-
公开(公告)号:US11991788B2
公开(公告)日:2024-05-21
申请号:US18126126
申请日:2023-03-24
申请人: Listat Ltd.
IPC分类号: H04W88/16 , H04L9/40 , H04L12/28 , H04L65/102 , H04L65/1069 , H04W4/06 , H04W12/03 , H04W28/12 , H04W84/12 , H04W88/06
CPC分类号: H04W88/16 , H04L12/28 , H04L63/0428 , H04L63/18 , H04L63/30 , H04L65/102 , H04L65/1069 , H04W4/06 , H04W12/03 , H04W28/12 , H04W84/12 , H04W88/06
摘要: A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.
-
公开(公告)号:US20180241727A1
公开(公告)日:2018-08-23
申请号:US15946863
申请日:2018-04-06
申请人: Listat Ltd.
CPC分类号: H04L63/0464 , G06F21/606 , H04L9/0662 , H04L9/34 , H04L63/102
摘要: In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of a packet and the methods used to disguise the data are constantly changing.
-
公开(公告)号:US20230254944A1
公开(公告)日:2023-08-10
申请号:US18126126
申请日:2023-03-24
申请人: Listat Ltd.
IPC分类号: H04W88/16 , H04L65/1069 , H04W4/06 , H04L65/102 , H04W28/12 , H04L12/28 , H04L9/40 , H04W12/03
CPC分类号: H04W88/16 , H04L65/1069 , H04W4/06 , H04L65/102 , H04W28/12 , H04L12/28 , H04L63/18 , H04L63/30 , H04L63/0428 , H04W12/03 , H04W84/12
摘要: A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.
-
公开(公告)号:US11696367B2
公开(公告)日:2023-07-04
申请号:US17017506
申请日:2020-09-10
申请人: Listat Ltd.
IPC分类号: H04W88/16 , H04L65/1069 , H04W4/06 , H04L65/102 , H04W28/12 , H04L12/28 , H04L9/40 , H04W12/03 , H04W84/12 , H04W88/06
CPC分类号: H04W88/16 , H04L12/28 , H04L63/0428 , H04L63/18 , H04L63/30 , H04L65/102 , H04L65/1069 , H04W4/06 , H04W12/03 , H04W28/12 , H04W84/12 , H04W88/06
摘要: A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.
-
公开(公告)号:US09998434B2
公开(公告)日:2018-06-12
申请号:US14803869
申请日:2015-07-20
申请人: Listat Ltd.
CPC分类号: H04L63/0464 , G06F21/606 , H04L9/0662 , H04L9/34 , H04L63/102
摘要: In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of a packet and the methods used to disguise the data are constantly changing.
-
-
-
-