Method for hierarchichal onion rings routing
A routing and onion technology, applied in the field of network security, can solve problems such as large computing load of gateways
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] Layered onion rings of the present invention such as figure 1 shown. When the network is built, the gateway G records the trusted nodes in the network (OP nodes in the network). Such as figure 1 As shown by the dotted line, the gateway G and the OP form a circular path.
[0080] Such as figure 1 As shown, the OP1 node is the initial node, which chooses the anonymity set {OP1, OP2, G}, which is called the first layer of routing. When the onion packet starts to transmit, since the next node pointed out in the packet is the OP2 node, and the OP2 node and the OP1 node are not adjacent nodes, the OP1 node establishes a new connection, assuming {OP1, F1, ..., OP2 }, this route is called the second-level route, which is equivalent to the next-level route. When the onion packet is transmitted to the OP2 node, the second-layer routing terminates and returns to the upper-layer routing, that is, re-enters the first-layer routing.
[0081] Attached below figure 2 The preferr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com