive methods of deception include:
- Multi- PHY Last Link Sending data packets over changing communication mediums by dynamically changing the Last Link MAC addresses, referred to herein as "multi- PHY Last Link" communication
- Multi-route Last Mile Changing the communication path of successive data packets over the Last Mile by dynamically changing the IP address of communication to and from different SDNP gateway IP addresses, referred to herein as "multi-route Last Mile" communication.
- FIG. 51A illustrates the use of multi-PHY Last Link communication in a single route Last Mile communication with static client addressing. As shown, each row comprises a pair of data packets using in a
- Last Mile communication from an SDNP client to the SDNP gateway - the left side representing the Last Link data packet, the right side describing the gateway link data package.
- the three rows represent three successive messages, the top row containing the first data set "SDNP payload A", the middle row containing SDNP payload B, and the bottom row describing the third successive data packet containing SDNP payload C.
- Last Mile communication with static client addressing all successive data packets use a static client address IP Ci,i and fixed destination IP address IP ⁇ , ⁇ .
- the MAC address of the SDNP client In order to execute multi-PHY Last Link communication, i.e. to route data in the Last Link over multiple physical mediums, the MAC address of the SDNP client must be dynamically changed in sequential data packets. Each MAC address corresponds to a specific PHY layer, e.g. Ethernet 100BASE-T and 1000BASE-T connections. In the case of three physical mediums, the client's MAC address is dynamically changed
- the MAC addresses can be varied in a random pattern to avoid pattern recognition, such as MAC Ci,i, MAC Ci,2, MAC Ci,2, MAC Ci,i, MAC Ci,2, MAC Ci,i, MAC Ci, 2 , MAC Ci,i, ... While the source MAC address is varied, the MAC destination for the Last Link may remains constant, i.e. as MAC R. Since all of the Last Link's multi-PHY paths terminate in the same router, the data path through the remainder of the Last Mile remains fixed as a single route communication. In other words, even though the Last Link utilizes a multi-PHY connection, the Last Mile enters the SDNP cloud through a single gateway and the Last Mile comprises single-route communication.
- FIG. 51B illustrates the use of client dynamic IP addressing in single route Last Mile communication.
- the top set of data packets illustrate a single PHY Last Link connection while the lower set of data packets describe a multi-PHY implementation.
- the destination IP address 442 of the SDNP gateway remains fixed with a numeric value IP ⁇ , ⁇ in all data packets regardless of whether single PHY or multi-PHY methods are used.
- dynamic client addressing data packets carrying SDNP payload A employ a dynamically selected source IP address 441 comprising IP Ci,i
- data packets carrying SDNP payload B employ a dynamically selected source IP address comprising IP Ci,2
- data packets carrying SDNP payload C use a dynamically selected source IP address comprising IP Ci,3 and so on.
- the number of dynamically selected addresses is nearly unlimited, especially in IPv6.
- IP addresses may be reused so long that some time, e.g. 1 second, transpires before the address is recycled.
- the value of the source MAC address 183 remains constant, in this example at MAC Ci,i, even though the IP source address changes.
- the value of the source MAC address 183 varies successively, changing from MAC Ci,i to MAC Ci,2 and then to MAC Ci,3.
- FIG. 51C illustrates the use of multi-route Last Mile communication with static client addressing.
- the client's source IP address 441 remains static with a numeric value IP Ci,i while successive data packets containing SDNP payloads A, B, and C dynamically vary the destination IP address 442 from IP ⁇ , ⁇ , to IP ⁇ , ⁇ to IP Mo,3.
- IP addresses of the SDNP gateways are not randomly selected, but "chosen" by the SDNP signaling servers to represent gateways temporally close to the caller, i.e. those gateways with a minimal statistical propagation delay between the SDNP client and the specific SDNP gateway.
- the dynamic destination addresses change irrespective of the PHY connections.
- the top set of data packets illustrate a single PHY Last Link connection with a client source MAC address 183 for the Last Link having a numeric value MAC Ci,i while the lower set of data packets describe a multi-PHY implementation varying the MAC source address across different mediums, e.g. MAC Ci,i, MAC Ci,2, and MAC Ci,3. There is no corresponding pattern or mathematical relationship between the changing MAC addresses of the client and the destination IP addresses of the SDNP gateways.
- the most effective degree of deception is to combine dynamic client addressing with multi-route Last Mile communication.
- This novel combination of security features is shown in FIG. 51D both for single-PHY Last Link implementation (shown in the top half of the illustration), and for a multi-PHY Last Link version shown in the lower half.
- the source IP address 441 dynamically and randomly changes from IP Ci,i, to IP Ci,2, and to IP Ci,3 while independently the destination IP address 442 of the SDNP gateway changes from IP ⁇ , ⁇ , to IP ⁇ , ⁇ to IP Mo,3.
- the SDNP gateway address is selected by the SDNP signaling servers to minimize propagation delay while the dynamic client address changes in an unrelated manner.
- the top set of data packets illustrate a single PHY Last Link connection with a client source MAC address 183 for the Last Link having a numeric value MAC Ci,i while the lower set of data packets describe a multi-PHY
- a multi-PHY Last Link may advantageously connect to three distinct routers Ri, R2, and R3 rather than funnel all the data into a single router R.
- Last Mile deception as described previously represents ten different cases as summarized in the table of FIG. 52A, ranging from the least secure implementation (shown at the bottom of table as row # 10) comprising a single route Last Mile with a static client address and a single-PHY Last Link to the superior deception offered by a multi-PHY Last Link with dynamic source addressing and multi-route Last Mile communication at the top row # 1.
- the intermediate combinations are ranked in order of security.
- the notations Ci,n, ⁇ , ⁇ , and Rn refer to dynamically changing addresses for SD P clients, SD P gateways, and the Last Link router. The dynamic addresses are uncorrected.
- Rows 7 to 10 describe single route Last Mile communication, i.e.
- Last Link communication connects to a single router with MAC address R.
- shaded rows 1 and 4 describe multi-PHY Last Link
- FIG. 52B topologically in FIG. 52B in four combinations - static client addressing with single- PHY Last Link, static-client addressing with multi-PHY Last Link, dynamic client addressing with single-PHY Last Link, and dynamic client addressing with multi-PHY Last Link.
- Each box illustrates three successive data packet communications showing the data path employed. Solid lines represent data packet flow while dotted lines illustrate possible paths not being utilized. Shaded circles illustrate communication nodes employed in the Last Mile communication, while empty circles illustrate unused communication nodes. As shown, all examples terminate the Last Mile data routing through a single connection between router R and SDNP gateway ⁇ , ⁇ .
- each successive packet takes the same path over the entire Last Mile using unchanging IP addresses.
- each successive packet takes a different path over the Last Link as prescribed by dynamically changing MAC addresses.
- the remainder of the Last Mile comprises a single route as specified by unchanging IP addresses.
- changing the physical media of the Last Link makes caller tracing more difficult.
- each successive packet takes the same path over the entire Last Mile using an unchanging destination IP address and a constant client MAC address for the Last Link.
- Deception is instead achieved by changing the identity of the client by means of changes in the dynamic source IP address.
- the client's MAC address and source IP address change dynamically and randomly even though all packets are routed to a single SD P gateway.
- Dynamic client addressing is the process whereby a client device employs one or more temporary ad hoc IP addresses.
- the process involves two stages. In the first stage, when a device first logs on to a network it registers its presence on the local subnet by contacting the nearest router. The router then redirects the connection to the nearest DHCP server on the same subnet.
- DHCP an acronym for dynamic host configuration protocol (DHCP) is a network management protocol used to dynamically assign IP addresses.
- the client device downloads one or more IP addresses and stores the addresses in its communication data register. Until such time that the assigned IP addresses are renewed by the local DHCP server, either by starting a new session or requesting new addresses, whenever the client device communicates it uses these IP addresses. Because the addresses are dynamically issued within a specific subnet, the client device's IP addresses are not Internet addresses.
- the device In the second stage when the client device either places a call or logs onto the SDNP network, the device automatically contacts the SDNP signaling server based on a static IP address of the SDNP server.
- the SDNP server upon receiving the incoming message uploads the ad hoc IP address or addresses to the SDNP name server.
- the SDNP name server assigns SDNP addresses as pseudo-code for each of the temporary IP addresses.
- just before routing the packet's SDNP source address is substituted by its local ad hoc IP address.
- the identity of the client device is camouflaged, by repeatedly sending packets with changing source addresses. In this manner, dynamic deception obscures the true identity of the client device.
- the source addresses for outgoing packets discard the client IP addresses and substitute the SDNP address of the gateway server instead.
- Each outgoing SDNP packet then swaps the local IP address of the device with its local ad hoc IP address just prior to transport.
- each hop uses new IP addresses. So when a SDNP message finally reaches its destination, the source address of the client device is not included in the data packet. Instead the signaling server informs the destination device about the return path for replies.
- the operation of "multi -route" Last Mile communication is shown topologically in FIG. 52C in four combinations of static and dynamic client addressing as well as single-PHY and multi-PHY last links.
- the destination IP address i.e. the SDNP gateway
- the client addresses remain static, meaning the identity of the caller is unchanged.
- the upper left corner example uses a single-PHY connection for the Last Link, meaning the MAC address for the client also remains static.
- the unchanging Last Link physical medium and unchanging client IP address makes the Last Mile susceptible to call tracing. This weakness can be remedied either by changing the Last Link medium used to transport the data packets or by disguising the true identity of the caller's IP address.
- the lower left corner example uses a multi-PHY connection for the Last Link, meaning the MAC address for the client changes dynamically. Such an approach compensates for the fact that the identity of the client maintains a static IP address.
- each unique Last Link connects to separate routers on successive packets' journeys to distinct SDNP gateways. As such, a first packet is routed from a client with static address IP Ci,i to the router with MAC address MAC Ri over a unique PHY medium before finally being routed to SDNP gateway with IP address IP ⁇ , ⁇ .
- a second packet the identical client address IP Ci,i is routed to a different router with media address MAC R2 over a unique PHY medium before finally being routed to SDNP gateway with IP address IP ⁇ , ⁇
- a third packet also with static client IP address Ci,i is routed to a router with a media address MAC R3 over a unique PHY medium where it is subsequently routed to SDNP gateway Mo,3.
- the use of multiple routers opportunistically uses the multiple PHY Last Link to deliver Last Mile packet in entirely separate trajectories despite utilizing a client with a singular source IP address.
- the identity of the client changes dynamically even though only a single MAC address and PHY connection is used.
- the IP address of the client shown dynamically changes from IP Ci,i to IP Ci,2 to IP Ci,3 while the physical medium remains constant with a source media address MAC Ci,i and a destination address MAC R.
- the data is then routed onward to gateways ⁇ , ⁇ , ⁇ , ⁇ , and Mo,3 in random order as determined by the SDNP signaling servers.
- a second data packet from a client having a dynamically selected source network address IP Ci,2 is sent over multiple routes to a destination IP ⁇ , ⁇ using a multi-PHY Last Link defined by source and destination media addresses MAC Ci,2 and MAC R2.
- a third data packet from a client having a dynamically selected source network address IP Ci,3 is sent over multiple routes to a destination IP Mo,3 using a multi-PHY Last Link defined by source and destination media addresses MAC Ci,3 and MAC R3.
- Camouflaging of the client device IP address and obfuscation of last mile routing by dynamic IP addressing, multi-PHY transport and multi-route transport to multiple gateways can be determined either by the client device or by the signaling server.
- the misdirection process can be achieved using random number generation or other pseudo- random algorithms.
- a key principle is that the routing and transport changes are unpredictable.
- FIG. 52D Two slightly less robust versions of Last Mile data transport of Ethernet packets over multiple routes are shown in FIG. 52D where the left side illustration employs static client addressing and multi-PHY Last Link connectivity while the right side graphics represents dynamic client addressing, also with multi-PHY Last Link connectivity. The difference between these implementations and the multi-PHY versions shown in FIG.
- WiFi wireless communication also can be employed for Last Mile communication between a SDNP client and a SDNP gateway.
- WiFi communication requires a data packet with three or four MAC addresses, two for the radio link, one or two for the wired network connection, specifically using Ethernet data packets.
- FIG. 53 illustrates the same WiFi packet format adapted for SDNP Last Mile and Last Link communication. As an access point applicable for Last Link
- MAC address 1 field 235 for the receiving radio base station or "receiver”
- MAC address 2 field 236 for the transmitting radio base station or "xmitter”
- MAC address 3 field 237 comprising the MAC address of the wired network connection to the WiFi router, i.e. Ethernet or "net”.
- the numerical values of the MAC addresses loaded into the receiver and xmitter data fields depend on the To DS / From DS directional setting to determine (i) is the data packet being received on the radio and forwarded onto Ethernet or (ii) is incoming data on Ethernet being converted into radio communication.
- MAC address 4 data field 239 is optional, used only when the WiFi device is being employed as a radio bridge in "wireless distribution mode". While such a mode may be used in Last Mile communication over long distances as an alternative to cellular or microwave networks, e.g. in the desert, in general the use of a WiFi communication in SDNP Last Mile is generally focused on the Last Link connection to the SDNP client. As such, the following discussion will focus on the access point mode for WiFi routers with the understanding that the SD P techniques herein are equally applicable in wireless distribution mode routing.
- preamble 230 and start frame delimiter SFD 232 contain Layer 1 data for synchronizing the data and device.
- Physical layer convergence procedure PLCP 232 comprises a mix of Layer 1 and Layer 2 information (related packet length, data rates, error checking on the header, etc.).
- the remaining data fields comprise Layer 2 data link information including Frame Control 233 specifying the WiFi version packet type as management, control, reserved, or "data", the type used in delivering SDNP payloads.
- Duration & ID 234 contains the NAV duration unless the WiFi device is in power savings mode, in which case the field includes the station ID.
- NAV or network allocation vector is a virtual carrier-sensing mechanism used for power saving in wireless communication systems.
- the NAV duration can be considered as a counter, counting down to zero at a uniform rate, whereupon it senses the medium to determine if the radio is idle or still communicating. In idle mode, the counter counts the NAV duration repeatedly, checking to determine if any radio communication activity demanding attention is detected.
- Sequence control or "Sequence" field 238 describes the packet sequence and fragment number defining the Layer 2 packet frame.
- Frame check 240 contains a 32-bit CRC checksum of the entire data packet, i.e. a error check data link trailer.
- WiFi payload 241 is a 0B to 2,312B long data field used to cany the WiFi payload.
- this field contains the IP datagram used in Last Mile communication including IP header 434, transport-header 436 and SDNP payload 435
- IP header 434 varies depending on whether the IP datagram follows the IPv4 or IPv6 protocol as determined by protocol field 447 comprising binary 4 or protocol field 448 comprising binary 6.
- Preambles 440 and 444 both contain a transport header flag 470 used to determine the Layer 4 transport method employed, e.g. TCP, UDP or the maintenance functions ICMP and IGMP.
- TCP transport is employed for software and data files, while UDP is employed for real time data such as VoIP and video.
- the length and format of the transport header 436 varies in accordance with transport header flag 470.
- IP header 434 contains IPv4 source and destination addresses 441 and 442 or IPv6 source and destination addresses 445 and 446.
- Last Mile routing of WiFi packets depends both on the IP addresses and the MAC addresses, represented symbolically by the names of the devices to which the IP or MAC address refer to. Sequential Last Mile routing of WiFi packets is shown in the examples of FIG. 54A through FIG. 54D. Each illustration contains two WiFi packets - a top one comprising an IPv4 datagram and a lower one comprising an IPv4 datagram. Because IPv4 and IPv6 use different formats with varying field lengths, the two WiFi packets shown are generally not of the same length even when carrying identical payloads.
- SDNP payload-A travels from SDNP client 1400 to WiFi base station / router 1402W over Last Link 1404 as WiFi radio medium, and by wireline onto router 1402X over BS link 1415. Router 1402X then delivers the data packet across gateway link 1414 to the SDNP gateway 1401.
- a response from the SDNP gateway to the client involves SDNP payload G traveling from SDNP gateway 1401 by wireline over gateway link 1414 to router 1402X, across BL link 1415 to WiFi router 1402W, and across Last Link 1404 to client 1400 using WiFi radio as the communication medium.
- SDNP client has numeric MAC and IP addresses MAC Ci,i and IP Ci,i
- WiFi router 1402W has numeric MAC address MAC W
- router 1402A has numeric MAC addresses MAC R
- SDNP gateway has numeric MAC and IP addresses MAC ⁇ , ⁇ and IP ⁇ , ⁇ .
- the IP addresses of WiFi router 1402W and wireline router 1402X are not required in the Last Mile communication shown.
- FIG. 54A illustrates IPv4 and IPv6 Last Link WiFi packets used for single-PHY radio routing to WiFi router 1402W over Last Link 1404, comprising xmitter MAC address MAC Ci,i, and receiver MAC address MAC W.
- WiFi router 1402W also provides BS link wireline 1415 routing to Ethernet router 1402X with a "net" MAC destination address MAC R.
- Layer 3 network routing comprises only the end devices, i.e. SDNP client 1400 having source IP address IP Ci,i, and SDNP gateway 1401 having destination address IP ⁇ , ⁇ .
- a WiFi packet contains three addresses - a xmitter or source-radio MAC address MAC Ci,i, a receiver or radio- destination MAC address MAC W, and an Ethernet "net” address MAC R.
- the wireline router 1402X acts as the network destination of the WiFi router device.
- the WiFi data packet specifies two mediums, WiFi radio Last Link 1404, and Ethernet wireline BS link 1415.
- FIG. 54B illustrates the corresponding Ethernet packets transporting SDNP payload A over gateway link 1414.
- the source and destination IP addresses remain unchanged as IP Ci,i and IP ⁇ , ⁇ while the MAC source and destination addresses change from their original values to MAC R and MAC ⁇ , ⁇ .
- FIG. 54C illustrates IPv4 and IPv6 Ethernet packets for data transport from SDNP gateway 1401 to wireline based router 1402X over gateway link 1414.
- IP source address 441 contains the network address of the SDNP gateway 1401, i.e. IP ⁇ , ⁇ and IP destination address contains the value IP Ci,i, the client's address.
- the MAC addresses for the gateway link Ethernet packet are MAC ⁇ , ⁇ for the source address 183 and MAC R for the destination MAC address 182.
- FIG. 54D illustrates IPv4 and IPv6 WiFi packets for wireline BS Link 1415 and WiFi radio based Last Link 1404.
- Network Layer 3 routing comprises SDNP gateway 1401 address IP ⁇ , ⁇ and SDNP client address IP Ci,i as source and destination addresses 445 and 446.
- the function of MAC address field 237 labeled "net" changes in
- this field contains the Ethernet MAC address of the wireline source of the radio's incoming data, i.e. the numerical value MAC R of router 1402X sending data packets to the WiFi access point.
- this field defines the Ethernet destination of data received as radio packets and converted into Ethernet packets.
- "net" field 237 contains the same MAC address of router 1402X, i.e. MAC R, for both transmit and receive modes, meaning the WiFi access point uses a single Ethernet router for Last Mile connectivity.
- the wireline router used for routing data packets received by the WiFi access point may be different than the one used for routing data packets to be transmitted by the WiFi access point, i.e. in transmit mode.
- the network MAC address 237 for radio packets in receiver mode may have a numeric MAC address MAC Ri while in transmit mode, the data may be changed to a different router connection MAC R2, meaning the BS link may optionally comprise a directionally dependent multi-PHY implementation.
- Last Link WiFi packets used for single-PHY radio 1404 Last Link routing from WiFi router 1402W to SD P client 1400 contain xmitter MAC address 236 with a numeric value MAC W and receiver MAC address 235 containing numeric value MAC Ci,i.
- the wireline router 1402A acts as the source of data to be transmitted by the WiFi router device.
- the WiFi data packet species two mediums, WiFi radio Last Link 1404, and Ethernet wireline BS link 1415.
- Cellular networks represent another form of wireless communication adaptable for SDNP Last Mile communication.
- Cellular networks re-partition incoming Ethernet packets into radio-specific media access control (MAC) packets.
- Data may be transmitted and received by multiplexing time (TDMA) in, by code division (CDMA), or by spreading the content across multiple sub-channel frequencies (OFDM).
- TDMA multiplexing time
- CDMA code division
- OFDM sub-channel frequencies
- the Layer 2 data packets are stacked across three different levels of embedded service data units or SDUs all within Layer 2; specifically the lowest level comprises the PHY PDU 299 containing the single frame MAC SDU 304 along with MAC header 303 and padding 305 spread across 20 time slots 300 comprising the PHY Layer 1 data.
- MAC SDU 304 in turn contains radio link control or RLC SDU 308.
- Radio link control is a layer 2 protocol used in 3G (UMTS) and 4G/LTE (OFDM) based telephony.
- the function of radio link control is to react to upper layer requests in one of three modes, i.e. acknowledged mode, unacknowledged mode, and transparent mode, as well as to provide error detection, error correction, duplicate detection, and packetizing of data in accordance with specified formats. Packetizing of the data includes concatenation, segmentation, and reassembly of RLC SDUs along with reordering and re-segmentation of RLC data PDUs.
- single frame RLC SDU 308 is unavoidably limited in the duration and data file size available for carrying a payload.
- Single frame RLC SDU 308 must therefore be split into segments and mapped into a different RLC Layer 2 format - multi-frame RLC SDUs 319.
- mapping single-frame RLC SDU 308 into the various K, K+l, K+2 segments 313, 314, 315, etc. of multi -frame RLC SDUs 319 does not occur on a one-to-one basis.
- mapping single-frame RLC SDU 308 ends in the middle of the K+2 segment 315.
- the un-transmitted portion of K+l segment remaining is instead transmitted in a new single-frame RLC SDU 312, but only after allowing padding time 310 needed for radio clock synchronization and after processing RLC header 31 1.
- transmission of data encapsulated in the K+2 slot resumes precisely where it left off as though the data flow was never interrupted.
- 4G is analogous to pausing the playback of a DVD encoded movie in the middle of a DVD chapter, waiting a moment to perform some other functions, and then resuming playback precisely where it was paused.
- no data content is lost and the RF data delivery rate of the cellular system is maximized with no wasted radio bandwidth other than packet overhead (such as PDU headers), and minimal data-rate degradation resulting from clock synchronization padding time 310.
- the multi-frame RLC SDUs 319 encapsulate PDCP PDUs 320 in a one-to-one correspondence with each K segment.
- the ⁇ ⁇ segment 313 carries PDCP header 321 A and an IP payload comprising data 323, the (K+l)" 1 segment 314 carries PDCP header 321B and an IP payload comprising data 324, the (K+2) th segment 315 carries PDCP header 321C and an IP payload comprising data 325, and so on.
- PDCP is an acronym for Packet Data Convergence Protocol as specified in 3G and 4G/LTE communication protocol, performing functions such as compression, encryption, integrity assurance, as well as user and control data transfer.
- PDCP headers vary with the type of data being transported, e.g. user data, control data, etc.
- IP header 434 varies depending on whether the IP datagram follows the IPv4 or IPv6 protocol as determined by protocol field 447 comprising binary 4 or protocol field 448 comprising binary 6.
- Preambles 440 and 444 both contain a transport header flag 470 used to determine the Layer 4 transport method employed, e.g. TCP, UDP or the maintenance functions ICMP and IGMP.
- TCP transport is employed for software and data files, while UDP is employed for real time data such as VoIP and video.
- the length and format of the transport header 436 varies in accordance with transport header bit 470.
- IP header 434 contains IPv4 source and destination addresses 441 and 442 or IPv6 source and destination addresses 445 and 446.
- FIG. 56A illustrates cellular radio 1404 Last Link routing to cell tower and base station 1402Q.
- the RLC PDU defines cellular source media address as MAC Ci,i, the client's device.
- MAC destination field 300B specifies cellular receiver media address as MAC BS describing the cell tower and base station.
- Layer 3 network routing comprises only the Last Mile end devices, i.e. SDNP client 1400 having source IP address IP Ci,i, shown in source data field and SDNP gateway 1401 having destination address IP ⁇ , ⁇ .
- data fields 323, 324, and 325 do not necessarily correspond to specific sections of the IPv6 datagram data payload, where data field 323 includes IP source address 445, IP destination address 446 and a portion of SD P payload A 435 including transport header 436. Data fields 324 and 325 carry the un- transmitted remaining portion of SDNP payload 435.
- FIG. 56B illustrates the data packets for the reply message SDNP payload G over cellular last link 1404 from cell tower and base station 1402Q to a mobile client device 1400 whereby source and destination addresses from the prior data packets have been swapped, namely cellular source media address 300A is loaded with the media address MAC BS, cellular destination media address 300B is set to MAC Ci,i, the client's MAC address, IP source field 445 in the IPV6 datagram is set to IP ⁇ , ⁇ and IP destination field 445 is set to IP Ci,i. Routing between the network router 1402X and cellular tower and base station 1402Q over BS link 1415 uses Ethernet data packets consistent with prior examples.
- Multi-PHY communication over the Last Link may comprise any of the aforementioned media used in various combinations.
- Multi-PHY implementations may comprise multiple wireline connections carrying data at the identical or dissimilar data rates and employing common or distinct Layer 2 protocols such as USB, Ethernet 10BASE-T, 100BASE-T, 1000BASE-T, or DOCSIS3.
- Wireline physical media may comprise Ethernet or USB compliant network cables, coaxial cables, optical fiber, or even twisted-pair copper connections for DSL, albeit at a degraded level of performance.
- Wireless multi-PHY communication may include combinations of WiFi, cellular, satellite, or proprietary radio formats running in the radio frequency and microwave bands.
- Wireless Last Link communication may also include short-range technologies such as Bluetooth or micro-cellular networks such as PHS in Japan.
- Wireless protocols may include cellular formats for 2G, 2.5G, 3G, and 4G/LTE including for example analog, TDMA, GSM, CDMA, UMTS, and OFDM, WiFi protocols such 802.11a, 802.11b, 802. l lg, 802.11 ⁇ , and 802.1 lac, as well as proprietary formats for satellite communication or custom radio links.
- multi-PHY communication shall mean the combination of both OSI physical and data link layers, i.e. Layer 1 and Layer 2 together, and should not be construed as limiting claims to mean Layer 1 physical media exclusively.
- Examples of multi-PHY communication using a common Layer 2 protocol are shown in FIG. 57A including Ethernet, WiFi, and cellular implementations.
- router 27 communicates to desktop computer 36 using two Ethernet cables comprising wired or fiber links 24A and 24B running 100BASE-T and 1000BASE-T respectively.
- desktop 36 is shown running SD P software 1335C.
- WiFi router 100 communicates to notebook 35 over two WiFi channels shown as WiFi links 29A and 29B, the former running 801.1 In protocol over 2.4GHz, and the latter using 802.1 lac to communicate over a 5GHz channel.
- notebook 35 In order to operate in multi-PHY mode, notebook 35 must be enabled to concurrently send and receive signals at multiple frequencies using a multi- band antenna 26B internal to the notebook. Similarly WiFi router must be capable of sending and receiving signals at multiple frequencies concurrently using multi-band antennas 26.
- notebook 35 is shown running SDNP software 1335C.
- cellular base station 17 communicates concurrently over multi-band cellular tower 18A to tablet 39 using two different radio channels comprising cellular links 28A and 28B with corresponding frequencies 1.8GHz and 900MHz.
- the cellular link comprises a 4G/LTE network.
- tablet 39 must be enabled to concurrently send and receive signals at multiple frequencies using an internal multi-band antenna 18B.
- SDNP app 1335A is shown running SDNP app 1335A.
- Such multi-PHY communication using a common Layer 2 protocol confounds cyber attacks because the hacker must gain physical access two different Layer 2 data links each of which may include their own security.
- the client is running SDNP software 1335C, SDNP app 1335A, or SDNP firmware 1335B (not shown)
- the routing of the SDNP payloads across the multi-PHY connections utilizes unique dynamic security credentials rendering real time SDNP packet interception and interpretation too demanding for real-time hacking.
- Examples of multi-PHY communication using mixed Layer 1 media and Layer 2 protocols are shown in FIG. 57B. In these examples, Last Link data is carried using combinations of cellular, WiFi, and satellite systems.
- WiFi router 100 communicates with desktop computer 36 using a combination of 100BASE-T Ethernet wired or fiber link 24B and 802.1 lac WiFi link 29B operating at 5GHz.
- desktop 36 is shown running SD P software 1335C.
- Such an example represents the combination of wireline and wireless communication, where wireless packet sniffing is unable to intercept or observe the wireline data.
- This mixed Ethernet + WiFi multi-PHY Last Link distribution method is particularly well-suited for deploying corporate office networks comprising secure desktop computers within a building or campus communicating to private servers locked in access restricted server rooms.
- cell phone 32 with internal multi-band antenna 18C communicates using two dissimilar wireless techniques.
- WiFi link 29C communicates to WiFi router 100 and antenna 26 using, by example a 802.1 In protocol at 5GHz.
- the second PHY connection, cellular link 28C employs a 1.8GHz carrier running on a 4G/LTE protocol to facilitate Last Link connectivity to cellular tower 25 and to base station 17. Since cell cellular tower 25 and WiFi antenna 26 operate on unrelated systems, this multi-PHY approach completely obscures any relationship between the data packets carried by the multiple physical mediums in the Last Link. To guarantee
- FIG. 57B A similar method to achieve multi-PHY Last Link communication combining cellular and satellite is shown in the bottom illustration of FIG. 57B where satellite / cellular phone 32Z running SDNP app 1335A communicates over two long-distance radio networks - cellular link 28D to cell cellular tower 25 and base station 17 at 1 8GHz, and satellite link 95W to communication satellite 92 at, for example, 1.9GHz. Satellite 92 in turn communicates to terrestrial satellite antenna and base station 92B through wide bandwidth link 95X, not necessarily at the same frequency as client communication.
- FIG. 57C illustrates another variety of multi-PHY communication - multiple physical mediums sharing common protocols but capable of multiple concurrent communication channels using frequency division. Such a system demands a high bandwidth medium in order to operate without severe loading effects, i.e.
- the bottom illustration represents a multi-PHY satellite network where satellite enabled cellular phone 32Z running SDNP app 1335A communicates to communication satellite 92 using multiple carrier bands 95Z formatted with a proprietary communication protocol.
- Communication between satellite 92 and terrestrial satellite antenna and base station 92B uses a trunk line protocol 95X mixing thousands of calls, making identification and interception of a specific call problematic for a hacker while use of multi-PHY communication over multiple bands in the client link 95Z insures
- FIG. 58 Another example of the data packets used in multi-PHY Last Link routing is shown in FIG. 58 where SDNP client 1400 communicates with router 1402 A over two separate PHY connections comprising Ethernet wired or fiber links 24A and 24B running, for example protocols 100BASE-T and 1000BASE-T respectively.
- Router 1402A in turn connects to SDNP gateway 1401 over gateway link 1414.
- Both Ethernet packets define the source IP address 445, i.e. the client device, as IP Ci,i and the destination IP address 446 of the SDNP gateway as IP ⁇ , ⁇ .
- Ethernet packet A, routed over a PHY realized by wired or fiber link 24A includes a MAC destination address 182 comprising MAC R and a MAC source address 183 comprising MAC Ci,i.
- Ethernet packet B routed over a PHY realized by wired or fiber link 24B, includes a MAC destination address 182 comprising MAC R and a different MAC source address 183 comprising MAC Ci,2 defining the alternate PHY connection.
- the change in the source media address from MAC Ci,i to MAC Ci,2 redirects Ethernet communication from the 2.6GHz 100BASE-T connection to the 1000BASE-T connection.
- data packets from SDNP client device 1400 are fragmented and are then apportioned into SDNP payload A and SDNP payload B in accordance with SDNP algorithms and shared secrets. Fragmented data transport across the multi-PHY Last Link occurs with SDNP payload A carried by Ethernet packet A across wired or fiber link 24A and SDNP payload B carried by Ethernet packet B on wired or fiber link 24B.
- FIG. 59 Another example of the data packets used in multi-PHY Last Link routing is shown in FIG. 59 where SDNP client 1400 communicates with WiFi router 1402W over two separate PHY connections comprising WiFi links 29A and 29B using, for example, protocols 802.1 In at 2.4GHz and 802.1 lac at 5GHz, respectively.
- Router 1402W in turn connects to router 1402X over BS link 1415 and router 1402X connects to SDNP gateway 1401 over gateway link 1414.
- Both WiFi packets define the source IP address 445, i.e. the client device, as IP Ci,i and the destination IP address 446 of the SDNP gateway as IP ⁇ , ⁇ .
- WiFi packet A routed over a PHY realized by WiFi link 29A, includes xmitter MAC radio source address 236 comprising MAC Ci,i, MAC radio receiver destination address 235 comprising MAC W, and MAC network destination 237 comprising MAC R.
- WiFi packet B routed over PHY realized by WiFi link 29B includes xmitter MAC radio source address 236 comprising MAC Ci,2, MAC radio receiver destination address 235 comprising MAC W, and MAC network destination 237 comprising MAC R.
- the change in the source media address from MAC Ci,i to MAC Ci,2 redirects the transmission from the 2.6GHz WiFi radio to the 5GHz transceiver.
- data packets from SDNP client device 1400 are fragmented and then apportioned into SDNP payload A and SDNP payload B in accordance with SDNP algorithms and shared secrets. Fragmented data transport across the multi-PHY Last Link occurs with SDNP payload A carried by WiFi packet A across WiFi link 29A and SDNP payload B carried by WiFi packet B on WiFi link 29B.
- FIG. 60 Yet another example of the data packets used in multi-PHY Last Link routing is shown in FIG. 60 where SDNP client 1400 communicates with cell tower 1402Q over two separate PHY connections comprising cellular links 28A and 28B using, for example, protocols 4G/LTE at 1.8GHz and 4G/LTE at 900MHz, respectively.
- Router 1402Q in turn connects to router 1402X over BS link 1415 and router 1402X connects to SDNP gateway 1401 over gateway link 1414.
- Both cellular radio packets define the source IP address 445, i.e. the client device, as IP Ci,i and the destination IP address 446 of the SDNP gateway as IP ⁇ , ⁇ .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
Abstract
Description
Claims
Priority Applications (15)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2019135089A RU2754871C2 (en) | 2017-04-03 | 2018-04-02 | Methods and device for last mile hyper-protected communication |
AU2018249485A AU2018249485B2 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
CN201880037001.XA CN111247773B (en) | 2017-04-03 | 2018-04-02 | Method and apparatus for ultra-secure last-mile communication |
KR1020217035497A KR102465085B1 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
UAA202006658A UA125677C2 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
EP18781684.8A EP3607706A4 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
BR112019020749A BR112019020749A2 (en) | 2017-04-03 | 2018-04-02 | method of transmitting data packets from a client device to the cloud. |
JP2019555116A JP7170661B2 (en) | 2017-04-03 | 2018-04-02 | Method and apparatus for hyper-secure last-mile communication |
KR1020197032459A KR102322191B1 (en) | 2017-04-03 | 2018-04-02 | Methods and devices for secure last mile communication |
KR1020227038524A KR102588164B1 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
CA3062272A CA3062272A1 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
IL269754A IL269754B (en) | 2017-04-03 | 2019-10-02 | Methods and apparatus for hypersecure last mile communication |
ZA2019/07282A ZA201907282B (en) | 2017-04-03 | 2019-11-01 | Methods and apparatus for hypersecure last mile communication |
AU2021258074A AU2021258074B2 (en) | 2017-04-03 | 2021-10-29 | Methods and apparatus for hypersecure last mile communication |
JP2022174074A JP2023011781A (en) | 2017-04-03 | 2022-10-31 | Method and apparatus for hyper-secure last-mile communication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762480696P | 2017-04-03 | 2017-04-03 | |
US62/480,696 | 2017-04-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2018187212A1 true WO2018187212A1 (en) | 2018-10-11 |
WO2018187212A8 WO2018187212A8 (en) | 2018-11-08 |
Family
ID=63713288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2018/025695 WO2018187212A1 (en) | 2017-04-03 | 2018-04-02 | Methods and apparatus for hypersecure last mile communication |
Country Status (13)
Country | Link |
---|---|
EP (1) | EP3607706A4 (en) |
JP (2) | JP7170661B2 (en) |
KR (3) | KR102465085B1 (en) |
CN (1) | CN111247773B (en) |
AU (2) | AU2018249485B2 (en) |
BR (1) | BR112019020749A2 (en) |
CA (1) | CA3062272A1 (en) |
IL (1) | IL269754B (en) |
RU (2) | RU2754871C2 (en) |
SG (1) | SG10202107666RA (en) |
UA (1) | UA125677C2 (en) |
WO (1) | WO2018187212A1 (en) |
ZA (1) | ZA201907282B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110309675A (en) * | 2019-07-05 | 2019-10-08 | 成都信息工程大学 | A system and method for data privacy protection of intelligent networked vehicles without relying on trusted parties |
CN110912717A (en) * | 2019-11-15 | 2020-03-24 | 北京连山时代科技有限公司 | Broadcasting method and server of centerless multi-channel concurrent transmission system |
CN111093208A (en) * | 2019-12-25 | 2020-05-01 | 国网辽宁省电力有限公司沈阳供电公司 | A 5G data backhaul system based on transverse magnetic waves |
CN111107119A (en) * | 2018-10-29 | 2020-05-05 | 杭州海康威视系统技术有限公司 | Data access method, device and system based on cloud storage system and storage medium |
CN111212140A (en) * | 2020-01-02 | 2020-05-29 | 钛马信息网络技术有限公司 | Taxi taking system, taxi taking method and server |
CN112469080A (en) * | 2020-11-27 | 2021-03-09 | 紫光展锐(重庆)科技有限公司 | Data packet processing method and related device |
CN113543075A (en) * | 2020-04-13 | 2021-10-22 | 本田技研工业株式会社 | Vehicle control device, vehicle, recording medium, and vehicle control method |
CN114126087A (en) * | 2021-12-01 | 2022-03-01 | 重庆水利电力职业技术学院 | Method and device for controlling connection between vehicle and multiple terminals |
US11290575B2 (en) | 2020-02-06 | 2022-03-29 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
WO2022092126A1 (en) * | 2020-10-27 | 2022-05-05 | 株式会社Personal AI | Web meeting system capable of confidential conversation |
US11357020B2 (en) | 2020-02-06 | 2022-06-07 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
US11405766B2 (en) | 2020-02-06 | 2022-08-02 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
CN114866487A (en) * | 2022-03-08 | 2022-08-05 | 国网江苏省电力有限公司南京供电分公司 | Mass power grid dispatching data acquisition and storage system |
CN115396240A (en) * | 2022-10-28 | 2022-11-25 | 豪符密码检测技术(成都)有限责任公司 | Method, system and storage medium for luring and detecting state secret SSL protocol |
CN117875271A (en) * | 2024-03-12 | 2024-04-12 | 成都华兴汇明科技有限公司 | Method for converting S2P file into P2D model file and ADS simulation method |
US12278760B2 (en) | 2022-10-27 | 2025-04-15 | Hewlett Packard Enterprise Development Lp | Communication simulation between an access point and an electronic device |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7194258B2 (en) * | 2018-07-10 | 2022-12-21 | リスタット リミテッド | A decentralized cyber-secure privacy network for cloud communications, computing, and global e-commerce |
JP7065444B2 (en) * | 2019-03-14 | 2022-05-12 | パナソニックIpマネジメント株式会社 | Information processing equipment and information processing system |
EP3730441B1 (en) * | 2019-04-26 | 2022-11-09 | KONE Corporation | A solution for generating inspection information of a plurality of signalization elements of an elevator system |
CN111812674B (en) * | 2020-06-08 | 2024-04-05 | 北京经纬恒润科技股份有限公司 | Laser radar simulation method and device |
JP7540207B2 (en) * | 2020-06-09 | 2024-08-27 | 富士フイルムビジネスイノベーション株式会社 | Information processing device and computer program |
CN111970291B (en) * | 2020-08-24 | 2023-06-02 | 成都天奥信息科技有限公司 | Voice communication switching system and very high frequency ground-air simulation radio station distributed networking method |
US11438969B2 (en) * | 2020-09-11 | 2022-09-06 | Rockwell Collins, Inc. | System and method for adaptive extension of command and control (C2) backhaul network for unmanned aircraft systems (UAS) |
CN112364173B (en) * | 2020-10-21 | 2022-03-18 | 中国电子科技网络信息安全有限公司 | An IP address organization traceability method based on knowledge graph |
CN112492588B (en) * | 2020-12-03 | 2022-07-12 | 桂林电子科技大学 | A privacy-preserving routing method for multi-path source node location based on dynamic token |
KR102571495B1 (en) * | 2020-12-21 | 2023-08-28 | 한전케이디엔주식회사 | Security system and method for optical transmission facilities |
CN112804214A (en) * | 2020-12-31 | 2021-05-14 | 四川瑞霆电力科技有限公司 | Perception layer data secure access method and system based on intelligent Internet of things |
US11824961B1 (en) * | 2021-01-25 | 2023-11-21 | Amazon Technologies, Inc. | Independent transport control protocol (TCP) throughput measurement on a client device |
US11816209B1 (en) * | 2021-02-03 | 2023-11-14 | Gen Digital Inc. | Systems and methods for protecting data on devices |
US11706150B2 (en) * | 2021-04-06 | 2023-07-18 | Apple Inc. | Data encoding and packet sharing in a parallel communication interface |
CN113434673B (en) * | 2021-06-24 | 2024-01-19 | 贝壳找房(北京)科技有限公司 | Data processing method, computer readable storage medium, and electronic apparatus |
CN113873516B (en) * | 2021-08-25 | 2023-10-20 | 国网江苏省电力有限公司泰州供电分公司 | High-safety power grid wireless communication system |
CN113472537B (en) * | 2021-09-01 | 2021-11-26 | 深圳市通易信科技开发有限公司 | Data encryption method, system and computer readable storage medium |
US20250112902A1 (en) * | 2022-05-23 | 2025-04-03 | Visa International Service Association | Secure and privacy preserving message routing system |
KR102478924B1 (en) * | 2022-07-26 | 2022-12-20 | (주)비에스파워 | Automatic control system for equipment reinforced network security |
CN117528151B (en) * | 2024-01-04 | 2024-04-05 | 深圳和成视讯科技有限公司 | Data encryption transmission method and device based on recorder |
CN118828065A (en) * | 2024-08-15 | 2024-10-22 | 厦门创匠信息科技股份有限公司 | A method and system for preventing unauthorized downloading of video files |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016003525A2 (en) * | 2014-04-18 | 2016-01-07 | Francis Lambert | System and method for secure data transmission and storage |
WO2016190912A1 (en) * | 2015-01-26 | 2016-12-01 | Adventive Ipbank | Secure dynamic communication network and protocol |
EP3136651A1 (en) * | 2015-08-31 | 2017-03-01 | Comcast Cable Communications, LLC | Network management |
US20170078197A1 (en) * | 2015-09-14 | 2017-03-16 | Citrix Systems, Inc. | Systems and methods of achieving equal distribution of packets in a multicore system which acts as a tunnel end point |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7567510B2 (en) * | 2003-02-13 | 2009-07-28 | Cisco Technology, Inc. | Security groups |
JP2005148956A (en) * | 2003-11-12 | 2005-06-09 | Denso It Laboratory Inc | Method for distributing information and program for information distribution process |
KR100838556B1 (en) * | 2004-03-18 | 2008-06-17 | 콸콤 인코포레이티드 | Efficient transmission of cryptographic information in secure real time protocol |
US7672285B2 (en) * | 2004-06-28 | 2010-03-02 | Dtvg Licensing, Inc. | Method and apparatus for minimizing co-channel interference by scrambling |
US20090028142A1 (en) * | 2007-07-25 | 2009-01-29 | Schmidt Brian K | Streaming data content in a network |
US20090303972A1 (en) * | 2008-06-06 | 2009-12-10 | Silver Spring Networks | Dynamic Scrambling Techniques for Reducing Killer Packets in a Wireless Network |
US8850197B2 (en) * | 2009-07-31 | 2014-09-30 | Futurewei Technologies, Inc. | Optical network terminal management control interface-based passive optical network security enhancement |
CN101651597B (en) * | 2009-09-23 | 2011-06-22 | 北京交通大学 | A Deployment Method of IPSec-VPN in Address Separation Mapping Network |
US9014369B2 (en) * | 2010-02-11 | 2015-04-21 | International Business Machines Corporation | Voice-over internet protocol (VoIP) scrambling mechanism |
WO2011123699A2 (en) * | 2010-03-31 | 2011-10-06 | Orsini Rick L | Systems and methods for securing data in motion |
US8380027B2 (en) * | 2010-05-10 | 2013-02-19 | Intel Corporation | Erasable ion implanted optical couplers |
JP5685161B2 (en) * | 2011-08-19 | 2015-03-18 | 株式会社Nttドコモ | Network architecture, local mobility anchor, and mobility anchor gateway |
CN102377669B (en) * | 2011-10-18 | 2014-12-10 | 华为技术有限公司 | Method for sending message and switch |
US10362158B2 (en) | 2013-01-15 | 2019-07-23 | Habit Analytics PT, LDA | Appliance control system and method |
JP2014230104A (en) * | 2013-05-22 | 2014-12-08 | 株式会社Nttドコモ | Method and apparatus for accessing plural radio bearers |
CN104754634B (en) * | 2013-12-31 | 2018-08-03 | 联芯科技有限公司 | Test the method and its device of multichannel PDN |
-
2018
- 2018-04-02 JP JP2019555116A patent/JP7170661B2/en active Active
- 2018-04-02 CA CA3062272A patent/CA3062272A1/en active Pending
- 2018-04-02 AU AU2018249485A patent/AU2018249485B2/en active Active
- 2018-04-02 UA UAA202006658A patent/UA125677C2/en unknown
- 2018-04-02 CN CN201880037001.XA patent/CN111247773B/en active Active
- 2018-04-02 BR BR112019020749A patent/BR112019020749A2/en unknown
- 2018-04-02 WO PCT/US2018/025695 patent/WO2018187212A1/en unknown
- 2018-04-02 KR KR1020217035497A patent/KR102465085B1/en active Active
- 2018-04-02 KR KR1020227038524A patent/KR102588164B1/en active Active
- 2018-04-02 EP EP18781684.8A patent/EP3607706A4/en active Pending
- 2018-04-02 RU RU2019135089A patent/RU2754871C2/en active
- 2018-04-02 KR KR1020197032459A patent/KR102322191B1/en active Active
- 2018-04-02 RU RU2021125103A patent/RU2021125103A/en unknown
- 2018-04-02 SG SG10202107666RA patent/SG10202107666RA/en unknown
-
2019
- 2019-10-02 IL IL269754A patent/IL269754B/en unknown
- 2019-11-01 ZA ZA2019/07282A patent/ZA201907282B/en unknown
-
2021
- 2021-10-29 AU AU2021258074A patent/AU2021258074B2/en active Active
-
2022
- 2022-10-31 JP JP2022174074A patent/JP2023011781A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016003525A2 (en) * | 2014-04-18 | 2016-01-07 | Francis Lambert | System and method for secure data transmission and storage |
WO2016190912A1 (en) * | 2015-01-26 | 2016-12-01 | Adventive Ipbank | Secure dynamic communication network and protocol |
EP3136651A1 (en) * | 2015-08-31 | 2017-03-01 | Comcast Cable Communications, LLC | Network management |
US20170078197A1 (en) * | 2015-09-14 | 2017-03-16 | Citrix Systems, Inc. | Systems and methods of achieving equal distribution of packets in a multicore system which acts as a tunnel end point |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107119A (en) * | 2018-10-29 | 2020-05-05 | 杭州海康威视系统技术有限公司 | Data access method, device and system based on cloud storage system and storage medium |
CN111107119B (en) * | 2018-10-29 | 2022-08-09 | 杭州海康威视系统技术有限公司 | Data access method, device and system based on cloud storage system and storage medium |
CN110309675B (en) * | 2019-07-05 | 2023-04-07 | 成都信息工程大学 | Intelligent internet vehicle data privacy protection system and method independent of trusted party |
CN110309675A (en) * | 2019-07-05 | 2019-10-08 | 成都信息工程大学 | A system and method for data privacy protection of intelligent networked vehicles without relying on trusted parties |
CN110912717A (en) * | 2019-11-15 | 2020-03-24 | 北京连山时代科技有限公司 | Broadcasting method and server of centerless multi-channel concurrent transmission system |
CN110912717B (en) * | 2019-11-15 | 2020-10-09 | 北京连山时代科技有限公司 | Broadcasting method and server of centerless multi-channel concurrent transmission system |
CN111093208A (en) * | 2019-12-25 | 2020-05-01 | 国网辽宁省电力有限公司沈阳供电公司 | A 5G data backhaul system based on transverse magnetic waves |
CN111212140A (en) * | 2020-01-02 | 2020-05-29 | 钛马信息网络技术有限公司 | Taxi taking system, taxi taking method and server |
US11405766B2 (en) | 2020-02-06 | 2022-08-02 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
US11290575B2 (en) | 2020-02-06 | 2022-03-29 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
US11357020B2 (en) | 2020-02-06 | 2022-06-07 | International Business Machines Corporation | Connecting computer processing systems and transmitting data |
CN113543075A (en) * | 2020-04-13 | 2021-10-22 | 本田技研工业株式会社 | Vehicle control device, vehicle, recording medium, and vehicle control method |
WO2022092126A1 (en) * | 2020-10-27 | 2022-05-05 | 株式会社Personal AI | Web meeting system capable of confidential conversation |
CN112469080A (en) * | 2020-11-27 | 2021-03-09 | 紫光展锐(重庆)科技有限公司 | Data packet processing method and related device |
CN114126087A (en) * | 2021-12-01 | 2022-03-01 | 重庆水利电力职业技术学院 | Method and device for controlling connection between vehicle and multiple terminals |
CN114126087B (en) * | 2021-12-01 | 2023-04-07 | 重庆水利电力职业技术学院 | Method and device for controlling connection between vehicle and multiple terminals |
CN114866487A (en) * | 2022-03-08 | 2022-08-05 | 国网江苏省电力有限公司南京供电分公司 | Mass power grid dispatching data acquisition and storage system |
CN114866487B (en) * | 2022-03-08 | 2024-03-05 | 国网江苏省电力有限公司南京供电分公司 | Massive power grid dispatching data acquisition and storage system |
US12278760B2 (en) | 2022-10-27 | 2025-04-15 | Hewlett Packard Enterprise Development Lp | Communication simulation between an access point and an electronic device |
CN115396240A (en) * | 2022-10-28 | 2022-11-25 | 豪符密码检测技术(成都)有限责任公司 | Method, system and storage medium for luring and detecting state secret SSL protocol |
CN117875271A (en) * | 2024-03-12 | 2024-04-12 | 成都华兴汇明科技有限公司 | Method for converting S2P file into P2D model file and ADS simulation method |
CN117875271B (en) * | 2024-03-12 | 2024-05-31 | 成都华兴汇明科技有限公司 | Method for converting S2P file into P2D model file and ADS simulation method |
Also Published As
Publication number | Publication date |
---|---|
KR102465085B1 (en) | 2022-11-09 |
JP7170661B2 (en) | 2022-11-14 |
AU2018249485B2 (en) | 2021-07-29 |
IL269754A (en) | 2019-11-28 |
KR20210135000A (en) | 2021-11-11 |
WO2018187212A8 (en) | 2018-11-08 |
BR112019020749A2 (en) | 2020-04-28 |
EP3607706A4 (en) | 2020-12-30 |
AU2021258074B2 (en) | 2023-10-05 |
IL269754B (en) | 2022-05-01 |
ZA201907282B (en) | 2021-10-27 |
KR20200002882A (en) | 2020-01-08 |
CN111247773A (en) | 2020-06-05 |
JP2020516198A (en) | 2020-05-28 |
KR20220154248A (en) | 2022-11-21 |
AU2018249485A8 (en) | 2019-11-28 |
EP3607706A1 (en) | 2020-02-12 |
KR102322191B1 (en) | 2021-11-05 |
KR102588164B1 (en) | 2023-10-11 |
UA125677C2 (en) | 2022-05-11 |
RU2019135089A3 (en) | 2021-06-21 |
SG10202107666RA (en) | 2021-08-30 |
CN111247773B (en) | 2022-05-17 |
CA3062272A1 (en) | 2018-10-11 |
RU2021125103A (en) | 2021-09-16 |
AU2018249485A1 (en) | 2019-11-21 |
RU2754871C2 (en) | 2021-09-08 |
JP2023011781A (en) | 2023-01-24 |
AU2021258074A1 (en) | 2021-11-25 |
RU2019135089A (en) | 2021-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2021258074B2 (en) | Methods and apparatus for hypersecure last mile communication | |
US11991788B2 (en) | Methods and apparatus for HyperSecure last mile communication | |
US10491575B2 (en) | Secure dynamic communication network and protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18781684 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019555116 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112019020749 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 3062272 Country of ref document: CA Ref document number: 20197032459 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018781684 Country of ref document: EP Effective date: 20191104 |
|
ENP | Entry into the national phase |
Ref document number: 2018249485 Country of ref document: AU Date of ref document: 20180402 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112019020749 Country of ref document: BR Kind code of ref document: A2 Effective date: 20191002 |