Security modes for a routing table distributed across multiple mesh nodes
First Claim
Patent Images
1. A method, comprising:
- receiving, by a first node of a distributed mesh, a DRT flood message from a second node of the distributed mesh, wherein the first node stores a local portion of a Distributed Routing Table (DRT), the DRT being distributed across the mesh for determining addresses of individual nodes of the mesh, wherein the DRT is configured to implement a set of one or more DRT security modes allowing the DRT to be configured with one or more security settings for the mesh;
storing a security identification (ID) for the first node, the security ID for the first node having a first issuer;
determining a security identification (ID) for the second node, the security ID for the second node having a second issuer;
comparing the second issuer of the security ID for the second node with the first issuer of the security ID for the first node;
when the second issuer matches the first issuer;
authenticating the DRT flood message; and
updating the local portion of the DRT stored on the first node with a key or IP address included in the DRT flood message received from the second node; and
when the second issuer does not match the first issuer, failing the DRT flood message.
2 Assignments
0 Petitions
Accused Products
Abstract
A mesh is joined by a node, wherein the mesh includes a Distributed Routing Table (DRT) for determining addresses of nodes in the mesh. A DRT message is processed in accordance with a security mode of the DRT.
17 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a first node of a distributed mesh, a DRT flood message from a second node of the distributed mesh, wherein the first node stores a local portion of a Distributed Routing Table (DRT), the DRT being distributed across the mesh for determining addresses of individual nodes of the mesh, wherein the DRT is configured to implement a set of one or more DRT security modes allowing the DRT to be configured with one or more security settings for the mesh; storing a security identification (ID) for the first node, the security ID for the first node having a first issuer; determining a security identification (ID) for the second node, the security ID for the second node having a second issuer; comparing the second issuer of the security ID for the second node with the first issuer of the security ID for the first node; when the second issuer matches the first issuer; authenticating the DRT flood message; and updating the local portion of the DRT stored on the first node with a key or IP address included in the DRT flood message received from the second node; and when the second issuer does not match the first issuer, failing the DRT flood message. - View Dependent Claims (2, 3, 12, 13, 14, 15, 16)
-
-
4. One or more computer readable storage media including computer readable instructions that when executed by a computing device perform operations comprising:
-
receiving a security identification (ID) from a security ID service; executing an application for use with a peer-to-peer mesh comprising a Distributed Routing Table (DRT) for determining addresses of nodes of the peer-to-peer mesh, wherein the DRT is configured to implement a set of DRT security modes allowing the DRT to be configured with DRT security settings for the peer-to-peer mesh, and wherein the application is pre-programmed with at least one of the DRT security settings; and processing a DRT message, from an individual node of the peer-to-peer mesh or joining the peer-to-peer mesh, in accordance with at least one of the DRT security modes using the security ID, wherein the at least one DRT security mode provides access to at least part of the DRT based on whether the DRT message is authenticated. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A peer-to-peer mesh, comprising:
-
a plurality of nodes, wherein individual nodes store corresponding portions of a Distributed Routing Table (DRT) as local DRTs, and wherein the DRT is configured to implement a set of DRT security modes; and a first security module corresponding to a first node of the plurality of nodes, wherein the first security module is configured to operate in accordance with at least one DRT security mode of the set of DRT security modes by; receiving a DRT message from a second node of the plurality of nodes; comparing a security identification (ID) of the first node with a security ID of the second node; when issuers of the security ID of the first node and the security ID of the second node match, authenticating the DRT message and accessing the local DRT for the first node, based on the DRT message; and failing the DRT message when the issuers of the security IDs of the first node and the second node do not match. - View Dependent Claims (17, 18, 19, 20)
-
Specification