Secure Routing Based on the Physical Locations of Routers
First Claim
1. A method for secure data transmission of at least one data packet through a plurality of network nodes, the method comprising:
- defining, by at least one user, a source network node and a destination network node, wherein the source network node and the destination network node are in the plurality of network nodes;
defining, by the at least one user, at least one security constraint, wherein the at least one security constraint is based on a physical location of at least one of the network nodes;
comparing, by at least one processor, available network nodes in a map of the network nodes with the at least one security constraint to determine which of the available network nodes are qualified network nodes,wherein the qualified network nodes are the available network nodes that meet the at least one security constraint;
determining, by the at least one processor, a route comprising at least one of the qualified network nodes to route the at least one data packet through from the source network node to the destination network node; and
transmitting the at least one data packet from the source network node to the destination network node through the route comprising the at least one qualified network node.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and apparatus for secure routing based on the physical location of routers are disclosed herein. The disclosed method for secure data transmission of at least one data packet through a plurality of network nodes involves defining a source network node, a destination network node, and at least one security constraint, which is based on the physical location of at least one of the network nodes. The method further involves comparing available network nodes with the security constraint(s) to determine which of the available network nodes meet the security constraint(s) and, thus, are qualified network nodes. Additionally, the method involves determining a route comprising at least one of the qualified network nodes to route the data packet(s) through from the source network node to the destination network node. Further, the method involves transmitting the data packet(s) through the route of the qualified network node(s).
-
Citations
21 Claims
-
1. A method for secure data transmission of at least one data packet through a plurality of network nodes, the method comprising:
-
defining, by at least one user, a source network node and a destination network node, wherein the source network node and the destination network node are in the plurality of network nodes; defining, by the at least one user, at least one security constraint, wherein the at least one security constraint is based on a physical location of at least one of the network nodes; comparing, by at least one processor, available network nodes in a map of the network nodes with the at least one security constraint to determine which of the available network nodes are qualified network nodes, wherein the qualified network nodes are the available network nodes that meet the at least one security constraint; determining, by the at least one processor, a route comprising at least one of the qualified network nodes to route the at least one data packet through from the source network node to the destination network node; and transmitting the at least one data packet from the source network node to the destination network node through the route comprising the at least one qualified network node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for secure data transmission of at least one data packet through a plurality of network nodes, the method comprising:
-
defining, by at least one user, a source network node and a destination network node, wherein the source network node and the destination network node are in the plurality of network nodes; defining, by the at least one user, at least one security constraint, wherein the at least one security constraint is based on a physical location of at least one of the network nodes; encoding, by at least one processor, the at least one security constraint into the at least one data packet; determining, by the source network node, which available network nodes connected to the source network node are qualified network nodes, wherein the qualified network nodes are the available network nodes that meet the at least one security constraint; transmitting, by the source network node, the at least one data packet to one of the qualified network nodes; determining, by any network node that receives the at least one data packet, which available network nodes connected to the network node that receives the at least one data packet are qualified network nodes; and transmitting, by any network node that receives the at least one data packet, the at least one data packet to one of the qualified network nodes, wherein the at least one data packet is transmitted in a route from the source network node to the destination network node through the qualified network nodes. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification