Stealth packet switching
First Claim
1. A method for transferring information structures, comprising the steps of:
- assembling a first information structure;
modifying said first information structure to violate information structure rules, thereby forming a second modified information structure; and
transferring said second modified information structure with rule violations.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical stealth-enabled networks using specially modified packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets to have a low probability of detection, a low probability of interception, and a low probability of interpretation. Stealth packets are only detected, intercepted, and correctly interpreted by stealth-enabled network equipment. In its simplest form, stealth packet switching modifies the packet structure, protocols, timing, synchronization, and other elements through various rule-violations. This creates stealth packets, which normal equipment cannot receive correctly, and hence normal equipment discards the stealth packets. Stealth packets may be further enhanced with encryption techniques which focus on encrypting the packet structure itself, as opposed to merely encrypting the data. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques. Combining stealth packets with time-based reservation packet switching enables total encryption of the packet (including header and preamble encryption) capable of routing through multiple hops without decryption of headers and preamble at each hop. Time-based reservation packet switching can also guarantee real-time stealth packet delivery through a network that is totally congested from data storms, virus caused congestion, and/or denial of service attacks.
86 Citations
20 Claims
-
1. A method for transferring information structures, comprising the steps of:
-
assembling a first information structure;
modifying said first information structure to violate information structure rules, thereby forming a second modified information structure; and
transferring said second modified information structure with rule violations. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network system for transferring information structures, comprising:
-
one or more first network elements capable of transferring one or more information structures in accordance with one or more information structure rule violations;
one or more second network elements capable of receiving and correctly deconstructing said one or more information structures in accordance with said one or more information structure rule violations;
a communications medium between said one or more first network elements and said one or more second network elements for transferring said one or more information structures in accordance with said one or more information structure rule violations. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A device for transferring information structures with rule violations, comprising:
-
one or more output sections for transferring one or more information structures with one or more information structure rule violations; and
a policy manager, wherein said policy manager implements said one or more information structure rule violations for said one or more information structures in said one or more output sections. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification