UTILIZING ROUTING FOR SECURE TRANSACTIONS
First Claim
1. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
- transmitting a first message from a first node along a first path to a second node;
transmitting at least one second message from the first node along a second path to the second node; and
determining validity of at least one of the first message and the at least one second message based at least in part on the paths traveled by messages received by the second node.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to methodologies, networks, and nodes for providing secure transaction routing among network components. Network transactions (messages) may be intentionally routed though networks using different paths where the act of following the particular node paths or traversing particular nodes provides a security enhancing feature for the messages. A transaction receiving node will examine the paths taken from a sending node to determine if the paths correspond to predetermined paths to verify the authenticity of the transaction. In some embodiments, predetermined paths may change in a predetermined sequence where the sequence itself becomes a portion of the security feature.
8 Citations
41 Claims
-
1. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
-
transmitting a first message from a first node along a first path to a second node; transmitting at least one second message from the first node along a second path to the second node; and determining validity of at least one of the first message and the at least one second message based at least in part on the paths traveled by messages received by the second node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A network, comprising:
-
a first node; a second node; and a plurality of nodes connectable to form plural paths for communications transactions between said first node and said second node; wherein said first node is configured to transmit a first message and at least one second message along one or more paths through said plurality of nodes to said second node; and wherein said second node is configured to determine validity of at least one said first message and said at least one second message based at least in part on the paths traveled by messages received by the second node. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A node for use in a network environment with one or more similar nodes, comprising:
-
an input/output (I/O) component; a controller component; a communications device; and a memory; wherein said memory contains program logic to cause said controller to validate received data based in part on paths taken by a first message and taken by at least one second message received at said communications device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. Methodology for validating messages transmitted through a network, the network containing plural nodes connectable to form plural paths for communications transactions, comprising:
-
transmitting a first message from a first node along a first path to a second node; and determining validity of the first message based at least in part on the first path traveled by messages received by the second node. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
Specification