×

Secure routing based on the physical locations of routers

  • US 9,178,894 B2
  • Filed: 03/15/2013
  • Issued: 11/03/2015
  • Est. Priority Date: 11/18/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure data transmission of at least one data packet through a plurality of network nodes, the method comprising:

  • defining, by at least one user, a source network node and a destination network node, wherein the source network node and the destination network node are in the plurality of network nodes;

    defining, by the at least one user, at least one security constraint, wherein at least one of the at least one security constraint is based on a physical geographical location of at least one of the network nodes, wherein the at least one security constraint is at least one of;

    the at least one data packet is routed through network nodes that are physically located within at least one specified geographic region, or through network nodes that are not physically located within the at least one specified geographic region,the at least one data packet is routed through network nodes that can have their physical locations authenticated by using at least one of;

    satellite geolocation techniques, network ping ranging measurements, or triangulation methods,if any network nodes are unable to have their physical locations authenticated, the at least one data packet can be routed through such network nodes if the at least one data packet is encrypted while the at least one data packet passes through such network nodes, andthe at least one data packet travels from the source network node to the destination network node on a route that has a length less than a threshold distance;

    comparing, by at least one processor, available network nodes in a map of the network nodes with the at least one security constraint to determine which of the available network nodes are qualified network nodes, wherein the qualified network nodes are the available network nodes that meet the at least one security constraint, wherein the map of the network nodes comprises at least one of;

    information regarding whether any of the network nodes are physically located within the at least one specified geographic region, or are not physically located within the at least one specified geographic region,information regarding whether the physical location of any of the network nodes can be authenticated by using at least one of;

    satellite geolocation techniques, network ping ranging measurements, or triangulation methods,information regarding whether any of the network nodes can encrypt or decrypt data packets, andinformation regarding whether any of the network nodes have been determined to be qualified network nodes;

    determining, by the at least one processor, a route comprising at least one of the qualified network nodes to route the at least one data packet through from the source network node to the destination network node, wherein any of the network nodes that does not meet the at least one security constraint is removed from consideration, and wherein the route comprises a network path that is optimized both for efficiency and security based on a requirement that the at least one security constraint is met by the at least one qualified network node; and

    transmitting the at least one data packet from the source network node to the destination network node through the optimal route comprising the at least one qualified network node.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×