摘要:
A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of the plurality of nodes of the first one of the plurality of groups different from the first one of the plurality of groups using a group key and initiates encrypted communication between a third one of the plurality of nodes of the first one of the plurality of groups and a fourth one of the plurality of nodes of a second one of the plurality groups different from the first one of the plurality of groups using a session key.
摘要:
A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of the plurality of nodes of the first one of the plurality of groups different from the first one of the plurality of groups using a group key and initiates encrypted communication between a third one of the plurality of nodes of the first one of the plurality of groups and a fourth one of the plurality of nodes of a second one of the plurality groups different from the first one of the plurality of groups using a session key.
摘要:
A device-implemented network with domains each having nodes, the nodes of each of the domains sharing network information with one another according to an intra-domain communication policy. An inter-domain protocol is configured to control communication between at least one of the nodes of one of the domains and at least one of the nodes of a different one of the domains. A broker is configured to be communicatively coupled to the nodes and configured to control communication according to the inter-domain protocol and to which all of the nodes of each of the plurality of domains are configured to send the network information.
摘要:
Methods, networks and nodes for dynamically establishing encrypted communications between a first node having a first identification and a first private key and a second node having a second identification and a second private key. A first signal comprising information indicative of the first identification of the first node is transmitted, then, upon receipt of the first signal by the second node, a second signal comprising information indicative of the second identification of the second node and a first portion of a symmetric key is transmitted, then, upon receipt of the second signal by the first node, a third signal comprising a second portion of the symmetric key is transmitted.
摘要:
A device implemented, carrier independent packet delivery universal addressing networking protocol for communication over a network between network nodes utilizing a packet. The protocol has an IP stack having layers. At least some of the layers have privacy preserving source node attribution and network admission control. The packet is admitted to the network only if a source node of the network nodes admits the packet.
摘要:
A device-implemented network with domains each having nodes, the nodes of each of the domains sharing network information with one another according to an intra-domain communication policy. An inter-domain protocol is configured to control communication between at least one of the nodes of one of the domains and at least one of the nodes of a different one of the domains. A broker is configured to be communicatively coupled to the nodes and configured to control communication according to the inter-domain protocol and to which all of the nodes of each of the plurality of domains are configured to send the network information.
摘要:
A device implemented, carrier independent packet delivery universal addressing networking protocol for communication over a network between network nodes utilizing a packet. The protocol has an IP stack having layers. At least some of the layers have privacy preserving source node attribution and network admission control. The packet is admitted to the network only if a source node of the network nodes admits the packet.