Camouflage of network traffic to resist attack
First Claim
Patent Images
1. An apparatus for transmitting a file through a network, the apparatus comprising:
- a file-splitting processor for splitting a file into a plurality of message segments and assigning one of a plurality of final different destination addresses to each segment, each of the plurality of final different destination addresses being assigned to a single receiving host; and
a message segment transmitter for transmitting the plurality of message segments to the receiving host using the plurality of final different destination addresses.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus for transmitting a file with enhanced transmission security through a network includes a file-splitting processor that splits the file into a plurality of message segments and addresses the plurality of message segments to a plurality of addresses assigned to a receiving host. The apparatus includes a message segment transmitter for transmitting the plurality of message segments to the receiving host.
1714 Citations
32 Claims
-
1. An apparatus for transmitting a file through a network, the apparatus comprising:
-
a file-splitting processor for splitting a file into a plurality of message segments and assigning one of a plurality of final different destination addresses to each segment, each of the plurality of final different destination addresses being assigned to a single receiving host; and a message segment transmitter for transmitting the plurality of message segments to the receiving host using the plurality of final different destination addresses. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for transmitting a file through a network, the apparatus comprising:
-
a file-splitting processor for splitting the file into a plurality of message segments and assigning one of a plurality of different initial source addresses to each message segment of the plurality of message segments, each initial source address being assigned to a single source host, thereby disguising the origin of the file; and a message segment transmitter for transmitting the plurality of message segments to a receiving host. - View Dependent Claims (7)
-
-
8. A method for securely transmitting a file through a network, the method comprising:
-
(a) at a source host, splitting the file into a plurality of message segments; (b) addressing, at the source host, each message segment of the plurality of message segments using one of a plurality of different final destination addresses, each of the different final destination addresses being assigned to a single receiving host; and (c) transmitting the plurality of message segments to the receiving host with the plurality of different final destination addresses. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of securely transmitting a file through a network, the method comprising:
-
(a) splitting the file into a plurality of message segments at a source host; (b) at the source host, assigning one initial source address of a plurality of different initial source addresses to each message segment of the plurality of message segments, each of the different initial source addresses being assigned to the source host, thereby disguising the origin of the file; and (c) transmitting the plurality of message segments. - View Dependent Claims (28)
-
-
29. A method for securely transmitting a file through a network, the method comprising:
-
(a) splitting the file into a plurality of message segments, each message segment comprising; (i) one of a plurality of different final destination specifiers, each of the final destination specifiers being attributed to a single final destination host; (ii) encrypted protocol information; and (iii) encrypted message data; (b) receiving a message segment at a receiving host; (c) decrypting the message data to determine the final destination host; (d) encrypting the message data in accordance with an encryption protocol accessible to the final destination host; (e) transmitting the encrypted message segment to the final destination host; and (f) repeating steps (a)ā
(e) for other message segments, thereby facilitating recovery of the message by the final destination host. - View Dependent Claims (30, 31, 32)
-
Specification