METHODS AND SYSTEMS FOR DATA TRAFFIC CONTROL AND ENCRYPTION
First Claim
Patent Images
1. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for data traffic control, the method comprising:
- receiving data traffic from a first node to be sent to a second node;
determining the health of an encryption pathway between the first node and the second; and
sending the data traffic to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and programming for data traffic control and encryption. In one example, data traffic is received from a first node to be sent to a second node. The health of an encryption pathway between the first node and the second node is determined. The data traffic is sent to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy.
40 Citations
42 Claims
-
1. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for data traffic control, the method comprising:
-
receiving data traffic from a first node to be sent to a second node; determining the health of an encryption pathway between the first node and the second; and sending the data traffic to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy. - View Dependent Claims (2, 3)
-
-
4. A system having at least one processor, storage, and a communication platform connected to a network for data traffic control, the system comprising:
-
a health checking module configured to determine the health of an encryption pathway between a first node and a second node; and a routing module configured to send data traffic received from the first node to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy. - View Dependent Claims (5, 6)
-
-
7. A non-transitory machine-readable medium having information recorded thereon for data traffic control, wherein the information, when read by the machine, causes the machine to perform the following:
-
receiving data traffic from a first node to be sent to a second node; determining the health of an encryption pathway between the first node and the second; and sending the data traffic to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy.
-
-
8. A system for data traffic control comprising:
-
means for determining the health of an encryption pathway between a first node and a second node; and means for sending data traffic received from the first node to the second node over the network without going through the encryption pathway when the encryption pathway is not healthy.
-
-
9. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the method comprising:
-
encrypting first data at a first node; sending the encrypted first data to a second node over the network through an encryption pathway; decrypting the encrypted first data to generate second data at the second node; encrypting the second data at the second node; sending the encrypted second data to the first node over the network through the encryption pathway; decrypting the encrypted second data to generate third data at the first node; and comparing the first data with the third data at the first node to determine the health of the encryption pathway between the first node and the second node. - View Dependent Claims (10, 11)
-
-
12. A system having at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the system comprising:
-
a first encrypting module of a first node configured to encrypt first data; a first routing module of the first node configured to send the encrypted first data to a second node over the network through an encryption pathway; a second decrypting module of the second node configured to decrypt the encrypted first data to generate second data; a second encrypting module of the second node configured to encrypt the second data; a second routing module of the second node configured to send the encrypted second data to the first node over the network through the encryption pathway; a first decrypting module of the first node configured to decrypt the encrypted second data to generate third data; and a comparing module of the first node configured to compare the first data with the third data at the first node to determine the health of the encryption pathway between the first node and the second node. - View Dependent Claims (13, 14)
-
-
15. A non-transitory machine-readable medium having information recorded thereon for encryption pathway health check, wherein the information, when read by the machine, causes the machine to perform the following:
-
encrypting first data at a first node; sending the encrypted first data to a second node over the network through an encryption pathway; decrypting the encrypted first data to generate second data at the second node; encrypting the second data at the second node; sending the encrypted second data to the first node over the network through the encryption pathway; decrypting the encrypted second data to generate third data at the first node; and comparing the first data with the third data at the first node to determine the health of the encryption pathway between the first node and the second node.
-
-
16. A system for encryption pathway health check comprising:
-
means for encrypting first data at a first node; means for sending the encrypted first data to a second node over the network through an encryption pathway; means for decrypting the encrypted first data to generate second data at the second node; means for encrypting the second data at the second node; means for sending the encrypted second data to the first node over the network through the encryption pathway; means for decrypting the encrypted second data to generate third data at the first node; and means for comparing the first data with the third data at the first node to determine the health of the encryption pathway between the first node and the second node.
-
-
17. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the method comprising:
-
receiving encrypted first data from a node over the network through an encryption pathway; decrypting the encrypted first data to generate second data; encrypting the second data; and sending the encrypted second data to the node over the network through the encryption pathway. - View Dependent Claims (18)
-
-
19. A system having at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the system comprising:
-
a routing module configured to receive encrypted first data from a node over the network through an encryption pathway; a decrypting module configured to decrypt the encrypted first data to generate second data; and an encrypting module configured to encrypt the second data, wherein the routing module sends the encrypted second data to the node over the network through the encryption pathway. - View Dependent Claims (20)
-
-
21. A non-transitory machine-readable medium having information recorded thereon for encryption pathway health check, wherein the information, when read by the machine, causes the machine to perform the following:
-
receiving encrypted first data from a node over the network through an encryption pathway; decrypting the encrypted first data to generate second data; encrypting the second data; and sending the encrypted second data to the node over the network through the encryption pathway.
-
-
22. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the method comprising:
-
encrypting first data; sending the encrypted first data to a node over the network through an encryption pathway; receiving encrypted second data from the node over the network through the encryption pathway, wherein the second data is decrypted from the encrypted first data; decrypting the encrypted second data to generate third data; and comparing the first data with the third data to determine the health of the encryption pathway to the node. - View Dependent Claims (23, 24)
-
-
25. A system having at least one processor, storage, and a communication platform connected to a network for encryption pathway health check, the system comprising:
-
an encrypting module configured to encrypt first data; a routing module configured to send the encrypted first data to a node over the network through an encryption pathway and receive encrypted second data from the node over the network through the encryption pathway, wherein the second data is decrypted from the encrypted first data; a decrypting module configured to decrypt the encrypted second data to generate third data; and a comparing module configured to compare the first data with the third data to determine the health of the encryption pathway to the node. - View Dependent Claims (26, 27)
-
-
28. A non-transitory machine-readable medium having information recorded thereon for encryption pathway health check, wherein the information, when read by the machine, causes the machine to perform the following:
-
encrypting first data; sending the encrypted first data to a node over the network through an encryption pathway; receiving encrypted second data from the node over the network through the encryption pathway, wherein the second data is decrypted from the encrypted first data; decrypting the encrypted second data to generate third data; and comparing the first data with the third data to determine the health of the encryption pathway to the node.
-
-
29. A method implemented on at least one machine each of which has at least one processor, storage, and a communication platform connected to a network for data traffic encryption, the method comprising:
-
providing a first encryption key to a first node and a second node; providing a second encryption key to the first node and the second node, wherein the second encryption key is encrypted based on the first encryption key when it is provided to the first and second nodes; and establishing between the first node and the second node an encryption pathway through which the first node and the second node communicate via the second encryption key. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A system having at least one processor, storage, and a communication platform connected to a network for data traffic encryption, the system comprising:
-
a key generating module configured to provide a first encryption key and a send encryption key to a first node and a second node, wherein the second encryption key is encrypted based on the first encryption key when it is provided to the first and second nodes; and a data traffic module configured to establish between the first node and the second node an encryption pathway through which the first node and the second node communicate via the second encryption key. - View Dependent Claims (36, 37, 38, 39, 40)
-
-
41. A non-transitory machine-readable medium having information recorded thereon for data traffic encryption, wherein the information, when read by the machine, causes the machine to perform the following:
-
providing a first encryption key to a first node and a second node; providing a second encryption key to the first node and the second node, wherein the second encryption key is encrypted based on the first encryption key when it is provided to the first and second nodes; and establishing between the first node and the second node an encryption pathway through which the first node and the second node communicate via the second encryption key.
-
-
42. A system for data traffic encryption comprising:
-
means for providing a first encryption key and a second encryption key to a first node and a second node, wherein the second encryption key is encrypted based on the first encryption key when it is provided to the first and second nodes; and means for establishing between the first node and the second node an encryption pathway through which the first node and the second node communicate via the second encryption key.
-
Specification