Propagating a query in a network
First Claim
1. A method of propagating a query from a querying node to a destination node in a network of connected nodes, wherein the query includes an encryption token, wherein the network of connected nodes comprises at least one node designated as a delay node, wherein certain nodes in the network of connected nodes have been predetermined to be untrusted nodes, wherein the network of connected nodes is a network of hardware nodes, and wherein the method comprises:
- transmitting, by one or more processors, the query from the querying node to one or more connected nodes in the network of connected nodes;
designating one or more nodes, from said one or more connected nodes, as delay nodes, wherein only untrusted nodes are designated as the delay nodes, and wherein said delay nodes apply delays to the query before retransmitting the query to other nodes from said one or more connected nodes;
receiving, by one or more processors, the query from one or more of the delay nodes at each node from said one or more connected nodes;
in response to said each node, from said one or more connected nodes, receiving the query for a first time, said each node retransmitting the query from said each node to another one or more nodes from said one or more connected nodes;
attempting, by each node that receives the query, to decrypt the encryption token;
designating, by one or more processors, each node that fails to decrypt the encryption token as one of the untrusted nodes that are required to apply a delay to the query prior to retransmitting the query to another node in the network of connected nodes; and
repeatedly receiving and retransmitting the query at other nodes from said one or more connected nodes until the query is received at the destination node.
1 Assignment
0 Petitions
Accused Products
Abstract
A query is propagated from a querying node to a destination node in a network of connected nodes, where at least one node is designated as a delay node. A query is transmitted from the querying node to one or more connected nodes in the network of connected nodes. One or more nodes, from the one or more connected nodes, are designated as delay nodes, wherein delay nodes apply delays to the query before retransmitting the query to other nodes from the one or more connected nodes. Upon receiving the query, each node, from the one or more connected nodes, retransmits the query to another one or more nodes from the one or more connected nodes. The query is repeatedly received and retransmitted by the connected nodes until the query is received at the destination node.
-
Citations
12 Claims
-
1. A method of propagating a query from a querying node to a destination node in a network of connected nodes, wherein the query includes an encryption token, wherein the network of connected nodes comprises at least one node designated as a delay node, wherein certain nodes in the network of connected nodes have been predetermined to be untrusted nodes, wherein the network of connected nodes is a network of hardware nodes, and wherein the method comprises:
-
transmitting, by one or more processors, the query from the querying node to one or more connected nodes in the network of connected nodes; designating one or more nodes, from said one or more connected nodes, as delay nodes, wherein only untrusted nodes are designated as the delay nodes, and wherein said delay nodes apply delays to the query before retransmitting the query to other nodes from said one or more connected nodes; receiving, by one or more processors, the query from one or more of the delay nodes at each node from said one or more connected nodes; in response to said each node, from said one or more connected nodes, receiving the query for a first time, said each node retransmitting the query from said each node to another one or more nodes from said one or more connected nodes; attempting, by each node that receives the query, to decrypt the encryption token; designating, by one or more processors, each node that fails to decrypt the encryption token as one of the untrusted nodes that are required to apply a delay to the query prior to retransmitting the query to another node in the network of connected nodes; and repeatedly receiving and retransmitting the query at other nodes from said one or more connected nodes until the query is received at the destination node. - View Dependent Claims (2, 3, 4)
-
-
5. A system for propagating a query, the system comprising:
-
a hardware querying node, wherein the hardware querying node transmits a query; one or more hardware connected nodes communicatively coupled to the hardware querying node; one or more hardware delay nodes, wherein said one or more hardware delay nodes are nodes from said one or more hardware connected nodes that have been designated to apply delays to the query before retransmitting the query to other nodes from said one or more hardware connected nodes, and wherein certain hardware nodes in the network of connected nodes have been predetermined to be untrusted hardware nodes, and wherein only the untrusted hardware nodes are designated as the hardware delay nodes; and a hardware destination node communicatively coupled to said one or more hardware connected nodes, wherein said one or more hardware connected nodes receive the query from the hardware querying node, and wherein; the query is received from one or more of the hardware delay nodes at each node from said one or more hardware connected nodes; in response to said each node, from said one or more hardware connected nodes, receiving the query for a first time, said each node retransmits the query from said each node to another one or more nodes from said one or more hardware connected nodes; and the query is repeatedly received and retransmitted at other nodes from said one or more hardware connected nodes until the query is received at the hardware destination node; wherein the query includes an encryption token, and wherein each node that receives the query performs an attempt to decrypt the encryption token, and wherein each node that is unable to perform the attempt is designated as one of the untrusted hardware nodes and is required to apply a delay prior to retransmitting the query in response to the decryption attempt failing. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for propagating a query from a querying node to a destination node in a network of connected nodes, wherein the query includes an encryption token, wherein at least one node is designated as a delay node, wherein the network of connected nodes is a network of hardware nodes, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
-
transmitting the query from the querying node to one or more connected nodes in the network of connected nodes, wherein certain nodes from the one or more connected nodes have been predetermined to be untrusted nodes; designating one or more nodes, from said one or more connected nodes, as delay nodes, wherein only untrusted nodes are designated as the delay nodes, and wherein said delay nodes apply delays to the query before retransmitting the query to other nodes from said one or more connected nodes; receiving the query from one or more of the delay nodes at each node from said one or more connected nodes; in response to said each node, from said one or more connected nodes, receiving the query for a first time, said each node retransmitting the query from said each node to another one or more nodes from said one or more connected nodes; attempting, by each node that receives the query, to decrypt the encryption token; designating each node that fails to decrypt the encryption token as one of the untrusted nodes that are required to apply a delay to the query prior to retransmitting the query to another node in the network of connected nodes; and repeatedly receiving and retransmitting the query at other nodes from said one or more connected nodes until the query is received at the destination node. - View Dependent Claims (10, 11, 12)
-
Specification