发明名称 Stealth packet switching
摘要 Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical networks using specially modified “stealth” packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets, network elements, and networks to have a low probability of detection, interception, and interpretation. The “stealth” packets, switches, networks, and methods provide invisibility or “cloaking” by modifying previously existing standards rules for packet structures, protocols, timing, synchronization, and other elements.;Stealth packets, network elements, and networks may be further enhanced with encryption techniques by encrypting various parts of, or the entire packet structure itself, for example, headers, preambles, payload, and/or other packet elements. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques.
申请公布号 US9306977(B2) 申请公布日期 2016.04.05
申请号 US201313815801 申请日期 2013.03.15
申请人 发明人 Howe Wayne Richard
分类号 H04L12/28;H04L29/06;H04L12/853;H04J3/06;H04L12/931;H04L12/947 主分类号 H04L12/28
代理机构 代理人
主权项 1. A method for transferring information structures, comprising the steps of: receiving a first information structure with rule violations; modifying said first information structure such that said rule violations are removed, thereby forming a second information structure without said rule violations; and wherein said rule violations comprise one or more actions from the group consisting of violating packet structure rules, altering packet format, altering packet length, altering byte organization, violating content rules, violating pattern rules, causing bit rate violations, causing timing violations, causing synchronization violations, causing encoding violations, adding noise, causing amplitude violations, causing phase violations, causing strength violations, causing frequency violations, causing procedural violations, causing errors, causing faults, altering fields, violating protocol rules, adding one or more bits, deleting one or more bits, rearranging one or more bits, transposing one or more bits, transforming one or more bits, substituting one or more bits, permutating one or more bits, inverting one or more bits, scrambling bits, repeating bits, whitening bits, encrypting one or more bits, altering clock synchronization, altering clock phasing, altering clock timing, altering packet subsections, altering preambles, altering synchronization bits, altering start of frame delimiters, altering headers, altering trailers, and altering flags.
地址