US20220052957A1 - Secure communication routing for remote devices - Google Patents

Secure communication routing for remote devices Download PDF

Info

Publication number
US20220052957A1
US20220052957A1 US16/990,180 US202016990180A US2022052957A1 US 20220052957 A1 US20220052957 A1 US 20220052957A1 US 202016990180 A US202016990180 A US 202016990180A US 2022052957 A1 US2022052957 A1 US 2022052957A1
Authority
US
United States
Prior art keywords
wheat
packets
chaff
packet portion
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/990,180
Other versions
US11265255B1 (en
Inventor
Brandon Sloane
Regina Yee Cadavid
Gloria Joo
Jinyoung Nathan Kim
Nia Mack
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of America Corp filed Critical Bank of America Corp
Priority to US16/990,180 priority Critical patent/US11265255B1/en
Assigned to BANK OF AMERICA CORPORATION reassignment BANK OF AMERICA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JOO, GLORIA, CADAVID, REGINA YEE, KIM, JINYOUNG NATHAN, MACK, NIA, SLOANE, BRANDON
Publication of US20220052957A1 publication Critical patent/US20220052957A1/en
Application granted granted Critical
Publication of US11265255B1 publication Critical patent/US11265255B1/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/34Flow control; Congestion control ensuring sequence integrity, e.g. using sequence numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to a security system, and more particularly to a security system that allows a system to send communications and obfuscate the sending entity, receiving entity, and/or the routing of the communication without encryption.
  • typical communications are encrypted utilizing a session key. Only the parties with the session key are able to read the communications, the sending entities, the receiving entities, and/or the routing of the communications. Should any party have access to the session key, the parties can review the communications, the sending entities, the receiving entities, and/or the routing of the communications that were encrypted using the session key.
  • a security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication.
  • the packets for the communications are sent over the network in clear text, which are readable by any systems on the network; however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.
  • a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.
  • the packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature).
  • a pre-shared key e.g., a wheat signature or a chaff signature.
  • the wheat packets for the communication may include the actual datagram packet, IP packet, and routing packet.
  • the chaff packets for the communication may include the imitation datagram packet, IP packet, and/or routing packet.
  • anyone of the chaff datagram packet, IP packets, and/or routing packets may include imitation sending entity, receiving entity, and/or routing information in order to obfuscate the actual sending entity, receiving entity, and/or routing information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing.
  • Embodiments of the invention comprise systems, computer implemented methods, and computer program products for securely sending communications using a plurality of packets.
  • the invention comprises creating one or more wheat packets for a communication, each of the one or more wheat packets comprise a wheat datagram packet portion, a wheat IP packet portion, and a wheat routing packet portion.
  • a wheat signature is attached to at least one field within the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion, wherein the wheat signature is created using a pre-shared key.
  • One or more chaff packets are utilized for the communication, each of the one or more chaff packets comprise a chaff datagram packet portion, a chaff IP packet portion, and a chaff routing packet portion, and wherein a chaff signature is attached to at least one field within the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion.
  • the plurality of packets which comprise the one or more wheat packets and the one or more chaff packets, are routed through one or more hosts.
  • the one or more hosts receive the plurality of packets for the communication.
  • the one or more processing devices of the one or hosts are configured to execute computer readable code to determine a validated signature for each of the plurality of packets.
  • the one or more chaff packets are identified when the at least one field of the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion has the chaff signature that fails to meet the validated signature.
  • the one or more wheat packets are identified when the at least one field of the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion meets the validated signature. Thereafter a routing is determined for the one or more wheat packets.
  • One or more other systems are prevented from determining a sending entity, a receiving entity, or the routing for the communication without identifying the one or more wheat packets or the one or more chaff packets from the plurality of packets using the validated signature.
  • the invention further comprises receiving the pre-shared key for the communications.
  • determining the validated signature comprises replicating a received signature for the plurality of packets, wherein the received signature is the chaff signature of the one or more chaff packets or the wheat signature of the one or more wheat packets.
  • the received signature comprises a message authentication code (MAC), and wherein replicating the MAC comprises using the pre-shared key and an algorithm to create the validated signature.
  • MAC message authentication code
  • the algorithm is a pre-shared algorithm that is shared with the system for the communications.
  • replicating the received signature further comprises using at least a portion of the plurality of packets to determine the validated signature.
  • one or more wheat signatures are attached to at least two of the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
  • one or more chaff signatures are attached to at least two of the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
  • one or more wheat signatures are attached to the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
  • one or more chaff signatures are attached to the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is a sequence number field of the wheat datagram packet portion or the chaff datagram packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is an acknowledgement field of the wheat datagram packet portion or the chaff datagram packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is one or more flag fields of the wheat datagram packet portion or the chaff datagram packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is a checksum field of the wheat datagram packet portion or the chaff datagram packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is an identification of the wheat IP packet portion or the chaff IP packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is one or more flags of the wheat IP packet portion or the chaff IP packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is a header checksum of the wheat IP packet portion or the chaff IP packet portion.
  • the at least one field to which the wheat signature or the chaff signature is attached is a field of the wheat routing packet portion or the chaff routing packet portion.
  • the one or more embodiments comprise the features hereinafter described and particularly pointed out in the claims.
  • the following description and the annexed drawings set forth certain illustrative features of the one or more embodiments. These features are indicative, however, of but a few of the various ways in which the principles of various embodiments may be employed, and this description is intended to include all such embodiments and their equivalents.
  • FIG. 1 illustrates a block system diagram of a network security system, in accordance with some embodiments of the present disclosure.
  • FIG. 2 illustrates a network environment for providing secure communications without encryption over the network, in accordance with some embodiments of the present disclosure.
  • FIG. 3 illustrates a cross-network environment for providing secure communications without encryption on potentially unsecure networks, in accordance with some embodiments of the present disclosure.
  • FIG. 4 illustrates a process flow for providing secure communications without encryption from potentially unsecure networks, in accordance with some embodiments of the present disclosure.
  • FIG. 5 illustrates a process flow for obfuscating an actual receiving entity, sending entity, and/or routing for the communication without encryption, in accordance with some embodiments of the present disclosure.
  • FIG. 6 illustrates an example datagram packet portion, in accordance with some embodiments of the present disclosure.
  • FIG. 7 illustrates an example IP packet portion, in accordance with some embodiments of the present disclosure.
  • FIG. 8 illustrates an example routing packet portion, in accordance with some embodiments of the present disclosure.
  • a security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication.
  • the packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.
  • a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network using a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.
  • the security system may provide for obfuscating the sending entities, receiving entities, and/or routings (e.g., host entities that are routing the communication and the path through which the communication is sent) without the need to encrypt the sending entities, receiving entities, and/or routings.
  • the packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature).
  • the wheat packets for the communication may include the actual datagram packet, IP packet, and routing packet.
  • the chaff packets for the communication may include the imitation datagram packet, IP packet, and/or routing packet.
  • anyone of the chaff datagram packet, IP packets, and/or routing packets may include imitation sending entity, receiving entity, and/or routing information in order to obfuscate the actual sending entity, receiving entity, and/or routing information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing.
  • FIG. 1 illustrates a network security system environment 1 , in accordance with embodiments of the present disclosure.
  • one or more organization systems 10 are operatively coupled, via a network 2 , to one or more user computer systems 20 , one or more security systems 30 , one or more third-party systems 40 , and/or one or more other systems (not illustrated).
  • the security systems 30 in coordination with the user computer systems 20 and/or other systems on the network may be utilized to create secure communications over the network 2 without the need to encrypt all or a majority of the communications between the systems on the network 2 .
  • the security systems 30 and/or other systems described herein may utilize security signatures (e.g., keys, MACs, algorithms, and/or the like) attached to packets to allow a receiving system to identify the valid packets for a communication.
  • security systems 30 and/or other systems e.g., user computer systems 20
  • the one or more keys and the one or more algorithms may be utilized to create message authentication codes (MACs) for each of the packets being sent, in particular, wheat packets, as will be discussed herein.
  • MACs message authentication codes
  • chaff packets e.g., unrelated real packets, imitation packets, combinations thereof, or the like
  • wheat packets e.g., real packets, or the like
  • Any receiving system must be able to identify the security signature in order to determine what packets are wheat packets to determine the communication, receiving entity, sending entity, and/or routing, and what packets are chaff packets that should be discarded.
  • each receiving system may have the key (e.g., pre-shared key) and the one or more algorithms in order to determine what MAC attached to a packet is valid, and thus, identify what packets are wheat packets and what are chaff packets that can be discarded (e.g., a technique that may be described as winnowing).
  • the wheat packets can then be identified as the legitimate communication.
  • the communication may be broken up into a plurality of wheat packets before the security signature is added, and as such, the receiving system may also have to reassemble the plurality of wheat packets together in order to identify the communications. While security is achieved through keys, algorithms, splitting packets, or the like, the messages themselves, the sending entity, the receiving entity, and/or routings are sent over the network 2 without any encryption, as will be described in further detail herein.
  • the communications may include any type of communication such as, but not limited to, communication related to a computer system trying to access a network, communications between segmented computer systems within a network trying to communicate with other computer systems within the same segment, computer systems trying to communication with systems on other networks, or the like.
  • the communications may relate to interactions, accessing data, running applications, sending messages, or the like, as will be discussed in further detail herein.
  • the network 2 may be a global area network (GAN), such as the Internet, a wide area network (WAN), a local area network (LAN), or any other type of network or combination of networks.
  • GAN global area network
  • the network 2 may provide for wireline, wireless, or a combination of wireline and wireless communication between systems, services, components, and/or devices on the network 2 .
  • the one or more organization systems 10 generally comprise one or more communication components 12 , one or more processing components 14 , and one or more memory components 16 .
  • the one or more processing components 14 are operatively coupled to the one or more communication components 12 and the one or more memory components 16 .
  • the term “processing component” generally includes circuitry used for implementing the communication and/or logic functions of a particular system.
  • a processing component may include a digital signal processor component, a microprocessor component, and various analog-to-digital converters, digital-to-analog converters, and other support circuits and/or combinations of the foregoing. Control and signal processing functions of the system are allocated between these processing components according to their respective capabilities.
  • the one or more processing components may include functionality to operate one or more software programs based on computer-readable instructions thereof, which may be stored in the one or more memory components.
  • the one or more processing components 14 use the one or more communication components 12 to communicate with the network 2 and other components on the network 2 , such as, but not limited to, the components of the one or more user computer systems 20 , the one or more security systems 30 , the one or more third-party systems 40 , and/or the one or more other systems (not illustrated).
  • the one or more communication components 12 generally comprise a wireless transceiver, modem, server, electrical connection, electrical circuit, or other component for communicating with other components on the network 2 .
  • the one or more communication components 12 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors, or the like.
  • USB Universal Serial Bus
  • the one or more organization systems 10 comprise computer-readable instructions 18 stored in the one or more memory components 16 , which in some embodiments includes the computer-readable instructions 18 of the one or more organization applications 17 (e.g., secure website application, secure dedicated application, or the like).
  • the one or more memory components 16 include one or more data stores 19 for storing data related to the one or more organization systems 10 , including, but not limited to, data created, accessed, and/or used by the one or more organization applications 17 .
  • the organization may be an entity that administers, controls, or regulates the network 2 , user computer systems 20 , the security systems 30 , and/or the third-party systems 40 . It should be understood that the users 4 , third-parties, and organizations may all be referred to herein as entities.
  • users 4 may communicate with each other over the network 2 as will be described in further detail herein.
  • the security system 30 may be used to secure the communications over the network 2 and/or in some embodiments each of the systems on the network 2 may include a portion of the security systems 30 and/or application 37 thereof, such as an agent that may communicate with each of the computer systems or be located, at least partially (or entirely), on each of the computer systems 20 .
  • the user 4 may be a user that is communicating with other users on the network 4 through the use of the user computer systems 20 .
  • the user 4 may be representing himself/herself in a communication, a user 4 representing a third-party in an interaction, a user 4 that acts on behalf of the organization, a user 4 that acts on behalf of the security system 30 , and/or the like. Consequently, the one or more users 4 may be individual users and/or employees, agents, representatives, officers, or the like of any entity on the network 2 .
  • the network 2 may be a network of an organization (e.g., a business) and the users 4 are the employees, agents, officers, or the like of the business.
  • the user computer systems 20 may communicate with each other, the one or more organization systems 10 , the one or more security systems 30 , the one or more third-party systems 40 , and/or other systems (not illustrated).
  • the one or more user computer systems 20 may be a desktop, laptop, tablet, mobile device (e.g., smartphone device, or other mobile device), or any other type of computer that generally comprises one or more communication components 22 , one or more processing components 24 , and one or more memory components 26 .
  • the one or more processing components 24 are operatively coupled to the one or more communication components 22 , and the one or more memory components 26 .
  • the one or more processing components 24 use the one or more communication components 22 to communicate with the network 2 and other components on the network 2 , such as, but not limited to, the one or more organization systems 10 , the one or more security systems 30 , the one or more third-party systems 40 , and/or the other systems (not illustrated).
  • the one or more communication components 22 generally comprise a wireless transceiver, modem, server, electrical connection, or other component for communicating with other components on the network 2 .
  • the one or more communication components 22 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors and the like. Moreover, the one or more communication components 22 may include a keypad, keyboard, touch-screen, touchpad, microphone, mouse, joystick, other pointer component, button, soft key, and/or other input/output component(s) for communicating with the users 4 .
  • USB Universal Serial Bus
  • the one or more user computer systems 20 may have computer-readable instructions 28 stored in the one or more memory components 26 , which in some embodiments includes the computer-readable instructions 28 for user applications 27 , such as dedicated applications (e.g., apps, applet, or the like), portions of dedicated applications, a web browser or other apps that allow access to applications located on other systems, or the like.
  • the one or more memory components 26 include one or more data stores 29 for storing data related to the one or more user computer systems 20 , including, but not limited to, data created, accessed, and/or used by the one or more user computer systems 20 .
  • the user application 27 may use the applications of the one or more organization systems 10 , the one or more security systems 30 , the one or more third-party systems 40 , and/or one or more other systems (not illustrated) in order to communicate with other systems on the network and take various actions in a secure way without having to encrypt all or the majority of the communications, sending entities, receiving entities, and/or routing over the network 2 .
  • one or more security systems 30 may be utilized by the one or more organization systems 10 , the one or more user computer systems 20 , the one or more third party systems 40 , and/or other systems to aid in providing secure communications without requiring encryption of all or most of the communications. That is, the security system 30 may be utilized in order to create, store, manage or the like the keys (e.g., pre-shared keys, such as global keys, segmentation keys, specific communication keys, or the like) and/or the algorithms (e.g., MAC algorithms used to create the MACs), and/or communicate with the systems (e.g., the agents thereon, or the like) on the network 2 to facilitate the secure communications.
  • the keys e.g., pre-shared keys, such as global keys, segmentation keys, specific communication keys, or the like
  • the algorithms e.g., MAC algorithms used to create the MACs
  • the one or more security systems 30 are operatively coupled, via a network 2 , to the one or more organization systems 10 , the one or more user computer systems 20 , the one or more third-party systems 40 , and/or the other systems (not illustrated).
  • the one or more security systems 30 generally comprise one or more communication components 32 , one or more processing components 34 , and one or more memory components 36 .
  • the one or more processing components 34 are operatively coupled to the one or more communication components 32 , and the one or more memory components 36 .
  • the one or more processing components 34 use the one or more communication components 32 to communicate with the network 2 and other components on the network 2 , such as, but not limited to, the components of the one or more organization systems 10 , the one or more user computer systems 20 , the one or more third-party systems 40 , and/or the one or more other systems (not illustrated).
  • the one or more communication components 32 generally comprise a wireless transceiver, modem, server, electrical connection, or other component for communicating with other components on the network 2 .
  • the one or more communication components 32 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors and the like.
  • USB Universal Serial Bus
  • the one or more security systems 30 may have computer-readable instructions 38 stored in the one or more memory components 36 , which in one embodiment includes the computer-readable instructions 38 of one or more security applications 37 .
  • the one or more memory components 36 include one or more data stores 39 for storing data related to the one or more security systems 30 , including, but not limited to, data created, accessed, and/or used by the one or more security applications 37 .
  • the one or more security applications 37 may allow for creating, storing, managing, or the like of the keys (e.g., pre-shared keys, such as global keys, segmentation keys, communication keys, or the like) and/or the one or more algorithms (e.g., MAC algorithms, or the like), and/or communicate with the systems (e.g., the agents thereon, or the like) on the network 2 to facilitate the secure communications.
  • the one or more security systems 30 may be operated by the organization (e.g., be one of the one or more organization systems 10 ), or may be operated by a third-party on behalf of the organization.
  • the one or more third-party systems 40 are operatively coupled to the one or more organization systems 10 , the one or more user computer systems 20 , the one or more security systems 30 , and/or the one or more other systems, through the network 2 .
  • the one or more third-party systems 40 , and/or other like systems have components the same as or similar to the components described with respect to the one or more organization systems 10 , the one or more user computer systems 20 , and/or the one or more security systems 30 (e.g., one or more communication components, one or more processing components, and one or more memory devices with computer-readable instructions of one or more third-party applications, one or more datastores, or the like).
  • the one or more third-party systems 40 communicate with the one or more organization systems 10 , the one or more user computer systems 20 , the one or more security systems 30 , and/or each other in same or similar way as previously described with respect to the one or more organization systems 10 , the one or more user computer systems 20 , and/or the one or more security systems 30 .
  • the one or more third-party systems 40 may comprises the systems and applications that are trying to access the network 2 (e.g., as authorized parties, unauthorized parties, or the like). As such, in some embodiments the third-parties may be unauthorized third-parties that are trying to misappropriate communications between authorized systems on the network 2 .
  • the third-parties are authorized to access the network 2 for various reasons (e.g., to perform maintenance, enter interactions, support the organization systems or the like).
  • the third-parties may be external systems on external secure networks that aid in allowing authorized users 4 (e.g., users that are located outside of the network 2 , such as out of the country) to access the network 2 from abroad.
  • the one or more other systems may include the systems, and components thereof, for allowing communications between the systems (e.g., intermediaries that act as gateways, APIs, or the like to allow communication between the systems).
  • intermediaries that act as gateways, APIs, or the like to allow communication between the systems.
  • FIG. 2 illustrates a network environment 100 in which multiple entity computer systems (e.g., user computer systems 20 ), and entities (e.g., users 4 ) associated therewith, communicate with each other and other systems, including, but not limited to the security systems 30 , the organization systems 10 , or the like.
  • entity computer systems e.g., user computer systems 20
  • entities e.g., users 4
  • the communications between the systems 20 may be secured communications, as will be described in further detail below.
  • the network environment 200 may be any type of network 2 , such as an internal network, external network, cross-organizational network, or any type of network of entity computer systems.
  • the network may be a single network; however, in some embodiments while the network is a single network, it may have two or more segmented networks that may be regulated based on signatures (e.g., MAC that are created and identified using keys and/or algorithms) attached to packets.
  • signatures e.g., MAC that are created and identified using keys and/or algorithms
  • the system may not be able to communicate with other systems on the network (e.g., the system may not be able to create signatures that other systems can validate and/or the system may not be able to read signatures created by other systems on the network 2 ).
  • signatures e.g., MAC that are created and identified using keys and/or algorithms
  • the network 2 may comprise a first entity computer system 20 a , a second entity computer system 20 b , a third entity computer system 20 c , a fourth entity computer systems 20 d , up to an n th entity computer system 20 n .
  • the computer systems 20 a to 20 n th may correspond with entities, such as a first user 4 a , a second user 4 b , a third user 4 c , a fourth user 4 d , an nth user 4 n , or the like.
  • the systems may send and receive secure communications using wheat packets and chaff packets.
  • the present disclosure provides an improved way for sending communications between systems in secure way in order to restrict unauthorized third-party systems from accessing the network 2 , and if they gain access to the system, to restrict such third-party systems from being able to intercept and identify the correct communication, sending party, receiving party, and/or routing to misappropriate the communications (e.g., content, metadata, or other information that may be identified from the packets.
  • the present disclosure provides an improved way to allow for external users (e.g., travelers) to other countries operating outside of the network 2 (e.g., home network) to access the network 2 from an external unsecured network and to communicate with the systems on the network 2 .
  • the users 4 operating on an unsecured network 3 may send communications through a remote secure network 5 , which in addition to using wheat packets and chaff packets, may also obfuscate the sending entity, the receiving entity, and/or the routing of the packets.
  • a remote secure network 5 which in addition to using wheat packets and chaff packets, may also obfuscate the sending entity, the receiving entity, and/or the routing of the packets.
  • the present disclosure also allows for providing segmentation of the systems on the network 2 using different signatures (e.g., different keys and/or algorithms) to only allow sub-sets of the systems on the network 2 to communicate with each other.
  • the present invention utilizes and expands upon a chaffing communication technique that is utilized to provide confidential communication between systems on a network 2 .
  • Communication between systems may involve the sending systems creating and/or sending packets to the receiving system.
  • the packets may comprise wheat packets (e.g., authorized packets, valid packets, or the like) and chaff packets (e.g., unauthorized packets, imitation packets, or the like), and the receiving system authenticates the signatures on the packets and separates the chaff packets from the wheat packets.
  • the wheat packets may include the actual communication (e.g., message, process instructions, file, data, or the like) and/or portions thereof, while the chaff packets are the imitation communication and/or portions thereof.
  • the packets are sent with authentication in form of a signature.
  • the signature may be any type of secure signature that may be used to determine the packets that are wheat packets, how to assemble the wheat packets (if necessary), and/or what and/or how to use one or more keys and/or one or more algorithms (if necessary) in order to read the packets.
  • the signature may be an MAC that is created using a key (e.g., a pre-shared key), a MAC algorithm, and in some embodiments the packet itself (e.g., content of the communication, serial number of the wheat packets, both of the forgoing, and/or the like).
  • the key and at least a portion of the packet are inputs into the MAC algorithm, and the output of the MAC algorithm is the MAC that is attached to the wheat packet.
  • the security system 30 and/or individual agents (e.g., pre-loaded applications, or portions thereof) that are located on each system, may be responsible for creating the wheat packets with the signature (e.g., authorized signature) and the chaff packets with an imitation signature, as will be described herein in further detail.
  • the receiving system may use the signature in order to determine what packets are wheat packets and what packets are chaff packets that can be discarded.
  • a receiving computer system receiving the packets e.g., wheat packets, chaff packets, sub-portions thereof, or the like
  • packet is determined to be a wheat packet.
  • the packet is a chaff packet and is discarded.
  • any entity on the system can read any packet (e.g., the packet is not encrypted, hidden, or the like), such as the communication content, the receiving entity, the sending entity, and/or the routing; however, the receiving system can only identify the correct packets based on validating the signature attached to each packet (e.g., recreating the MAC signature).
  • the chaff packets may be chaff packets generated (e.g., made up) by the sending computer systems or the security system 30 .
  • the chaff packets may be past or current wheat packets that were used for other communications outside of the present communication.
  • unrelated wheat packets the systems are not required to generate chaff packets for the communications, which may reduce processing capacity and/or memory requirements, as well as increase processing speeds.
  • the chaff packets may look like the wheat packets (e.g., correct format, have serial numbers, and have content, or the like), but the chaff packets have imitation signatures (e.g., MACs, or the like) that are not valid and cannot be recreated using the correct key and/or the correct algorithm (e.g., the pre-shared key and pre-shared algorithm).
  • imitation signatures e.g., MACs, or the like
  • the communications described herein may further include separating the packets (e.g., wheat and/or chaff packets) into multiple wheat packets (e.g., sub-wheat packets, or the like) which are each individually authenticated by adding the signature (e.g., MACs, or the like) to each of the sub-wheat packets.
  • the separated sub-wheat packets may include serial numbers, which may function to both create the signature (e.g., the MACs), as well as allow the receiving system to reassemble the sub-wheat packets into the full wheat packet in the proper order.
  • the receiving system may use the signature of the multiple wheat packets (e.g., sub-wheat packets), as previously discussed herein, to identify the multiple wheat packets, remove the chaff packets with imitation signatures, and reassemble the multiple wheat packets (e.g., sub-wheat packets) into the full wheat packet in order to read the communication.
  • the signature of the multiple wheat packets e.g., sub-wheat packets
  • the receiving system may use the signature of the multiple wheat packets (e.g., sub-wheat packets), as previously discussed herein, to identify the multiple wheat packets, remove the chaff packets with imitation signatures, and reassemble the multiple wheat packets (e.g., sub-wheat packets) into the full wheat packet in order to read the communication.
  • FIG. 3 provides a secure remote network environment 300 , in which users 4 (e.g. a first user 4 a , a second user 4 b , or the like, such as a traveler) may try to access the network 2 (e.g., a home network 2 ), from a remote network, such as an unsecured network 3 (e.g., a first unsecured network 3 , a second unsecured network 3 ).
  • the users e.g., a first user 4 a , a second user 4 b , or the like
  • may be traveling away from the home network 2 but may want to communicate with the home network 2 .
  • the users 4 may try to communicate with the home network 2 directly from the unsecured networks 3 using the chaff packets as previously described herein.
  • the security systems and techniques previously described herein may be utilized in order to allow for secure communication from a user 4 (e.g., a first user 4 a , a second user 4 b , or the like) trying to communicate with the network 2 (e.g., home network) from another network (e.g., from a first unsecured network 3 , a second unsecured network 3 , or the like).
  • the user computer system 20 may be preloaded with the agent application to utilize one or more wheat packets and one or more chaff packets in order to send communications to the home network 2 .
  • the secure remote network environment 300 may also utilize a remote secure network 5 through which all of the remote users 4 will connect to send communications back to the home network 2 .
  • the remote secure network 5 may provide one or more relays (e.g., host receiving systems) through which communications may be routed.
  • the remote secure network 5 directs the one or more wheat packets and the one or more chaff packets through multiple relays (e.g., the same or different routings) in order to hide not only the communication using the chaff packets described herein, but from which networks the communication originated and to which networks the communications are to be routed, as will be discussed in further detail herein with respect to FIG. 4 .
  • FIG. 4 provides a process flow for providing secure communications from remote networks 3 (e.g., potentially unsecured networks 3 ) outside of the network 2 (e.g., home network 2 ) without encryption of the packets used for the communication.
  • each of the systems 20 of the users 4 that will be communicating with the network 2 (e.g., home network 2 ) from remote networks 3 may be updated with an agent application.
  • the agent application may include a pre-shared key.
  • the agent application of each of the systems 20 that will communicate with the network 2 (e.g., home network 2 ) from a remote network 3 may also have a pre-shared algorithm or at least an indication to utilize a type of algorithm to create signatures for the communications.
  • the pre-shared key and algorithm may be utilized by the users 4 to communicate with the home network 2 from a remote network 3 .
  • a sending system creates a plurality of packets for a communication with other systems, such as a receiving system on a home network 2 , while the sending system is using a remote network 3 (e.g., a potentially unsecured network 3 ).
  • the packets may contain the content of the communication, packet information (e.g., packet identifiers, or the like), the systems to which the packets are to be sent (e.g., receiving entity, sending entity, and/or routing hosts), or other like information.
  • the plurality of packets created by the sending system may comprise the one or more wheat packets and the one or more chaff packets, as previously described herein.
  • the one or more wheat packets are the actual packets for the communication.
  • the wheat packets for a communication may be split up into a plurality of wheat packets in order to improve the security of the communication.
  • the one or more chaff packets may comprise imitation packets that look like wheat packets, real packets for an unrelated communication (e.g., wheat packets for past or current unrelated communications on the network 2 ), or the like.
  • the agent application on the sending system creates the one or more chaff packets
  • the sending system may use a chaff packet algorithm (e.g., imitation packet generation, or the like).
  • the legitimate packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • Block 130 of FIG. 4 further illustrates that the sending system attaches a wheat signature to each of the one or more wheat packets.
  • the wheat signature may be created using the pre-shared key and the known algorithm (e.g., a pre-shared algorithm or pre-identified algorithm). Additionally, a section of the which packet, such as the content of the wheat packet, a serial number of the wheat packet, or the like, may also be used by the pre-shared algorithm to create the signature.
  • Each signature created is attached to each wheat packet (e.g., different signatures are used on each wheat packet, or the like).
  • FIG. 4 further illustrates in block 140 that the one or more chaff signatures are attached to the one or more chaff packets.
  • the chaff signatures may be imitation signatures that are similar to the wheat signatures (e.g., same length of characters, or the like) and are attached to the imitation chaff packets.
  • the chaff signatures may comprise a modification of the original wheat signatures that are attached to the original wheat packets for other unrelated communications, which are now being used as chaff packets for the present communication.
  • the signature for the chaff packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • the wheat packets and the chaff packets are sent to the one or more systems, such as the receiving systems on the home network 2 .
  • the wheat packets and the chaff packets are sent directly from the unsecured networks 3 , on which the users 4 are located, to the home network 2 (e.g., in some embodiments using relays of other networks).
  • the unsecured network 3 is unable to determine the communication because the unsecured network 3 (or a system on the unsecured network 3 ) is unable to determine what packets are the wheat packets and what packets are the chaff packets. That is, as will be described in further detail below with respect to block 195 , the wheat packets and/or the chaff packets can only be determined by a system that has the pre-shared key, the known algorithm, and/or the correct section of the packet (e.g., content, serial number, or the like), such as a system on the home network 2 (e.g., authorized systems).
  • a system on the home network 2 e.g., authorized systems
  • any system on the unsecured network 3 , any systems on intermediary networks before the packets reach the home network 2 , and/or any rogue systems on the home network 2 are unable to read the communication because these systems do not have the pre-shared key, algorithm (e.g., pre-shared algorithm) and/or the correct section of the packets.
  • the one or more packets may include the plain text of the communication, which is available for any system on any of the networks through which the packets are sent to read.
  • the packets may be created within and/or routed through a secure remote network 5 , as previously described with respect to FIG. 3 herein. That is, each user 4 (e.g., a first user 4 a , a second user 4 b , or the like) that is operating remotely may access a remote secure network 5 (e.g., log onto and create packets, send the packets through, or the like) and send the packets through the remote secure network 5 (e.g., operated by the organization that operates the home network 2 , by a third-party, or the like).
  • the remote secure network 5 randomizes the packets through various relays within the secure remote network 5 , or accesses a network of secure remote networks 5 , and then ultimately sends the packets to the home network 4 (e.g., the original destination).
  • the initial relay in the remote secure network 5 may create the entire routing; however, in other embodiments each relay within the secure network 5 may be determined by each successive relay and/or each relay may randomly determine the next successive relay. In this way, each relay may only be aware of the previous relay from which the packets were received and the next relay to which the packets will be sent. Consequently, each relay, and thus each system trying to identify the routing, will not know the origination of the packets (e.g., the sending system) or the destination of the packets (e.g., the receiving system).
  • the secure remote network 5 may be utilized by each user 4 outside of the home network 2 in order to provide additional security around routing the packets from potential unsecure networks 3 to the home network 2 .
  • the secure remote network 5 since each user 4 is using the secure remote network 5 , all of the packets being sent through the remote secure network 5 create additional wheat and chaff packets that make it difficult to identify the wheat from the chaff.
  • the receiving system receives the plurality of packets for the communication.
  • the receiving system determines a validated signature for each of the plurality of packets. That is, the receiving system replicates a received signature from each of the plurality of packets (e.g., a wheat signature attached to the wheat packet, a chaff signature attached to the chaff packet) by using the pre-shared key and algorithm and/or a portion of the packets (e.g., content, serial number, or the like) to determine what the received signature should be.
  • a received signature e.g., a wheat signature attached to the wheat packet, a chaff signature attached to the chaff packet
  • a portion of the packets e.g., content, serial number, or the like
  • Block 170 of FIG. 4 further illustrates that when the validated signature meets the received signature from the packets, the packets are identified as wheat packets. That is, for example, when the recreated signature determined by the receiving system meets the received signature included with the packet, the packet is identified as a wheat packet.
  • the packets are identified as chaff packets. That is, for example, when the recreated signature determined by the receiving system fails to meet the received signature included with the packets, the packet is identified as a chaff packet.
  • the packets are identified by the receiving system as chaff packets, the chaff packets are discarded by the receiving system.
  • Block 190 of FIG. 4 illustrates that the receiving system reads the one or more wheat packets to determine the communication.
  • the receiving system reassembles the plurality of wheat packets together to form the communication.
  • the wheat packets may have wheat packet identifiers (e.g., sequential characters, or the like) that may be used to reassemble the wheat packets.
  • the pre-shared key and/or the algorithm may be used to determine the order of the plurality of packets in order to read the communication.
  • FIG. 4 further illustrates in block 195 that the security system network environment 300 described herein prevents the networks and/or systems thereof, such as the unsecured networks 3 from reading any communications made by the users 4 (e.g., travelers) using the user computer systems 20 that are being sent back to the home network 2 .
  • the networks may be unsecured networks 3 .
  • some unsecured networks 3 may require the users 4 and/or user computer systems 20 to provide the unsecure network 3 (or systems operating the unsecure network 3 ) any encryption keys that are traditionally used to encrypt communications, and in particular, encrypt the text of the packets used to send the communications.
  • any encryption key provided to the unsecured network 3 and/or the system thereof is useless.
  • the unsecured network 3 and/or any system operating thereon is unable to determine what packets are wheat packets and what packets are chaff packets.
  • any other rogue system trying to identify the communication as it is being sent from the unsecured network 3 to the home network 2 would be unable to determine the correct communication because it also does not have the ability to determine the wheat packets from the chaff packets.
  • the routing of the packets and/or the IP addresses of the sending system, receiving system, and/or relays for the packets may also be secured through the use of randomized routings. Consequently, the use of the remote secure network 3 provides additional security to the communication.
  • FIG. 5 illustrates a process for obfuscating a sending entity, a receiving entity, and/or the routing of the of a communication across networks and/or relays.
  • FIG. 5 provides a process for providing additional security measures. That is, while a potential misappropriator may not be able to determine the subject matter of a particular communication, such as if the process described with respect to FIG. 4 is implemented, the potential misappropriator may be able to determine information about the communication based on determining the identity of the sending entity, the receiving entity, and/or the routing of the communication.
  • some governments, individuals, organizations or the like may track the sending entities, receiving entities, routings, locations of forgoing, network from which and to which the communications are being sent, or the like in order to identity potential information related to the communication. Examples, may include monitoring the foregoing information in order to identify potential inside stock market information (e.g., communications between organizations that indicate potential mergers, joint development), political dissidents (e.g., governments monitor protestors, or the like), identify information that may aid in determining user account information (e.g., individuals gaining information that could be used to access customer accounts), or the like.
  • potential inside stock market information e.g., communications between organizations that indicate potential mergers, joint development
  • political dissidents e.g., governments monitor protestors, or the like
  • identify information that may aid in determining user account information e.g., individuals gaining information that could be used to access customer accounts
  • Block 210 of FIG. 5 illustrates that if a user is planning on traveling or otherwise planning on sending communications within a network or across networks a pre-shared sky and algorithm may be provided to the user for providing security for communications.
  • a user plan on using a second network e.g., an unsecured network
  • a first network e.g., a home network
  • the first network or a system thereof may provide a pre-shared key and/or a pre-shared algorithm for the user computer system 20 to utilize when communicating with the first network, as previously discussed with respect to block 110 of FIG. 4 .
  • the agent application previously described herein may include a pre-shared key that is used to create the wheat signatures for the wheat packets and/or potions thereof.
  • the agent application of each of the systems 20 that will communicate with the network 2 (e.g., home network 2 ) from a remote network 3 may also have a pre-shared algorithm or at least an indication to utilize a type of algorithm to create signatures for the communications.
  • the pre-shared key and algorithm may be utilized by the users 4 to communicate with the home network 2 from a remote network 3 .
  • the process described with respect to FIG. 5 may be utilized to within a single network 2 (e.g., between systems on the first network).
  • FIG. 5 further illustrates in block 220 that the sending system creates a plurality of packets for a communication with other systems.
  • the plurality of packets may be created for a communication between systems on a network (e.g., on a home network).
  • the sending system creates a plurality of packets for a communication with a receiving system on a home network 2 , while the sending system is using a remote network 3 (e.g., a potentially unsecured network 3 ).
  • a remote network 3 e.g., a potentially unsecured network 3
  • the packets may contain the content of the communication, packet information (e.g., packet identifiers, or the like), the receiving entity (e.g., the receiving system) to which the packets are to be sent, the sending entity (e.g., the sending system) which is sending the communication, the routing of communication (e.g., the one or more hosts through which the communication will be routed), or other like information.
  • the plurality of packets created by the sending system may comprise the one or more wheat packets and the one or more chaff packets, as previously described herein.
  • the one or more wheat packets are the actual packets for the communication and may include a data packet portion, an IP packet portion, and a routing packet portion.
  • the data packet portion may be wrapped within the IP packet portion, which may be wrapped within the routing packet portion. Consequently, as will be discussed in further detail herein with respect to blocks 230 to 234 , it should be understood that one or more of any of the fields within the data packet portion, the IP packet portion, and the routing packet portion may be obfuscated without encryption by utilizing wheat packets that contain the actual information and chaff packets that contain the imitation information.
  • the wheat packets for a communication may be split up into a plurality of wheat packets in order to improve the security of the communication.
  • the one or more chaff packets may comprise imitation packets that look like wheat packets, real packets for an unrelated communication (e.g., wheat packets for past or current unrelated communications on the network 2 ), or the like.
  • the agent application on the sending system creates the one or more chaff packets
  • the sending system may use a chaff packet algorithm (e.g., imitation packet generation, or the like).
  • the legitimate packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • Block 230 of FIG. 5 illustrates that the plurality of datagram packets are created, which may include one or more wheat datagram packets and one or more chaff datagram packets.
  • FIG. 6 illustrates one example of a datagram packet 300 (e.g., a TCP datagram, or the like); however, it should be understood that any type of datagram packet may be utilized and the illustrated datagram packet 300 is for illustrative purposes only.
  • the datagram packet 300 may include a segment header section 310 and a datagram data section 350 .
  • the segment header 310 may include some mandatory fields (e.g., 10 mandatory fields) and an extension section that is optional.
  • the segment header 310 includes the source port 312 (e.g., identification of the source); destination port 314 (e.g., identification of the destination); a sequence number 316 (e.g., sequence for multiple packets); acknowledgment number 318 (e.g., acknowledgment of the sequence numbers by each end); data offset 320 (e.g., size of header); reserved 322 (e.g., reserved for use in the future); flags 324 (e.g., 9 separate 1-bit flags which may or may not be used); window size 326 (e.g., provides size of the packet segment); checksum 328 (e.g., used for error checking of the segment header 310 , the data section 350 , and/or the IP packet header (described below)); pointer 330 (e.g., offset of the sequence number indicating the an urgent data byte); and/or options 332 (e.g., optional information).
  • source port 312 e.g., identification of the source
  • destination port 314 e.g.
  • the one or more wheat datagram packets will contain the actual datagram packet and the one or more chaff datagram packets may be created or may be real unrelated datagram packets.
  • the chaff datagram packets may be used in order to make it difficult for anyone (e.g., a potential misappropriator) to identify the wheat datagram packet from the chaff datagram packets without being able to identify the verified signature).
  • FIG. 5 further illustrates in block 232 that the plurality of IP packets are created, which may include one or more wheat IP packets and one or more chaff IP packets.
  • FIG. 7 illustrates on embodiment of an IP packet 400 ; however, it should be understood that any type of IP packet may be utilized, and the illustrated IP packet 400 is for illustrative purposes only. As illustrated in FIG. 7 , the IP packet 400 may also have an IP header section 410 and IP data section 450 .
  • the IP header section 410 may comprise a version 412 (e.g., version of the packet); an internet header length (IHL) 414 (e.g., indicates the size of the header); a differentiated services code point (DSCP) 416 (e.g., specifies the services related to the communication); an explicit congestion notification (ECN) 418 (e.g., allows notification of network congestion without dropping packets); a total length 420 (e.g., defines the entire packet length); an identification 422 (e.g., uniquely identifying the group of fragments of a single IP packet); flags 424 (e.g., used to control or identify fragments); fragment offset 426 (e.g., specifies the offset of a fragment relative to the original IP packet); time to live (TTL) 428 (e.g., prevents persisting IP packets); protocol 430 (e.g., defines the protocol used for the data in the IP packet); header checksum 432 (e.g., error-checking the header); source address 434 (
  • the one or more wheat IP packets will contain the actual IP packets and the one or more chaff IP packets may be created or may be real unrelated IP packets may be used.
  • the chaff IP packets may be used in order to make it difficult for anyone (e.g., a potential misappropriator) to identify the wheat IP packet from the chaff datagram packet without being able to identify the verified signature.
  • Block 234 of FIG. 5 illustrates that the plurality of routing packets are created, which may include one or more wheat routing packets and one or more chaff routing packets.
  • FIG. 8 illustrates one example of a routing packet 500 ; however, it should be understood that any type of routing packet may be utilized, and the illustrated routing packet 400 is for illustrative purposes only.
  • the routing packet 500 may include a routing header section 510 and a routing data section 550 .
  • the routing header section 510 may include a marker 512 (e.g., provides compatibility); a length 514 (e.g., provides total length of the message); and a type 516 (e.g., includes type of message).
  • the routing data section 550 of the routing packet establishes how to rout the packet between two or more locations. For example, the entire routing path, a portion of the routing path, or a single routing path between two points for the packet may be included in the routing packet 500 . That is, the routing path from the sending system to the receiving system may be provided, or a portion may be provided, and each relay (e.g., host system) determines the next routing of the packets. In some embodiments, the hosts may be able to determine the entire routing of the communication, while in other embodiments the each host may only be able to determine the next host to which to route the communication (e.g., the packets thereof).
  • the sending system may use wheat and chaff packet portions for one or more of the datagram packet, the IP packet, and/or the routing packet.
  • the sending system may create a wheat datagram packet with the actual information for the communication.
  • the chaff datagram packet may include imitation information for any information in the chaff datagram segment header 310 , including the source 312 , the destination 314 , and/or the like or the in the datagram data 350 itself.
  • the sending system may also create a wheat IP packet with the actual information for the communication.
  • the chaff IP packet may include imitation information for any of the information in the IP header 410 , such as the source IP address 434 , the destination IP address 436 , or the like, or the IP packet data packet 450 .
  • the sending system may also create a wheat routing packet with the actual information for the communication.
  • the chaff routing packet may include imitation information for any of the information in the routing header 510 and/or the routing data 550 .
  • the chaff packets may change the sending systems, the receiving systems, the hosts within the routing, the path length (e.g., short hop length, longer hop length, or the like), length of connections, or the like.
  • the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 are operatively coupled together.
  • the datagram packet 300 is located within the IP packet 400 (e.g., the datagram packet is located within the envelope of the IP packet 400 ) and the IP packet 400 is located within the routing packet 500 (e.g., the IP packet 400 is located within the envelope of the routing packet 500 ).
  • FIG. 5 further illustrates in block 240 that the wheat packet portions are signed with a wheat signature while the chaff packets are assigned a chaff signature (e.g., created and attached to the chaff packets, a modified signature of an old packet is created, a old signature of a packet is utilized, or the like).
  • a chaff signature e.g., created and attached to the chaff packets, a modified signature of an old packet is created, a old signature of a packet is utilized, or the like.
  • any number of the fields within the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 may be signed with a wheat signature (e.g., for the packets that have the actual information) or a chaff signature (e.g., for the packets that have the imitation information).
  • the datagram packet 300 may include the signature (e.g., wheat signature or chaff signature), such as within the sequence number 316 , the acknowledgment 318 , the flags 324 , the checksum 328 , or the like.
  • the signature e.g., wheat signature or chaff signature
  • the IP packet 400 may include the signature (e.g., wheat signature or chaff signature), such as within the identification 422 , the flags 424 , the header checksum 432 , or the like.
  • the routing packet 500 may include the signature (e.g., wheat signature or chaff signature), such as in the marker 512 , the routing data 550 itself, or the like.
  • the systems that can determine the validated signature e.g., have the key and/or algorithm are able to determine the wheat routing packets from the chaff routing packets.
  • the plurality of packets are routed. For example, between systems within a network, or from the remote network (e.g., the unsecured network) to the one or more relays (e.g., one or more hosts for routing between one or more intermediate networks) and to the destination receiving system on the home network.
  • the remote network e.g., the unsecured network
  • the one or more relays e.g., one or more hosts for routing between one or more intermediate networks
  • FIG. 5 illustrates in block 250 that the plurality of packets are sent from the sending system to the receiving system directly within the first network or between networks back to the home network through one or more relays.
  • the packets may be sent through the remote secure network 5 .
  • each of the relays e.g., hosts
  • each of the relays within the remote secure network 5 through which the packets are routed need to recreate a validated signature (e.g., using the pre-shared key and/or algorithm) in order to determine what packets are the wheat packets and what packets are the chaff packets, and how the packets should be routed back to the home network 2 .
  • each of the relays do not need to determine a validated signature (e.g., using the pre-shared key and/or the pre-shared algorithm) since only the sending system and/or the receiving system, and/or a portion of the routing is being obfuscated using the wheat and chaff packets.
  • a validated signature e.g., using the pre-shared key and/or the pre-shared algorithm
  • block 260 of FIG. 5 illustrates that each system that accesses the packets determines a validated signature for each of the packets.
  • each relay such as one or more hosts systems, used to route the communication between systems and/or networks determines a validated signature for each of the plurality of packets (e.g., from sections of the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 ).
  • the receiving system on the home network determines a validated signature from each of the plurality of the packets or portions thereof (e.g., from sections of the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 ) in order to determine what packets are the wheat packets and what packets are the chaff packets.
  • a validated signature e.g., should any system not have the pre-shared key and/or pre-shared algorithm), such as a potential misappropriator, the system would be not able to determine what entity was the sending system, what entity was the receiving system, the routing information for the communication, and/or the communication content.
  • Block 270 of FIG. 5 further illustrates that when the validated signature meets the received signature from the packets or portions of the packets, the packets are identified as wheat packets. That is, for example, when the recreated signature determined by the host system meets the received signature included withing the packets or portions thereof (e.g., the portions of the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 ), the packet is identified as a wheat packet.
  • the packets are identified as chaff packets.
  • the packet is identified as a chaff packet.
  • the chaff packets are discarded by the host system.
  • the host system identifies chaff packets, instead of discarding the chaff packets, the chaff packets may be sent onto the next host system in the routing (e.g., the host in the routing).
  • each of the host systems may utilize (e.g., create or identify) new chaff packets or portions thereof (e.g., the datagram packet 300 , the IP packet 400 , and/or the routing packet 500 ), as previously described herein, for routing the what packets and chaff packets to the next host system within the routing.
  • new chaff packets or portions thereof e.g., the datagram packet 300 , the IP packet 400 , and/or the routing packet 500
  • the receiving system identifies the one or more wheat packets in order to determine the communication from the sending system.
  • the receiving system reassembles the plurality of wheat packets together to form the communication.
  • the wheat packets may have wheat packet identifiers (e.g., sequential characters, or the like) that may be used to reassemble the wheat packets.
  • the pre-shared key and/or the algorithm may be used to determine the order of the plurality of packets in order to read the communication.
  • the security system network environment 300 described herein not only prevents the networks and/or systems thereof, such as the unsecured networks 3 , from determining what is the correct content being transmitted by the packets (e.g., because the other networks and/or systems are not able to determine what packets are wheat packets and what packets are chaff packets), but the process of FIG. 5 illustrates how the sending system, the destination system, and/or the routing of the packets may be obfuscated such that any system that is unable to determine a validated signature is unable to determine the sending system, the destination system, and/or the routing of the packets.
  • information may be still be determined about the communication from determining the identity of the sending entity, the receiving entity, and/or the routing the communication (e.g., low number hop, large number of hops, patterns of the routings, locations from which and to which the communications are routed, or the like). That is, while a potential misappropriator may not be able to determine the subject matter of a particular communication, the potential misappropriator may be able to determine information about the communication based on determining the identity of the sending entity, the receiving entity, and/or the routing of the communication.
  • some governments, individuals, organizations or the like may track the sending entities, receiving entities, routings, locations of forgoing, network from which and to which the communications are being sent, or the like in order to identity potential information related to the communication. Examples, may include monitoring the foregoing information in order to identify potential inside stock market information (e.g., communications between organizations that indicate potential mergers, joint development), political dissidents (e.g., governments monitor protestors, or the like), identify information that may aid in determining user account information (e.g., individuals gaining information that could be used to access customer accounts), or the like.
  • the present invention provide obfuscation of a sending entity, a receiving entity, and/or the routing of the of a communication across networks and/or relays.
  • the present disclosure provides an improved way for systems to communicate back to a home network 2 from an unsecured network 3 without encrypting the content of the packets being sent for the communication. Moreover, the present disclosure provides an improved way to prevent systems on an unsecure network, systems on intermediate networks through which the communication is sent, and/or a rogue system on a home network 2 from determining the actual communication, receiving system, sending system, and routing without having to encrypt the communication.
  • the present disclosure improves the processing capacity, the memory, and the processing speeds typically required when each of the packets for a communication requires encryption. That is, typical encryption processes require more processing capacity and memory, and more processing time to encrypt and decrypt each communication over networks.
  • the systems described herein may be configured to establish a communication link (e.g., electronic link, or the like) with each other in order to accomplish the steps of the processes described herein.
  • the link may be an internal link within the same entity (e.g., within the same organization) or a link with the other entity systems.
  • the one or more systems may be configured for selectively monitoring the resource usage and availability. These feeds of resource usage and availability may be provided via wireless network path portions through the Internet. When the systems are not providing data, transforming data, transmitting the data, and/or the like, the systems need not be transmitting data over the Internet, although it could be.
  • the systems and associated data for each of the systems may be made continuously available, however, continuously available does not necessarily mean that the systems actually continuously generate data, but that systems are continuously available to perform actions associated with the systems in real-time (i.e., within a few seconds, or the like) of receiving a request for it.
  • the systems are continuously available to perform actions with respect to the data, in some cases in digitized data in Internet Protocol (IP) packet format.
  • IP Internet Protocol
  • the systems may be configured to update activities associated with the systems, as described herein.
  • the process flows described herein include transforming the data from the different systems (e.g., internally or externally) from the data format of the various systems to a data format for display on other systems.
  • data is converted within the computer environment. This may be seamless, as in the case of upgrading to a newer version of a computer program.
  • the conversion may require processing by the use of a special conversion program, or it may involve a complex process of going through intermediary stages, or involving complex “exporting” and “importing” procedures, which may be converting to and from a tab-delimited or comma-separated text file.
  • a program may recognize several data file formats at the data input stage and then is also capable of storing the output data in a number of different formats. Such a program may be used to convert a file format. If the source format or target format is not recognized, then at times a third program may be available which permits the conversion to an intermediate format, which can then be reformatted.
  • embodiments of the invention may be embodied as an apparatus (e.g., a system, computer program product, and/or other device), a method, or a combination of the foregoing. Accordingly, embodiments of the invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.” Furthermore, embodiments of the invention may take the form of a computer program product comprising a computer-usable storage medium having computer-usable program code/computer-readable instructions embodied in the medium (e.g., a non-transitory medium, or the like).
  • the computer usable or computer readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires; a tangible medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other tangible optical or magnetic storage device.
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • Computer program code/computer-readable instructions for carrying out operations of embodiments of the invention may be written in an object oriented, scripted or unscripted programming language such as Java, Pearl, Python, Smalltalk, C++ or the like.
  • the computer program code/computer-readable instructions for carrying out operations of the invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • Embodiments of the invention described above, with reference to flowchart illustrations and/or block diagrams of methods or apparatuses will be understood to include that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions.
  • These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a particular machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create mechanisms for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instructions, which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions, which execute on the computer or other programmable apparatus, provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • computer program implemented steps or acts may be combined with operator or human implemented steps or acts in order to carry out an embodiment of the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A security system that provides for obfuscating the sending entities, receiving entities, and/or routings (e.g., host entities that are routing the communication and the path through which the communication is sent) without the need to encrypt the foregoing. The packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature). Therefore, the actual datagram packet, IP packet, and/or routing packet may have the actual information or may have imitation information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing.

Description

    FIELD
  • The present invention relates to a security system, and more particularly to a security system that allows a system to send communications and obfuscate the sending entity, receiving entity, and/or the routing of the communication without encryption.
  • BACKGROUND
  • In order to send secure communications, typical communications are encrypted utilizing a session key. Only the parties with the session key are able to read the communications, the sending entities, the receiving entities, and/or the routing of the communications. Should any party have access to the session key, the parties can review the communications, the sending entities, the receiving entities, and/or the routing of the communications that were encrypted using the session key.
  • SUMMARY
  • The following presents a simplified summary of one or more embodiments of the present invention, in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments nor delineate the scope of any or all embodiments. Its sole purpose is to present some concepts of one or more embodiments of the present invention in a simplified form as a prelude to the more detailed description that is presented later.
  • Generally, systems, computer products, and methods are described herein for a security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network; however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.
  • Furthermore systems, computer products, and method are described herein for a security system that provides for obfuscating the sending entities, receiving entities, and/or routings (e.g., host entities that are routing the communication and the path through which the communication is sent) without the need to encrypt the sending entities, receiving entities, and/or routings. The packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature). As such, the wheat packets for the communication may include the actual datagram packet, IP packet, and routing packet. Moreover, the chaff packets for the communication may include the imitation datagram packet, IP packet, and/or routing packet. As such, anyone of the chaff datagram packet, IP packets, and/or routing packets may include imitation sending entity, receiving entity, and/or routing information in order to obfuscate the actual sending entity, receiving entity, and/or routing information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing.
  • Embodiments of the invention comprise systems, computer implemented methods, and computer program products for securely sending communications using a plurality of packets. The invention comprises creating one or more wheat packets for a communication, each of the one or more wheat packets comprise a wheat datagram packet portion, a wheat IP packet portion, and a wheat routing packet portion. A wheat signature is attached to at least one field within the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion, wherein the wheat signature is created using a pre-shared key. One or more chaff packets are utilized for the communication, each of the one or more chaff packets comprise a chaff datagram packet portion, a chaff IP packet portion, and a chaff routing packet portion, and wherein a chaff signature is attached to at least one field within the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion. The plurality of packets, which comprise the one or more wheat packets and the one or more chaff packets, are routed through one or more hosts. The one or more hosts receive the plurality of packets for the communication. The one or more processing devices of the one or hosts are configured to execute computer readable code to determine a validated signature for each of the plurality of packets. The one or more chaff packets are identified when the at least one field of the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion has the chaff signature that fails to meet the validated signature. The one or more wheat packets are identified when the at least one field of the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion meets the validated signature. Thereafter a routing is determined for the one or more wheat packets. One or more other systems are prevented from determining a sending entity, a receiving entity, or the routing for the communication without identifying the one or more wheat packets or the one or more chaff packets from the plurality of packets using the validated signature.
  • In further accord with embodiments, the invention further comprises receiving the pre-shared key for the communications.
  • In other embodiments of the invention, determining the validated signature comprises replicating a received signature for the plurality of packets, wherein the received signature is the chaff signature of the one or more chaff packets or the wheat signature of the one or more wheat packets.
  • In yet other embodiments of the invention, the received signature comprises a message authentication code (MAC), and wherein replicating the MAC comprises using the pre-shared key and an algorithm to create the validated signature.
  • In still other embodiments of the invention, the algorithm is a pre-shared algorithm that is shared with the system for the communications.
  • In other embodiments of the invention, replicating the received signature further comprises using at least a portion of the plurality of packets to determine the validated signature.
  • In further accord with embodiments of the invention, one or more wheat signatures are attached to at least two of the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
  • In other embodiments of the invention, one or more chaff signatures are attached to at least two of the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
  • In yet other embodiments of the invention, one or more wheat signatures are attached to the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
  • In still other embodiments of the invention, one or more chaff signatures are attached to the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
  • In other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is a sequence number field of the wheat datagram packet portion or the chaff datagram packet portion.
  • In further accord with embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is an acknowledgement field of the wheat datagram packet portion or the chaff datagram packet portion.
  • In other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is one or more flag fields of the wheat datagram packet portion or the chaff datagram packet portion.
  • In yet other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is a checksum field of the wheat datagram packet portion or the chaff datagram packet portion.
  • In still other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is an identification of the wheat IP packet portion or the chaff IP packet portion.
  • In other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is one or more flags of the wheat IP packet portion or the chaff IP packet portion.
  • In further accord with embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is a header checksum of the wheat IP packet portion or the chaff IP packet portion.
  • In other embodiments of the invention, the at least one field to which the wheat signature or the chaff signature is attached is a field of the wheat routing packet portion or the chaff routing packet portion.
  • To the accomplishment the foregoing and the related ends, the one or more embodiments comprise the features hereinafter described and particularly pointed out in the claims. The following description and the annexed drawings set forth certain illustrative features of the one or more embodiments. These features are indicative, however, of but a few of the various ways in which the principles of various embodiments may be employed, and this description is intended to include all such embodiments and their equivalents.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, and wherein:
  • FIG. 1 illustrates a block system diagram of a network security system, in accordance with some embodiments of the present disclosure.
  • FIG. 2 illustrates a network environment for providing secure communications without encryption over the network, in accordance with some embodiments of the present disclosure.
  • FIG. 3 illustrates a cross-network environment for providing secure communications without encryption on potentially unsecure networks, in accordance with some embodiments of the present disclosure.
  • FIG. 4 illustrates a process flow for providing secure communications without encryption from potentially unsecure networks, in accordance with some embodiments of the present disclosure.
  • FIG. 5 illustrates a process flow for obfuscating an actual receiving entity, sending entity, and/or routing for the communication without encryption, in accordance with some embodiments of the present disclosure.
  • FIG. 6 illustrates an example datagram packet portion, in accordance with some embodiments of the present disclosure.
  • FIG. 7 illustrates an example IP packet portion, in accordance with some embodiments of the present disclosure.
  • FIG. 8 illustrates an example routing packet portion, in accordance with some embodiments of the present disclosure.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • Embodiments of the invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more embodiments. It may be evident; however, that such embodiment(s) may be practiced without these specific details. Like numbers refer to like elements throughout.
  • Systems, methods, and computer program products are described herein for a security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network using a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent. Furthermore, the security system may provide for obfuscating the sending entities, receiving entities, and/or routings (e.g., host entities that are routing the communication and the path through which the communication is sent) without the need to encrypt the sending entities, receiving entities, and/or routings. The packets for a communication may include a datagram packet portion, an IP packet portion, and a routing packet portion and may be signed with a signature using a pre-shared key (e.g., a wheat signature or a chaff signature). As such, the wheat packets for the communication may include the actual datagram packet, IP packet, and routing packet. Moreover, the chaff packets for the communication may include the imitation datagram packet, IP packet, and/or routing packet. As such, anyone of the chaff datagram packet, IP packets, and/or routing packets may include imitation sending entity, receiving entity, and/or routing information in order to obfuscate the actual sending entity, receiving entity, and/or routing information. Only the systems that have the pre-shared key are able to determine what are the wheat packets and what are the chaff packets such that the correct sending entity, receiving entity, and/or hosts routing the communication are able to determine the correct entities and/or the routing.
  • FIG. 1 illustrates a network security system environment 1, in accordance with embodiments of the present disclosure. As illustrated in FIG. 1, one or more organization systems 10 are operatively coupled, via a network 2, to one or more user computer systems 20, one or more security systems 30, one or more third-party systems 40, and/or one or more other systems (not illustrated). In this way, the security systems 30 (in coordination with the user computer systems 20 and/or other systems on the network) may be utilized to create secure communications over the network 2 without the need to encrypt all or a majority of the communications between the systems on the network 2. As will be described herein, the security systems 30 and/or other systems described herein may utilize security signatures (e.g., keys, MACs, algorithms, and/or the like) attached to packets to allow a receiving system to identify the valid packets for a communication. For example, the security systems 30 and/or other systems (e.g., user computer systems 20) may create and/or assign one or more keys (e.g., pre-shared keys, such a global network keys, content keys, segmentation keys, or the like) and one or more algorithms (e.g., pre-shared algorithm, or the like). The one or more keys and the one or more algorithms may be utilized to create message authentication codes (MACs) for each of the packets being sent, in particular, wheat packets, as will be discussed herein. Moreover, chaff packets (e.g., unrelated real packets, imitation packets, combinations thereof, or the like) and wheat packets (e.g., real packets, or the like) may be used when sending communications. Any receiving system must be able to identify the security signature in order to determine what packets are wheat packets to determine the communication, receiving entity, sending entity, and/or routing, and what packets are chaff packets that should be discarded. For example, each receiving system may have the key (e.g., pre-shared key) and the one or more algorithms in order to determine what MAC attached to a packet is valid, and thus, identify what packets are wheat packets and what are chaff packets that can be discarded (e.g., a technique that may be described as winnowing). The wheat packets can then be identified as the legitimate communication. In addition, the communication may be broken up into a plurality of wheat packets before the security signature is added, and as such, the receiving system may also have to reassemble the plurality of wheat packets together in order to identify the communications. While security is achieved through keys, algorithms, splitting packets, or the like, the messages themselves, the sending entity, the receiving entity, and/or routings are sent over the network 2 without any encryption, as will be described in further detail herein.
  • The communications that may utilize the embodiments of the present disclosure, may include any type of communication such as, but not limited to, communication related to a computer system trying to access a network, communications between segmented computer systems within a network trying to communicate with other computer systems within the same segment, computer systems trying to communication with systems on other networks, or the like. The communications may relate to interactions, accessing data, running applications, sending messages, or the like, as will be discussed in further detail herein.
  • The network 2 may be a global area network (GAN), such as the Internet, a wide area network (WAN), a local area network (LAN), or any other type of network or combination of networks. The network 2 may provide for wireline, wireless, or a combination of wireline and wireless communication between systems, services, components, and/or devices on the network 2.
  • As illustrated in FIG. 1, the one or more organization systems 10 generally comprise one or more communication components 12, one or more processing components 14, and one or more memory components 16. The one or more processing components 14 are operatively coupled to the one or more communication components 12 and the one or more memory components 16. As used herein, the term “processing component” generally includes circuitry used for implementing the communication and/or logic functions of a particular system. For example, a processing component may include a digital signal processor component, a microprocessor component, and various analog-to-digital converters, digital-to-analog converters, and other support circuits and/or combinations of the foregoing. Control and signal processing functions of the system are allocated between these processing components according to their respective capabilities. The one or more processing components may include functionality to operate one or more software programs based on computer-readable instructions thereof, which may be stored in the one or more memory components.
  • The one or more processing components 14 use the one or more communication components 12 to communicate with the network 2 and other components on the network 2, such as, but not limited to, the components of the one or more user computer systems 20, the one or more security systems 30, the one or more third-party systems 40, and/or the one or more other systems (not illustrated). As such, the one or more communication components 12 generally comprise a wireless transceiver, modem, server, electrical connection, electrical circuit, or other component for communicating with other components on the network 2. The one or more communication components 12 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors, or the like.
  • As further illustrated in FIG. 1, the one or more organization systems 10 comprise computer-readable instructions 18 stored in the one or more memory components 16, which in some embodiments includes the computer-readable instructions 18 of the one or more organization applications 17 (e.g., secure website application, secure dedicated application, or the like). In some embodiments, the one or more memory components 16 include one or more data stores 19 for storing data related to the one or more organization systems 10, including, but not limited to, data created, accessed, and/or used by the one or more organization applications 17. The organization may be an entity that administers, controls, or regulates the network 2, user computer systems 20, the security systems 30, and/or the third-party systems 40. It should be understood that the users 4, third-parties, and organizations may all be referred to herein as entities.
  • As illustrated in FIG. 1, users 4 may communicate with each other over the network 2 as will be described in further detail herein. In some embodiments the security system 30 may be used to secure the communications over the network 2 and/or in some embodiments each of the systems on the network 2 may include a portion of the security systems 30 and/or application 37 thereof, such as an agent that may communicate with each of the computer systems or be located, at least partially (or entirely), on each of the computer systems 20. It should be understood that the user 4 may be a user that is communicating with other users on the network 4 through the use of the user computer systems 20. The user 4 may be representing himself/herself in a communication, a user 4 representing a third-party in an interaction, a user 4 that acts on behalf of the organization, a user 4 that acts on behalf of the security system 30, and/or the like. Consequently, the one or more users 4 may be individual users and/or employees, agents, representatives, officers, or the like of any entity on the network 2. In particular embodiments, the network 2 may be a network of an organization (e.g., a business) and the users 4 are the employees, agents, officers, or the like of the business.
  • As such, the user computer systems 20 may communicate with each other, the one or more organization systems 10, the one or more security systems 30, the one or more third-party systems 40, and/or other systems (not illustrated). The one or more user computer systems 20 may be a desktop, laptop, tablet, mobile device (e.g., smartphone device, or other mobile device), or any other type of computer that generally comprises one or more communication components 22, one or more processing components 24, and one or more memory components 26.
  • The one or more processing components 24 are operatively coupled to the one or more communication components 22, and the one or more memory components 26. The one or more processing components 24 use the one or more communication components 22 to communicate with the network 2 and other components on the network 2, such as, but not limited to, the one or more organization systems 10, the one or more security systems 30, the one or more third-party systems 40, and/or the other systems (not illustrated). As such, the one or more communication components 22 generally comprise a wireless transceiver, modem, server, electrical connection, or other component for communicating with other components on the network 2. The one or more communication components 22 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors and the like. Moreover, the one or more communication components 22 may include a keypad, keyboard, touch-screen, touchpad, microphone, mouse, joystick, other pointer component, button, soft key, and/or other input/output component(s) for communicating with the users 4.
  • As illustrated in FIG. 1, the one or more user computer systems 20 may have computer-readable instructions 28 stored in the one or more memory components 26, which in some embodiments includes the computer-readable instructions 28 for user applications 27, such as dedicated applications (e.g., apps, applet, or the like), portions of dedicated applications, a web browser or other apps that allow access to applications located on other systems, or the like. In some embodiments, the one or more memory components 26 include one or more data stores 29 for storing data related to the one or more user computer systems 20, including, but not limited to, data created, accessed, and/or used by the one or more user computer systems 20. The user application 27 may use the applications of the one or more organization systems 10, the one or more security systems 30, the one or more third-party systems 40, and/or one or more other systems (not illustrated) in order to communicate with other systems on the network and take various actions in a secure way without having to encrypt all or the majority of the communications, sending entities, receiving entities, and/or routing over the network 2.
  • As illustrated in FIG. 1, one or more security systems 30 may be utilized by the one or more organization systems 10, the one or more user computer systems 20, the one or more third party systems 40, and/or other systems to aid in providing secure communications without requiring encryption of all or most of the communications. That is, the security system 30 may be utilized in order to create, store, manage or the like the keys (e.g., pre-shared keys, such as global keys, segmentation keys, specific communication keys, or the like) and/or the algorithms (e.g., MAC algorithms used to create the MACs), and/or communicate with the systems (e.g., the agents thereon, or the like) on the network 2 to facilitate the secure communications.
  • As such, the one or more security systems 30 are operatively coupled, via a network 2, to the one or more organization systems 10, the one or more user computer systems 20, the one or more third-party systems 40, and/or the other systems (not illustrated). The one or more security systems 30 generally comprise one or more communication components 32, one or more processing components 34, and one or more memory components 36.
  • The one or more processing components 34 are operatively coupled to the one or more communication components 32, and the one or more memory components 36. The one or more processing components 34 use the one or more communication components 32 to communicate with the network 2 and other components on the network 2, such as, but not limited to, the components of the one or more organization systems 10, the one or more user computer systems 20, the one or more third-party systems 40, and/or the one or more other systems (not illustrated). As such, the one or more communication components 32 generally comprise a wireless transceiver, modem, server, electrical connection, or other component for communicating with other components on the network 2. The one or more communication components 32 may further include an interface that accepts one or more network interface cards, ports for connection of network components, Universal Serial Bus (USB) connectors and the like.
  • As illustrated in FIG. 1, the one or more security systems 30 may have computer-readable instructions 38 stored in the one or more memory components 36, which in one embodiment includes the computer-readable instructions 38 of one or more security applications 37. In some embodiments, the one or more memory components 36 include one or more data stores 39 for storing data related to the one or more security systems 30, including, but not limited to, data created, accessed, and/or used by the one or more security applications 37. The one or more security applications 37 may allow for creating, storing, managing, or the like of the keys (e.g., pre-shared keys, such as global keys, segmentation keys, communication keys, or the like) and/or the one or more algorithms (e.g., MAC algorithms, or the like), and/or communicate with the systems (e.g., the agents thereon, or the like) on the network 2 to facilitate the secure communications. In some embodiments, the one or more security systems 30 may be operated by the organization (e.g., be one of the one or more organization systems 10), or may be operated by a third-party on behalf of the organization.
  • Moreover, as illustrated in FIG. 1, the one or more third-party systems 40 are operatively coupled to the one or more organization systems 10, the one or more user computer systems 20, the one or more security systems 30, and/or the one or more other systems, through the network 2. The one or more third-party systems 40, and/or other like systems have components the same as or similar to the components described with respect to the one or more organization systems 10, the one or more user computer systems 20, and/or the one or more security systems 30 (e.g., one or more communication components, one or more processing components, and one or more memory devices with computer-readable instructions of one or more third-party applications, one or more datastores, or the like). Thus, the one or more third-party systems 40 communicate with the one or more organization systems 10, the one or more user computer systems 20, the one or more security systems 30, and/or each other in same or similar way as previously described with respect to the one or more organization systems 10, the one or more user computer systems 20, and/or the one or more security systems 30. The one or more third-party systems 40 may comprises the systems and applications that are trying to access the network 2 (e.g., as authorized parties, unauthorized parties, or the like). As such, in some embodiments the third-parties may be unauthorized third-parties that are trying to misappropriate communications between authorized systems on the network 2. In some embodiments, the third-parties are authorized to access the network 2 for various reasons (e.g., to perform maintenance, enter interactions, support the organization systems or the like). In still other embodiments, the third-parties may be external systems on external secure networks that aid in allowing authorized users 4 (e.g., users that are located outside of the network 2, such as out of the country) to access the network 2 from abroad.
  • The one or more other systems (not illustrated) may include the systems, and components thereof, for allowing communications between the systems (e.g., intermediaries that act as gateways, APIs, or the like to allow communication between the systems).
  • FIG. 2 illustrates a network environment 100 in which multiple entity computer systems (e.g., user computer systems 20), and entities (e.g., users 4) associated therewith, communicate with each other and other systems, including, but not limited to the security systems 30, the organization systems 10, or the like. The communications between the systems 20 may be secured communications, as will be described in further detail below. The network environment 200 may be any type of network 2, such as an internal network, external network, cross-organizational network, or any type of network of entity computer systems. In some embodiments the network may be a single network; however, in some embodiments while the network is a single network, it may have two or more segmented networks that may be regulated based on signatures (e.g., MAC that are created and identified using keys and/or algorithms) attached to packets. As such, even though a system may be able to access the network 2, the system may not be able to communicate with other systems on the network (e.g., the system may not be able to create signatures that other systems can validate and/or the system may not be able to read signatures created by other systems on the network 2). As illustrated in FIG. 2, the network 2 may comprise a first entity computer system 20 a, a second entity computer system 20 b, a third entity computer system 20 c, a fourth entity computer systems 20 d, up to an nth entity computer system 20 n. As further illustrated in Figures, the computer systems 20 a to 20 n th may correspond with entities, such as a first user 4 a, a second user 4 b, a third user 4 c, a fourth user 4 d, an nth user 4 n, or the like. As will be discussed in further detail herein with respect the systems on the network 2, the systems may send and receive secure communications using wheat packets and chaff packets.
  • The present disclosure provides an improved way for sending communications between systems in secure way in order to restrict unauthorized third-party systems from accessing the network 2, and if they gain access to the system, to restrict such third-party systems from being able to intercept and identify the correct communication, sending party, receiving party, and/or routing to misappropriate the communications (e.g., content, metadata, or other information that may be identified from the packets. Furthermore, the present disclosure provides an improved way to allow for external users (e.g., travelers) to other countries operating outside of the network 2 (e.g., home network) to access the network 2 from an external unsecured network and to communicate with the systems on the network 2. In some embodiments, the users 4 operating on an unsecured network 3 may send communications through a remote secure network 5, which in addition to using wheat packets and chaff packets, may also obfuscate the sending entity, the receiving entity, and/or the routing of the packets. The present disclosure also allows for providing segmentation of the systems on the network 2 using different signatures (e.g., different keys and/or algorithms) to only allow sub-sets of the systems on the network 2 to communicate with each other.
  • The present invention utilizes and expands upon a chaffing communication technique that is utilized to provide confidential communication between systems on a network 2. Communication between systems may involve the sending systems creating and/or sending packets to the receiving system. The packets may comprise wheat packets (e.g., authorized packets, valid packets, or the like) and chaff packets (e.g., unauthorized packets, imitation packets, or the like), and the receiving system authenticates the signatures on the packets and separates the chaff packets from the wheat packets. The wheat packets may include the actual communication (e.g., message, process instructions, file, data, or the like) and/or portions thereof, while the chaff packets are the imitation communication and/or portions thereof.
  • The packets (e.g., wheat and chaff packets) are sent with authentication in form of a signature. The signature may be any type of secure signature that may be used to determine the packets that are wheat packets, how to assemble the wheat packets (if necessary), and/or what and/or how to use one or more keys and/or one or more algorithms (if necessary) in order to read the packets. For example, the signature may be an MAC that is created using a key (e.g., a pre-shared key), a MAC algorithm, and in some embodiments the packet itself (e.g., content of the communication, serial number of the wheat packets, both of the forgoing, and/or the like). For example, the key and at least a portion of the packet are inputs into the MAC algorithm, and the output of the MAC algorithm is the MAC that is attached to the wheat packet. The security system 30, and/or individual agents (e.g., pre-loaded applications, or portions thereof) that are located on each system, may be responsible for creating the wheat packets with the signature (e.g., authorized signature) and the chaff packets with an imitation signature, as will be described herein in further detail.
  • The receiving system may use the signature in order to determine what packets are wheat packets and what packets are chaff packets that can be discarded. For example, a receiving computer system receiving the packets (e.g., wheat packets, chaff packets, sub-portions thereof, or the like) may only be able to identify the correct communication using the key (e.g., pre-shared key) and/or a portion of the packet and the MAC algorithm. That is, the receiving system may try to recreate the MAC of a packet using the pre-shared key, the MAC algorithm and/or a portion of the packet (e.g., pre-agreed upon serial number, content section, or the like of the packet). If the comparison between the determined MAC recreated by the receiving party meets the MAC of the packet received by the receiving party then packet is determined to be a wheat packet. Alternatively, when the determined MAC of a packet recreated by the receiving system fails to meet the MAC of the packet received by the receiving system, the packet is a chaff packet and is discarded.
  • It should be understood that any entity on the system can read any packet (e.g., the packet is not encrypted, hidden, or the like), such as the communication content, the receiving entity, the sending entity, and/or the routing; however, the receiving system can only identify the correct packets based on validating the signature attached to each packet (e.g., recreating the MAC signature).
  • As will be further described herein, in some embodiments of the invention, the chaff packets may be chaff packets generated (e.g., made up) by the sending computer systems or the security system 30. Alternatively, the chaff packets may be past or current wheat packets that were used for other communications outside of the present communication. By using unrelated wheat packets as the chaff packets, the systems are not required to generate chaff packets for the communications, which may reduce processing capacity and/or memory requirements, as well as increase processing speeds. The chaff packets may look like the wheat packets (e.g., correct format, have serial numbers, and have content, or the like), but the chaff packets have imitation signatures (e.g., MACs, or the like) that are not valid and cannot be recreated using the correct key and/or the correct algorithm (e.g., the pre-shared key and pre-shared algorithm).
  • In addition to sending chaff packets, the communications described herein may further include separating the packets (e.g., wheat and/or chaff packets) into multiple wheat packets (e.g., sub-wheat packets, or the like) which are each individually authenticated by adding the signature (e.g., MACs, or the like) to each of the sub-wheat packets. The separated sub-wheat packets may include serial numbers, which may function to both create the signature (e.g., the MACs), as well as allow the receiving system to reassemble the sub-wheat packets into the full wheat packet in the proper order. Consequently, the receiving system may use the signature of the multiple wheat packets (e.g., sub-wheat packets), as previously discussed herein, to identify the multiple wheat packets, remove the chaff packets with imitation signatures, and reassemble the multiple wheat packets (e.g., sub-wheat packets) into the full wheat packet in order to read the communication.
  • FIG. 3 provides a secure remote network environment 300, in which users 4 (e.g. a first user 4 a, a second user 4 b, or the like, such as a traveler) may try to access the network 2 (e.g., a home network 2), from a remote network, such as an unsecured network 3 (e.g., a first unsecured network 3, a second unsecured network 3). The users (e.g., a first user 4 a, a second user 4 b, or the like) may be traveling away from the home network 2, but may want to communicate with the home network 2. As such, the users 4 may try to communicate with the home network 2 directly from the unsecured networks 3 using the chaff packets as previously described herein. It should be understood, as will be described in further detail with respect to FIG. 4, the security systems and techniques previously described herein may be utilized in order to allow for secure communication from a user 4 (e.g., a first user 4 a, a second user 4 b, or the like) trying to communicate with the network 2 (e.g., home network) from another network (e.g., from a first unsecured network 3, a second unsecured network 3, or the like). That is, should a user 4 be planning on using networks that may be potentially unsecure (e.g., networks outside of the organization, networks of countries that do not allow encryption, or the like), then the user computer system 20 may be preloaded with the agent application to utilize one or more wheat packets and one or more chaff packets in order to send communications to the home network 2.
  • Moreover, users (e.g., a first user 4 a, a second user 4 b, or other users) operating remotely away from the home network 2 may not be able to control the routing of the communications through various networks back to the home network 2. As such, in addition to providing chaff packets for the communication, the secure remote network environment 300 may also utilize a remote secure network 5 through which all of the remote users 4 will connect to send communications back to the home network 2. The remote secure network 5, as will be described in further detail herein, may provide one or more relays (e.g., host receiving systems) through which communications may be routed. As such, the remote secure network 5 directs the one or more wheat packets and the one or more chaff packets through multiple relays (e.g., the same or different routings) in order to hide not only the communication using the chaff packets described herein, but from which networks the communication originated and to which networks the communications are to be routed, as will be discussed in further detail herein with respect to FIG. 4.
  • FIG. 4 provides a process flow for providing secure communications from remote networks 3 (e.g., potentially unsecured networks 3) outside of the network 2 (e.g., home network 2) without encryption of the packets used for the communication. As illustrated in block 110 of FIG. 4, each of the systems 20 of the users 4 that will be communicating with the network 2 (e.g., home network 2) from remote networks 3 may be updated with an agent application. The agent application may include a pre-shared key. Additionally, the agent application of each of the systems 20 that will communicate with the network 2 (e.g., home network 2) from a remote network 3 may also have a pre-shared algorithm or at least an indication to utilize a type of algorithm to create signatures for the communications. The pre-shared key and algorithm may be utilized by the users 4 to communicate with the home network 2 from a remote network 3.
  • As illustrated in block 120 of FIG. 4, a sending system creates a plurality of packets for a communication with other systems, such as a receiving system on a home network 2, while the sending system is using a remote network 3 (e.g., a potentially unsecured network 3). The packets may contain the content of the communication, packet information (e.g., packet identifiers, or the like), the systems to which the packets are to be sent (e.g., receiving entity, sending entity, and/or routing hosts), or other like information. The plurality of packets created by the sending system may comprise the one or more wheat packets and the one or more chaff packets, as previously described herein. The one or more wheat packets are the actual packets for the communication. As previously described herein, the wheat packets for a communication may be split up into a plurality of wheat packets in order to improve the security of the communication. The one or more chaff packets, as previously described herein, may comprise imitation packets that look like wheat packets, real packets for an unrelated communication (e.g., wheat packets for past or current unrelated communications on the network 2), or the like. When the agent application on the sending system creates the one or more chaff packets, the sending system may use a chaff packet algorithm (e.g., imitation packet generation, or the like). When the chaff packets are wheat packets from unrelated communications, the legitimate packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • Block 130 of FIG. 4 further illustrates that the sending system attaches a wheat signature to each of the one or more wheat packets. As previously described herein, the wheat signature may be created using the pre-shared key and the known algorithm (e.g., a pre-shared algorithm or pre-identified algorithm). Additionally, a section of the which packet, such as the content of the wheat packet, a serial number of the wheat packet, or the like, may also be used by the pre-shared algorithm to create the signature. Each signature created is attached to each wheat packet (e.g., different signatures are used on each wheat packet, or the like).
  • FIG. 4 further illustrates in block 140 that the one or more chaff signatures are attached to the one or more chaff packets. It should be understood that the chaff signatures may be imitation signatures that are similar to the wheat signatures (e.g., same length of characters, or the like) and are attached to the imitation chaff packets. Alternatively, the chaff signatures may comprise a modification of the original wheat signatures that are attached to the original wheat packets for other unrelated communications, which are now being used as chaff packets for the present communication. As described above with respect to the chaff packets themselves, the signature for the chaff packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • As illustrated in block 150 of FIG. 4, once the wheat packets and the chaff packets are created and/or identified from other sources and signed, the wheat packets and the chaff packets are sent to the one or more systems, such as the receiving systems on the home network 2. In some embodiments the wheat packets and the chaff packets are sent directly from the unsecured networks 3, on which the users 4 are located, to the home network 2 (e.g., in some embodiments using relays of other networks). Even though the packets are being sent without encryption and in plain text, the unsecured network 3 is unable to determine the communication because the unsecured network 3 (or a system on the unsecured network 3) is unable to determine what packets are the wheat packets and what packets are the chaff packets. That is, as will be described in further detail below with respect to block 195, the wheat packets and/or the chaff packets can only be determined by a system that has the pre-shared key, the known algorithm, and/or the correct section of the packet (e.g., content, serial number, or the like), such as a system on the home network 2 (e.g., authorized systems). That is, any system on the unsecured network 3, any systems on intermediary networks before the packets reach the home network 2, and/or any rogue systems on the home network 2, are unable to read the communication because these systems do not have the pre-shared key, algorithm (e.g., pre-shared algorithm) and/or the correct section of the packets. As such, it should be understood that the one or more packets may include the plain text of the communication, which is available for any system on any of the networks through which the packets are sent to read.
  • In some embodiments, it should be understood that the packets may be created within and/or routed through a secure remote network 5, as previously described with respect to FIG. 3 herein. That is, each user 4 (e.g., a first user 4 a, a second user 4 b, or the like) that is operating remotely may access a remote secure network 5 (e.g., log onto and create packets, send the packets through, or the like) and send the packets through the remote secure network 5 (e.g., operated by the organization that operates the home network 2, by a third-party, or the like). The remote secure network 5 randomizes the packets through various relays within the secure remote network 5, or accesses a network of secure remote networks 5, and then ultimately sends the packets to the home network 4 (e.g., the original destination).
  • With respect to the randomized routings, in some embodiments the initial relay in the remote secure network 5 may create the entire routing; however, in other embodiments each relay within the secure network 5 may be determined by each successive relay and/or each relay may randomly determine the next successive relay. In this way, each relay may only be aware of the previous relay from which the packets were received and the next relay to which the packets will be sent. Consequently, each relay, and thus each system trying to identify the routing, will not know the origination of the packets (e.g., the sending system) or the destination of the packets (e.g., the receiving system).
  • Consequently, in addition to using wheat packets and chaff packets, the secure remote network 5 may be utilized by each user 4 outside of the home network 2 in order to provide additional security around routing the packets from potential unsecure networks 3 to the home network 2. For example, since each user 4 is using the secure remote network 5, all of the packets being sent through the remote secure network 5 create additional wheat and chaff packets that make it difficult to identify the wheat from the chaff.
  • As illustrated by block 160 of FIG. 4, the receiving system receives the plurality of packets for the communication. The receiving system then determines a validated signature for each of the plurality of packets. That is, the receiving system replicates a received signature from each of the plurality of packets (e.g., a wheat signature attached to the wheat packet, a chaff signature attached to the chaff packet) by using the pre-shared key and algorithm and/or a portion of the packets (e.g., content, serial number, or the like) to determine what the received signature should be.
  • Block 170 of FIG. 4 further illustrates that when the validated signature meets the received signature from the packets, the packets are identified as wheat packets. That is, for example, when the recreated signature determined by the receiving system meets the received signature included with the packet, the packet is identified as a wheat packet. Alternatively, as illustrated by block 180 in FIG. 4, when the validated signature fails to meet the received signature from the packets, the packets are identified as chaff packets. That is, for example, when the recreated signature determined by the receiving system fails to meet the received signature included with the packets, the packet is identified as a chaff packet. When the packets are identified by the receiving system as chaff packets, the chaff packets are discarded by the receiving system.
  • Block 190 of FIG. 4 illustrates that the receiving system reads the one or more wheat packets to determine the communication. In some embodiments when a plurality of wheat packets (e.g., sub-packets) are identified, the receiving system reassembles the plurality of wheat packets together to form the communication. In some embodiments the wheat packets may have wheat packet identifiers (e.g., sequential characters, or the like) that may be used to reassemble the wheat packets. Alternatively, or additionally, the pre-shared key and/or the algorithm may be used to determine the order of the plurality of packets in order to read the communication.
  • FIG. 4 further illustrates in block 195 that the security system network environment 300 described herein prevents the networks and/or systems thereof, such as the unsecured networks 3 from reading any communications made by the users 4 (e.g., travelers) using the user computer systems 20 that are being sent back to the home network 2. It should be understood that when users 4 are operating on networks in some areas (e.g., some countries, or within some businesses), the networks may be unsecured networks 3. For example, some unsecured networks 3 may require the users 4 and/or user computer systems 20 to provide the unsecure network 3 (or systems operating the unsecure network 3) any encryption keys that are traditionally used to encrypt communications, and in particular, encrypt the text of the packets used to send the communications. However, since the packets are being sent in clear text, any encryption key provided to the unsecured network 3 and/or the system thereof, is useless. As such, without the pre-shared key and the algorithm the unsecured network 3 and/or any system operating thereon is unable to determine what packets are wheat packets and what packets are chaff packets. Furthermore, it should be understood that any other rogue system trying to identify the communication as it is being sent from the unsecured network 3 to the home network 2 would be unable to determine the correct communication because it also does not have the ability to determine the wheat packets from the chaff packets. Moreover, when the remote secure network 3 is utilized, the routing of the packets and/or the IP addresses of the sending system, receiving system, and/or relays for the packets may also be secured through the use of randomized routings. Consequently, the use of the remote secure network 3 provides additional security to the communication.
  • FIG. 5 illustrates a process for obfuscating a sending entity, a receiving entity, and/or the routing of the of a communication across networks and/or relays. As such, alternatively or in addition to obfuscating the details of a communication using wheat packets and chaff packets as previously described herein, FIG. 5 provides a process for providing additional security measures. That is, while a potential misappropriator may not be able to determine the subject matter of a particular communication, such as if the process described with respect to FIG. 4 is implemented, the potential misappropriator may be able to determine information about the communication based on determining the identity of the sending entity, the receiving entity, and/or the routing of the communication. For example, some governments, individuals, organizations or the like may track the sending entities, receiving entities, routings, locations of forgoing, network from which and to which the communications are being sent, or the like in order to identity potential information related to the communication. Examples, may include monitoring the foregoing information in order to identify potential inside stock market information (e.g., communications between organizations that indicate potential mergers, joint development), political dissidents (e.g., governments monitor protestors, or the like), identify information that may aid in determining user account information (e.g., individuals gaining information that could be used to access customer accounts), or the like.
  • Block 210 of FIG. 5 illustrates that if a user is planning on traveling or otherwise planning on sending communications within a network or across networks a pre-shared sky and algorithm may be provided to the user for providing security for communications. For example, such a user plan on using a second network (e.g., an unsecured network) to communicate with a first network (e.g., a home network), the first network or a system thereof may provide a pre-shared key and/or a pre-shared algorithm for the user computer system 20 to utilize when communicating with the first network, as previously discussed with respect to block 110 of FIG. 4. As such, the agent application previously described herein may include a pre-shared key that is used to create the wheat signatures for the wheat packets and/or potions thereof. Additionally, the agent application of each of the systems 20 that will communicate with the network 2 (e.g., home network 2) from a remote network 3 may also have a pre-shared algorithm or at least an indication to utilize a type of algorithm to create signatures for the communications. The pre-shared key and algorithm may be utilized by the users 4 to communicate with the home network 2 from a remote network 3. Alternatively, or additionally, the process described with respect to FIG. 5 may be utilized to within a single network 2 (e.g., between systems on the first network).
  • FIG. 5 further illustrates in block 220 that the sending system creates a plurality of packets for a communication with other systems. For example, the plurality of packets may be created for a communication between systems on a network (e.g., on a home network). In other examples, the sending system creates a plurality of packets for a communication with a receiving system on a home network 2, while the sending system is using a remote network 3 (e.g., a potentially unsecured network 3). The packets may contain the content of the communication, packet information (e.g., packet identifiers, or the like), the receiving entity (e.g., the receiving system) to which the packets are to be sent, the sending entity (e.g., the sending system) which is sending the communication, the routing of communication (e.g., the one or more hosts through which the communication will be routed), or other like information. The plurality of packets created by the sending system may comprise the one or more wheat packets and the one or more chaff packets, as previously described herein. The one or more wheat packets are the actual packets for the communication and may include a data packet portion, an IP packet portion, and a routing packet portion. The data packet portion may be wrapped within the IP packet portion, which may be wrapped within the routing packet portion. Consequently, as will be discussed in further detail herein with respect to blocks 230 to 234, it should be understood that one or more of any of the fields within the data packet portion, the IP packet portion, and the routing packet portion may be obfuscated without encryption by utilizing wheat packets that contain the actual information and chaff packets that contain the imitation information.
  • As previously described herein, the wheat packets for a communication may be split up into a plurality of wheat packets in order to improve the security of the communication. The one or more chaff packets, as previously described herein, may comprise imitation packets that look like wheat packets, real packets for an unrelated communication (e.g., wheat packets for past or current unrelated communications on the network 2), or the like. When the agent application on the sending system creates the one or more chaff packets, the sending system may use a chaff packet algorithm (e.g., imitation packet generation, or the like). When the chaff packets are wheat packets from unrelated communications, the legitimate packets may be randomized (e.g., XORed, or the like with a log of network communications and/or salted using a pre-computed salt value, or the like).
  • Block 230 of FIG. 5 illustrates that the plurality of datagram packets are created, which may include one or more wheat datagram packets and one or more chaff datagram packets. FIG. 6 illustrates one example of a datagram packet 300 (e.g., a TCP datagram, or the like); however, it should be understood that any type of datagram packet may be utilized and the illustrated datagram packet 300 is for illustrative purposes only. As illustrated in FIG. 6, the datagram packet 300 may include a segment header section 310 and a datagram data section 350. The segment header 310 may include some mandatory fields (e.g., 10 mandatory fields) and an extension section that is optional. The segment header 310 includes the source port 312 (e.g., identification of the source); destination port 314 (e.g., identification of the destination); a sequence number 316 (e.g., sequence for multiple packets); acknowledgment number 318 (e.g., acknowledgment of the sequence numbers by each end); data offset 320 (e.g., size of header); reserved 322 (e.g., reserved for use in the future); flags 324 (e.g., 9 separate 1-bit flags which may or may not be used); window size 326 (e.g., provides size of the packet segment); checksum 328 (e.g., used for error checking of the segment header 310, the data section 350, and/or the IP packet header (described below)); pointer 330 (e.g., offset of the sequence number indicating the an urgent data byte); and/or options 332 (e.g., optional information). The one or more wheat datagram packets will contain the actual datagram packet and the one or more chaff datagram packets may be created or may be real unrelated datagram packets. The chaff datagram packets may be used in order to make it difficult for anyone (e.g., a potential misappropriator) to identify the wheat datagram packet from the chaff datagram packets without being able to identify the verified signature).
  • FIG. 5 further illustrates in block 232 that the plurality of IP packets are created, which may include one or more wheat IP packets and one or more chaff IP packets. FIG. 7 illustrates on embodiment of an IP packet 400; however, it should be understood that any type of IP packet may be utilized, and the illustrated IP packet 400 is for illustrative purposes only. As illustrated in FIG. 7, the IP packet 400 may also have an IP header section 410 and IP data section 450. The IP header section 410 may comprise a version 412 (e.g., version of the packet); an internet header length (IHL) 414 (e.g., indicates the size of the header); a differentiated services code point (DSCP) 416 (e.g., specifies the services related to the communication); an explicit congestion notification (ECN) 418 (e.g., allows notification of network congestion without dropping packets); a total length 420 (e.g., defines the entire packet length); an identification 422 (e.g., uniquely identifying the group of fragments of a single IP packet); flags 424 (e.g., used to control or identify fragments); fragment offset 426 (e.g., specifies the offset of a fragment relative to the original IP packet); time to live (TTL) 428 (e.g., prevents persisting IP packets); protocol 430 (e.g., defines the protocol used for the data in the IP packet); header checksum 432 (e.g., error-checking the header); source address 434 (e.g., IP address of the sender); destination address 436 (e.g., IP address of the receiver); and options 438 (e.g., for providing additional information). The one or more wheat IP packets will contain the actual IP packets and the one or more chaff IP packets may be created or may be real unrelated IP packets may be used. The chaff IP packets may be used in order to make it difficult for anyone (e.g., a potential misappropriator) to identify the wheat IP packet from the chaff datagram packet without being able to identify the verified signature.
  • Block 234 of FIG. 5 illustrates that the plurality of routing packets are created, which may include one or more wheat routing packets and one or more chaff routing packets. FIG. 8 illustrates one example of a routing packet 500; however, it should be understood that any type of routing packet may be utilized, and the illustrated routing packet 400 is for illustrative purposes only. The routing packet 500 may include a routing header section 510 and a routing data section 550. The routing header section 510 may include a marker 512 (e.g., provides compatibility); a length 514 (e.g., provides total length of the message); and a type 516 (e.g., includes type of message). The routing data section 550 of the routing packet establishes how to rout the packet between two or more locations. For example, the entire routing path, a portion of the routing path, or a single routing path between two points for the packet may be included in the routing packet 500. That is, the routing path from the sending system to the receiving system may be provided, or a portion may be provided, and each relay (e.g., host system) determines the next routing of the packets. In some embodiments, the hosts may be able to determine the entire routing of the communication, while in other embodiments the each host may only be able to determine the next host to which to route the communication (e.g., the packets thereof).
  • It should be understood that depending on a level of security a sending system and/or received system would like for a communication, the sending system may use wheat and chaff packet portions for one or more of the datagram packet, the IP packet, and/or the routing packet. For example, the sending system may create a wheat datagram packet with the actual information for the communication. The chaff datagram packet may include imitation information for any information in the chaff datagram segment header 310, including the source 312, the destination 314, and/or the like or the in the datagram data 350 itself. The sending system may also create a wheat IP packet with the actual information for the communication. Moreover, the chaff IP packet may include imitation information for any of the information in the IP header 410, such as the source IP address 434, the destination IP address 436, or the like, or the IP packet data packet 450. The sending system may also create a wheat routing packet with the actual information for the communication. Moreover, the chaff routing packet may include imitation information for any of the information in the routing header 510 and/or the routing data 550. For example, the chaff packets may change the sending systems, the receiving systems, the hosts within the routing, the path length (e.g., short hop length, longer hop length, or the like), length of connections, or the like.
  • It should be understood that the datagram packet 300, the IP packet 400, and/or the routing packet 500 are operatively coupled together. For example, the datagram packet 300 is located within the IP packet 400 (e.g., the datagram packet is located within the envelope of the IP packet 400) and the IP packet 400 is located within the routing packet 500 (e.g., the IP packet 400 is located within the envelope of the routing packet 500).
  • FIG. 5 further illustrates in block 240 that the wheat packet portions are signed with a wheat signature while the chaff packets are assigned a chaff signature (e.g., created and attached to the chaff packets, a modified signature of an old packet is created, a old signature of a packet is utilized, or the like). It should be understood that any number of the fields within the datagram packet 300, the IP packet 400, and/or the routing packet 500 may be signed with a wheat signature (e.g., for the packets that have the actual information) or a chaff signature (e.g., for the packets that have the imitation information). In some embodiments the datagram packet 300 may include the signature (e.g., wheat signature or chaff signature), such as within the sequence number 316, the acknowledgment 318, the flags 324, the checksum 328, or the like. As such, only the entities that are able to determine the verified signature, for example using the key (e.g., pre-shared key) and/or the algorithm (e.g., pre-shared algorithm), are able to determine a wheat datagram packet from a chaff datagram packet. Alternatively, or additionally, the IP packet 400 may include the signature (e.g., wheat signature or chaff signature), such as within the identification 422, the flags 424, the header checksum 432, or the like. Consequently, only the systems that can determine a validate signature (e.g., using the key and/or algorithm) are able to determine a wheat IP packet from a chaff datagram packet. Alternatively, or additionally, the routing packet 500 may include the signature (e.g., wheat signature or chaff signature), such as in the marker 512, the routing data 550 itself, or the like. As such, only the systems that can determine the validated signature (e.g., have the key and/or algorithm) are able to determine the wheat routing packets from the chaff routing packets.
  • After the one or more wheat packets (e.g., each including the wheat datagram packet, the wheat IP packet, and/or the wheat routing packet) are created, and/or the one or more chaff packets (e.g., each including the chaff datagram packet, the chaff IP packet, and/or the chaff routing packet) are identified (e.g., created, captured, or the like), the plurality of packets are routed. For example, between systems within a network, or from the remote network (e.g., the unsecured network) to the one or more relays (e.g., one or more hosts for routing between one or more intermediate networks) and to the destination receiving system on the home network.
  • FIG. 5 illustrates in block 250 that the plurality of packets are sent from the sending system to the receiving system directly within the first network or between networks back to the home network through one or more relays. For example, as previously discussed with respect to FIG. 4, the packets may be sent through the remote secure network 5. In some embodiments each of the relays (e.g., hosts), within the remote secure network 5 through which the packets are routed need to recreate a validated signature (e.g., using the pre-shared key and/or algorithm) in order to determine what packets are the wheat packets and what packets are the chaff packets, and how the packets should be routed back to the home network 2. In some embodiments of the invention, each of the relays (e.g., hosts) do not need to determine a validated signature (e.g., using the pre-shared key and/or the pre-shared algorithm) since only the sending system and/or the receiving system, and/or a portion of the routing is being obfuscated using the wheat and chaff packets.
  • Moreover, block 260 of FIG. 5 illustrates that each system that accesses the packets determines a validated signature for each of the packets. For example, each relay, such as one or more hosts systems, used to route the communication between systems and/or networks determines a validated signature for each of the plurality of packets (e.g., from sections of the datagram packet 300, the IP packet 400, and/or the routing packet 500). In other examples, as previously discussed, the receiving system on the home network determines a validated signature from each of the plurality of the packets or portions thereof (e.g., from sections of the datagram packet 300, the IP packet 400, and/or the routing packet 500) in order to determine what packets are the wheat packets and what packets are the chaff packets. In other examples, should any system be unable to recreate a validated signature (e.g., should any system not have the pre-shared key and/or pre-shared algorithm), such as a potential misappropriator, the system would be not able to determine what entity was the sending system, what entity was the receiving system, the routing information for the communication, and/or the communication content.
  • Block 270 of FIG. 5 further illustrates that when the validated signature meets the received signature from the packets or portions of the packets, the packets are identified as wheat packets. That is, for example, when the recreated signature determined by the host system meets the received signature included withing the packets or portions thereof (e.g., the portions of the datagram packet 300, the IP packet 400, and/or the routing packet 500), the packet is identified as a wheat packet. Alternatively, as illustrated by block 280 in FIG. 5, when the validated signature fails to meet the received signature from the packets or the portions thereof (e.g., the portions of the datagram packet 300, the IP packet 400, and/or the routing packet 500), the packets are identified as chaff packets. That is, for example, when the recreated signature determined by the host system fails to meet the received signature included with the packets, the packet is identified as a chaff packet. When the packets are identified by the host system as chaff packets, the chaff packets are discarded by the host system. However, in some embodiments it should be understood that when the host system identifies chaff packets, instead of discarding the chaff packets, the chaff packets may be sent onto the next host system in the routing (e.g., the host in the routing). Alternatively, each of the host systems may utilize (e.g., create or identify) new chaff packets or portions thereof (e.g., the datagram packet 300, the IP packet 400, and/or the routing packet 500), as previously described herein, for routing the what packets and chaff packets to the next host system within the routing.
  • As previously discussed with respect to block 190 of FIG. 4, when the communication has been obfuscated using wheat packets and chaff packets, when the packets reach the receiving system that is the destination, the receiving system identifies the one or more wheat packets in order to determine the communication from the sending system. In some embodiments when a plurality of wheat packets (e.g., sub-packets) are identified, the receiving system reassembles the plurality of wheat packets together to form the communication. In some embodiments the wheat packets may have wheat packet identifiers (e.g., sequential characters, or the like) that may be used to reassemble the wheat packets. Alternatively, or additionally, the pre-shared key and/or the algorithm may be used to determine the order of the plurality of packets in order to read the communication.
  • As previously discussed with respect to block 195 in FIG. 4 the security system network environment 300 described herein not only prevents the networks and/or systems thereof, such as the unsecured networks 3, from determining what is the correct content being transmitted by the packets (e.g., because the other networks and/or systems are not able to determine what packets are wheat packets and what packets are chaff packets), but the process of FIG. 5 illustrates how the sending system, the destination system, and/or the routing of the packets may be obfuscated such that any system that is unable to determine a validated signature is unable to determine the sending system, the destination system, and/or the routing of the packets.
  • It should be understood that even when the content of a communication is encrypted, or otherwise obfuscated (e.g., as previously discussed with respect to FIG. 4), information may be still be determined about the communication from determining the identity of the sending entity, the receiving entity, and/or the routing the communication (e.g., low number hop, large number of hops, patterns of the routings, locations from which and to which the communications are routed, or the like). That is, while a potential misappropriator may not be able to determine the subject matter of a particular communication, the potential misappropriator may be able to determine information about the communication based on determining the identity of the sending entity, the receiving entity, and/or the routing of the communication. For example, some governments, individuals, organizations or the like may track the sending entities, receiving entities, routings, locations of forgoing, network from which and to which the communications are being sent, or the like in order to identity potential information related to the communication. Examples, may include monitoring the foregoing information in order to identify potential inside stock market information (e.g., communications between organizations that indicate potential mergers, joint development), political dissidents (e.g., governments monitor protestors, or the like), identify information that may aid in determining user account information (e.g., individuals gaining information that could be used to access customer accounts), or the like. As such, the present invention provide obfuscation of a sending entity, a receiving entity, and/or the routing of the of a communication across networks and/or relays.
  • The present disclosure provides an improved way for systems to communicate back to a home network 2 from an unsecured network 3 without encrypting the content of the packets being sent for the communication. Moreover, the present disclosure provides an improved way to prevent systems on an unsecure network, systems on intermediate networks through which the communication is sent, and/or a rogue system on a home network 2 from determining the actual communication, receiving system, sending system, and routing without having to encrypt the communication. The present disclosure improves the processing capacity, the memory, and the processing speeds typically required when each of the packets for a communication requires encryption. That is, typical encryption processes require more processing capacity and memory, and more processing time to encrypt and decrypt each communication over networks.
  • It should be understood, that the systems described herein may be configured to establish a communication link (e.g., electronic link, or the like) with each other in order to accomplish the steps of the processes described herein. The link may be an internal link within the same entity (e.g., within the same organization) or a link with the other entity systems. In some embodiments, the one or more systems may be configured for selectively monitoring the resource usage and availability. These feeds of resource usage and availability may be provided via wireless network path portions through the Internet. When the systems are not providing data, transforming data, transmitting the data, and/or the like, the systems need not be transmitting data over the Internet, although it could be. The systems and associated data for each of the systems may be made continuously available, however, continuously available does not necessarily mean that the systems actually continuously generate data, but that systems are continuously available to perform actions associated with the systems in real-time (i.e., within a few seconds, or the like) of receiving a request for it. In any case, the systems are continuously available to perform actions with respect to the data, in some cases in digitized data in Internet Protocol (IP) packet format. In response to continuously monitoring the real-time data feeds from the various systems, the systems may be configured to update activities associated with the systems, as described herein.
  • Moreover, it should be understood that the process flows described herein include transforming the data from the different systems (e.g., internally or externally) from the data format of the various systems to a data format for display on other systems. There are many ways in which data is converted within the computer environment. This may be seamless, as in the case of upgrading to a newer version of a computer program. Alternatively, the conversion may require processing by the use of a special conversion program, or it may involve a complex process of going through intermediary stages, or involving complex “exporting” and “importing” procedures, which may be converting to and from a tab-delimited or comma-separated text file. In some cases, a program may recognize several data file formats at the data input stage and then is also capable of storing the output data in a number of different formats. Such a program may be used to convert a file format. If the source format or target format is not recognized, then at times a third program may be available which permits the conversion to an intermediate format, which can then be reformatted.
  • As will be appreciated by one of skill in the art in view of this disclosure, embodiments of the invention may be embodied as an apparatus (e.g., a system, computer program product, and/or other device), a method, or a combination of the foregoing. Accordingly, embodiments of the invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.” Furthermore, embodiments of the invention may take the form of a computer program product comprising a computer-usable storage medium having computer-usable program code/computer-readable instructions embodied in the medium (e.g., a non-transitory medium, or the like).
  • Any suitable computer-usable or computer-readable medium may be utilized. The computer usable or computer readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires; a tangible medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other tangible optical or magnetic storage device.
  • Computer program code/computer-readable instructions for carrying out operations of embodiments of the invention may be written in an object oriented, scripted or unscripted programming language such as Java, Pearl, Python, Smalltalk, C++ or the like. However, the computer program code/computer-readable instructions for carrying out operations of the invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • Embodiments of the invention described above, with reference to flowchart illustrations and/or block diagrams of methods or apparatuses (the term “apparatus” including systems and computer program products), will be understood to include that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a particular machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create mechanisms for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instructions, which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions, which execute on the computer or other programmable apparatus, provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. Alternatively, computer program implemented steps or acts may be combined with operator or human implemented steps or acts in order to carry out an embodiment of the invention.
  • Specific embodiments of the invention are described herein. Many modifications and other embodiments of the invention set forth herein will come to mind to one skilled in the art to which the invention pertains, having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments and combinations of embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (20)

What is claimed is:
1. A security system for securely sending communications using a plurality of packets, the system comprising:
one or more memory devices with computer-readable program code stored thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer-readable program code to:
create one or more wheat packets for a communication, each of the one or more wheat packets comprise a wheat datagram packet portion, a wheat IP packet portion, and a wheat routing packet portion;
attach a wheat signature to at least one field within the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion, wherein the wheat signature is created using a pre-shared key; and
utilize one or more chaff packets for the communication, each of the one or more chaff packets comprise a chaff datagram packet portion, a chaff IP packet portion, and a chaff routing packet portion, and wherein a chaff signature is attached to at least one field within the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion;
wherein the plurality of packets comprises the one or more wheat packets and the one or more chaff packets are routed through one or more hosts; and
wherein the one or more hosts receive the plurality of packets for the communication, and wherein one or more processing devices of the one or hosts are configured to execute computer readable code to:
determine a validated signature for each of the plurality of packets;
identify the one or more chaff packets when the at least one field of the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion has the chaff signature that fails to meet the validated signature;
identify the one or more wheat packets when the at least one field of the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion meets the validated signature; and
determine a routing for the one or more wheat packets;
wherein one or more other systems are prevented from determining a sending entity, a receiving entity, or the routing for the communication without identifying the one or more wheat packets or the one or more chaff packets from the plurality of packets using the validated signature.
2. The system of claim 1, wherein the one or more processing devices are further configured to execute the computer-readable program code to:
receive the pre-shared key for the communications.
3. The system of claim 1, wherein determining the validated signature comprises replicating a received signature for the plurality of packets, wherein the received signature is the chaff signature of the one or more chaff packets or the wheat signature of the one or more wheat packets.
4. The system of claim 3, wherein the received signature comprises a message authentication code (MAC), and wherein replicating the MAC comprises:
using the pre-shared key and an algorithm to create the validated signature.
5. The system of claim 4, wherein the algorithm is a pre-shared algorithm that is shared with the system for the communications.
6. The system of claim 4, wherein replicating the received signature further comprises:
using at least a portion of the plurality of packets to determine the validated signature.
7. The system of claim 1, wherein one or more wheat signatures are attached to at least two of the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
8. The system of claim 1, wherein one or more chaff signatures are attached to at least two of the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
9. The system of claim 1, wherein one or more wheat signatures are attached to the wheat datagram packet portion, the wheat IP packet portion, and the wheat routing packet portion.
10. The system of claim 1, wherein one or more chaff signatures are attached to the chaff datagram packet portion, the chaff IP packet portion, and the chaff routing packet portion.
11. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is a sequence number field of the wheat datagram packet portion or the chaff datagram packet portion.
12. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is an acknowledgement field of the wheat datagram packet portion or the chaff datagram packet portion.
13. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is one or more flag fields of the wheat datagram packet portion or the chaff datagram packet portion.
14. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is a checksum field of the wheat datagram packet portion or the chaff datagram packet portion.
15. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is an identification of the wheat IP packet portion or the chaff IP packet portion.
16. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is one or more flags of the wheat IP packet portion or the chaff IP packet portion.
17. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is a header checksum of the wheat IP packet portion or the chaff IP packet portion.
18. The system of claim 1, wherein the at least one field to which the wheat signature or the chaff signature is attached is a field of the wheat routing packet portion or the chaff routing packet portion.
19. A computer implemented method for securely sending communications using a plurality of packets, the method comprising:
creating, by one or more processing components, one or more wheat packets for a communication, each of the one or more wheat packets comprise a wheat datagram packet portion, a wheat IP packet portion, and a wheat routing packet portion;
attaching, by the one or more processing components, a wheat signature to at least one field within the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion, wherein the wheat signature is created using a pre-shared key; and
utilizing, by the one or more processing components, one or more chaff packets for the communication, each of the one or more chaff packets comprise a chaff datagram packet portion, a chaff IP packet portion, and a chaff routing packet portion, and wherein a chaff signature is attached to at least one field within the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion;
wherein the plurality of packets comprises the one or more wheat packets and the one or more chaff packets are routed through one or more hosts; and
wherein the one or more hosts receive the plurality of packets for the communication, and wherein one or more processing components of the one or more hosts:
determine a validated signature for each of the plurality of packets;
identify the one or more chaff packets when the at least one field of the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion has the chaff signature that fails to meet the validated signature;
identify the one or more wheat packets when the at least one field of the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion meets the validated signature; and
determine a routing for the one or more wheat packets;
wherein one or more other systems are prevented from determining a sending entity, a receiving entity, or the routing for the communication without identifying the one or more wheat packets or the one or more chaff packets from the plurality of packets using the validated signature.
20. A computer program product for securely sending communications using a plurality of packets, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
an executable portion configure to create one or more wheat packets for a communication, each of the one or more wheat packets comprise a wheat datagram packet portion, a wheat IP packet portion, and a wheat routing packet portion;
an executable portion configure to attach a wheat signature to at least one field within the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion, wherein the wheat signature is created using a pre-shared key; and
an executable portion configure to utilize one or more chaff packets for the communication, each of the one or more chaff packets comprise a chaff datagram packet portion, a chaff IP packet portion, and a chaff routing packet portion, and wherein a chaff signature is attached to at least one field within the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion;
wherein the plurality of packets comprising the one or more wheat packets and the one or more chaff packets are routed through one or more hosts; and
wherein the one or more hosts receive the plurality of packets for the communication, and
determine a validated signature for each of the plurality of packets;
identify the one or more chaff packets when the at least one field of the chaff datagram packet portion, the chaff IP packet portion, or the chaff routing packet portion has the chaff signature that fails to meet the validated signature;
identify the one or more wheat packets when the at least one field of the wheat datagram packet portion, the wheat IP packet portion, or the wheat routing packet portion meets the validated signature; and
determine a routing for the one or more wheat packets;
wherein one or more other systems are prevented from determining a sending entity, a receiving entity, or the routing for the communication without identifying the one or more wheat packets or the one or more chaff packets from the plurality of packets using the validated signature.
US16/990,180 2020-08-11 2020-08-11 Secure communication routing for remote devices Active 2040-11-03 US11265255B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/990,180 US11265255B1 (en) 2020-08-11 2020-08-11 Secure communication routing for remote devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16/990,180 US11265255B1 (en) 2020-08-11 2020-08-11 Secure communication routing for remote devices

Publications (2)

Publication Number Publication Date
US20220052957A1 true US20220052957A1 (en) 2022-02-17
US11265255B1 US11265255B1 (en) 2022-03-01

Family

ID=80223437

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/990,180 Active 2040-11-03 US11265255B1 (en) 2020-08-11 2020-08-11 Secure communication routing for remote devices

Country Status (1)

Country Link
US (1) US11265255B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220321551A1 (en) * 2021-03-30 2022-10-06 Bank Of America Corporation System for dynamic chaffing for log obfuscation based on shifting exposure portfolio
US11570180B1 (en) * 2021-12-23 2023-01-31 Eque Corporation Systems configured for validation with a dynamic cryptographic code and methods thereof

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US6275587B1 (en) 1998-06-30 2001-08-14 Adobe Systems Incorporated Secure data encoder and decoder
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7328457B1 (en) 1999-06-30 2008-02-05 Entrust Limited Method and apparatus for preventing interception of input data to a software application
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US20070245417A1 (en) 2006-04-17 2007-10-18 Hojae Lee Malicious Attack Detection System and An Associated Method of Use
US8272051B1 (en) 2008-03-27 2012-09-18 Trend Micro Incorporated Method and apparatus of information leakage prevention for database tables
US8351605B2 (en) 2009-09-16 2013-01-08 International Business Machines Corporation Stealth message transmission in a network
WO2016088453A1 (en) 2014-12-04 2016-06-09 日本電気株式会社 Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program
US11019075B2 (en) * 2018-06-26 2021-05-25 Cisco Technology, Inc. Providing processing and network efficiencies in protecting internet protocol version 6 segment routing packets and functions using security segment identifiers

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220321551A1 (en) * 2021-03-30 2022-10-06 Bank Of America Corporation System for dynamic chaffing for log obfuscation based on shifting exposure portfolio
US11902273B2 (en) * 2021-03-30 2024-02-13 Bank Of America Corporation System for dynamic chaffing for log obfuscation based on shifting exposure portfolio
US11570180B1 (en) * 2021-12-23 2023-01-31 Eque Corporation Systems configured for validation with a dynamic cryptographic code and methods thereof

Also Published As

Publication number Publication date
US11265255B1 (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US7177932B2 (en) Method, gateway and system for transmitting data between a device in a public network and a device in an internal network
US9509681B2 (en) Secure instant messaging system
US7853783B2 (en) Method and apparatus for secure communication between user equipment and private network
EP1635502B1 (en) Session control server and communication system
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
JPWO2010150813A1 (en) Encryption key distribution system
US11271919B2 (en) Network security system for rogue devices
US11265255B1 (en) Secure communication routing for remote devices
US11784819B2 (en) Dynamic segmentation of network traffic by use of pre-shared keys
US11558362B2 (en) Secure communication for remote devices
US20220232000A1 (en) Secure communication system
CN114125027A (en) Communication establishing method and device, electronic equipment and storage medium
JP2007148903A (en) Attribute certificate processing system, attribute certification request device, attribute certificate issuing device, attribute verification device, attribute certification request method, attribute certificate issuing method, attribute verification method and program
US20220368688A1 (en) Secure communication system
US11595367B2 (en) Selectively disclosing content of data center interconnect encrypted links
CN113132323A (en) Communication method and device
JP6075871B2 (en) Network system, communication control method, communication control apparatus, and communication control program
CN113709100B (en) Shared file access control method, device, equipment and readable storage medium
JP2005167967A (en) Anonymous communication method
US11171988B2 (en) Secure communication system and method for transmission of messages
Trenwith FReadyPass: Creating Digital Passports to Track the Location of Data in the Cloud
EP4323898A1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
CN117560168A (en) SRv6 message generation and transmission method based on zero trust

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SLOANE, BRANDON;CADAVID, REGINA YEE;JOO, GLORIA;AND OTHERS;SIGNING DATES FROM 20200729 TO 20200810;REEL/FRAME:053456/0471

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE