Utilizing routing for secure transactions
First Claim
1. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
- selecting first and second paths according to a rotating sequence of routing paths between a first node and a second node;
receiving a first message from the first node along a first path to the second node;
receiving at least one second message from the first node along a second path to the second node;
determining validity of at least one of the first message and the at least one second message based at least in part on the paths traveled by messages received by the second node, wherein determining the validity comprises comparing the paths taken by the first message and the at least one second message to determine whether the paths correspond to predetermined paths consistent with the rotating sequence of routing paths; and
requesting reauthentication from the first node for messages arriving by paths other than the predetermined paths.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to methodologies, networks, and nodes for providing secure transaction routing among network components. Network transactions (messages) may be intentionally routed though networks using different paths where the act of following the particular node paths or traversing particular nodes provides a security enhancing feature for the messages. A transaction receiving node will examine the paths taken from a sending node to determine if the paths correspond to predetermined paths to verify the authenticity of the transaction. In some embodiments, predetermined paths may change in a predetermined sequence where the sequence itself becomes a portion of the security feature.
44 Citations
33 Claims
-
1. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
-
selecting first and second paths according to a rotating sequence of routing paths between a first node and a second node; receiving a first message from the first node along a first path to the second node; receiving at least one second message from the first node along a second path to the second node; determining validity of at least one of the first message and the at least one second message based at least in part on the paths traveled by messages received by the second node, wherein determining the validity comprises comparing the paths taken by the first message and the at least one second message to determine whether the paths correspond to predetermined paths consistent with the rotating sequence of routing paths; and requesting reauthentication from the first node for messages arriving by paths other than the predetermined paths. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network, comprising:
-
a first node; a second node; and a plurality of nodes connectable to form plural paths for communications transactions between said first node and said second node; wherein said first node is configured to transmit a first message and at least one second message along one or more paths through said plurality of nodes to said second node and wherein said second node is configured to request reauthentication from said first node for messages arriving by paths other than predetermined paths; and wherein said second node is configured to determine validity of at least one of said first message and said at least one second message based at least in part on the paths traveled by messages received by the second node, and wherein said second node determines validity of said messages based at least in part on a number of hops in the paths traveled by messages received by the second node. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A node for use in a network environment with one or more other nodes, comprising:
-
an input/output (I/O) component; a controller component; a communications device; and a memory; wherein said memory contains program logic to cause said controller to; negotiate with other nodes to establish a rotating sequence of routing paths to be used for communications therebetween; compare paths taken by a first message and at least one second message to determine whether the paths correspond to predetermined paths consistent with the rotating sequence of routing paths; validate received data based in part on paths taken by the first message and taken by the at least one second message received at said communications device, wherein the validation is based at least in part on the comparing; and request re-authentication from a transmitting node for messages arriving by paths other than the predetermined paths. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
-
selecting first and second paths according to a rotating sequence of routing paths between a first node and a second node; transmitting a first message from the first node along the first path to the second node; determining validity of the first message based at least in part on the first path, a number of hops in the first path, and consistency of the first path within the rotating sequence of routing paths; and requesting reauthentication from a transmitting node for messages determined to be invalid. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
-
selecting first and second paths according to a rotating sequence of routing paths between a first node and a second node; receiving a first message from the first node along a first path to the second node; receiving at least one second message from the first node along a second path to the second node; and determining validity of at least one of the first message and the at least one second message based at least in part on the paths traveled by messages received by the second node, wherein determining the validity comprises comparing the paths taken by the first message and the at least one second message to determine whether the paths correspond to predetermined paths consistent with the rotating sequence of routing paths; wherein the plural nodes negotiate between each other the rotating sequence of routing paths to be used for communications therebetween.
-
Specification