Geolocating network nodes in attenuated environments for cyber and network security applications
First Claim
1. A system for verifying network nodes in attenuated environments for cyber and network security applications, the system comprising:
- the network nodes, wherein the network nodes comprise;
an origination network node;
a destination network node; and
at least one router network node;
wherein the origination network node and the destination network node are connected to each other via the at least one router network node,wherein the origination network node is configured to transmit a data packet to the destination network node through the at least one router network node, andwherein the data packet contains a security signature portion, a routing data portion, and a payload data portion,wherein at least one of the network nodes receives at least one resultant signal from at least one transmission source,wherein the security signature portion comprises information that is obtained from the at least one resultant signal,wherein the information is used to verify a location of at least one of the network nodes,wherein the at least one transmission source is at least one of a satellite, a pseudo-satellite, and a terrestrial transmission source.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing.
-
Citations
28 Claims
-
1. A system for verifying network nodes in attenuated environments for cyber and network security applications, the system comprising:
-
the network nodes, wherein the network nodes comprise; an origination network node; a destination network node; and at least one router network node; wherein the origination network node and the destination network node are connected to each other via the at least one router network node, wherein the origination network node is configured to transmit a data packet to the destination network node through the at least one router network node, and wherein the data packet contains a security signature portion, a routing data portion, and a payload data portion, wherein at least one of the network nodes receives at least one resultant signal from at least one transmission source, wherein the security signature portion comprises information that is obtained from the at least one resultant signal, wherein the information is used to verify a location of at least one of the network nodes, wherein the at least one transmission source is at least one of a satellite, a pseudo-satellite, and a terrestrial transmission source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for verifying network nodes in attenuated environments for cyber and network security applications, the method comprising:
-
transmitting, with an origination network node, a data packet to a destination network node through at least one router network node, wherein the origination network node and the destination network node are connected to each other via the at least one router network node, wherein the network nodes comprise the origination network node, the destination network node, and the at least one router network node, wherein the data packet contains a security signature portion, a routing data portion, and a payload data portion; receiving, by at least one of the network nodes, at least one resultant signal from at least one transmission source, wherein the security signature portion comprises information that is obtained from the at least one resultant signal; and verifying, a location of at least one of the network nodes by using the information, wherein the at least one transmission source is at least one of a satellite, a pseudo-satellite, and a terrestrial transmission source. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A network node device for cyber and network security applications, the device comprising:
-
a receiver, wherein the receiver is to receive a signal from at least one signal source, wherein the at least one signal source is at least one of a satellite, a pseudo-satellite, and a terrestrial transmission source; and a processor, wherein the processor is to append information as a security signature onto data packets, which are routed through the network node device, wherein the information is related to the signal, and wherein the information is used to verify a location of the network node device.
-
-
25. An authentication system for cyber and network security applications, the system comprising:
-
a network node device, wherein the network node device comprises; a receiver that is to receive a signal from at least one signal source, and a processor that is to append information as a security signature onto data packets, which are routed through the network node device, wherein the information is related to the signal, wherein the at least one signal source is at least one of a satellite, a pseudo-satellite, and a terrestrial transmission source; and a processing device, wherein the processing device is to authenticate the network node device when verifying a location of the network node device by using the information. - View Dependent Claims (26, 27, 28)
-
Specification