US 12,335,160 B2
Secure data routing with dynamic packet spoofing
John G. Andrews, Cleveland Heights, OH (US); and John P. Keyerleber, Richmond Heights, OH (US)
Assigned to SCATR LLC, Sheridan, WY (US)
Filed by SCATR LLC, Sheridan, WY (US)
Filed on Jun. 30, 2023, as Appl. No. 18/345,847.
Prior Publication US 2025/0007852 A1, Jan. 2, 2025
Int. Cl. H04L 47/431 (2022.01); H04L 9/40 (2022.01); H04L 45/24 (2022.01); H04L 69/08 (2022.01)
CPC H04L 47/431 (2022.05) [H04L 45/24 (2013.01); H04L 63/1483 (2013.01); H04L 69/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of secure data routing with dynamic packet spoofing, comprising:
receiving, by a scatter network node comprising at least one non-transitory memory and at least one processor, a plurality of data packets from a user communication device;
selecting, by a scattering application stored in the at least one non-transitory memory and executable by the at least one processor, a logical communication channel of a plurality of logical communication channels;
receiving, by a channel controller stored in the at least one non-transitory memory and executable by the at least one processor, channel information corresponding to the logical communication channel, wherein the channel information comprises a size limit corresponding to data packets being transmitted over the logical communication channel;
modifying, by the channel controller, a data packet of the plurality of data packets based on the channel information such that a size of the modified data packet satisfies the size limit;
encrypting, by the scattering application, a portion of the modified data packet;
wrapping, by a channel adapter associated with the logical communication channel and stored in the at least one non-transitory memory and executable by the at least one processor, the modified data packet to correspond to a particular protocol that is different than an initial protocol of the modified data packet, wherein data packets being transmitted over the logical communication channel comprise the particular protocol; and
transmitting the modified data packet wrapped to correspond to the particular protocol via the logical communication channel to a counterpart scatter network device, wherein the modified data packet wrapped to correspond to the particular protocol is obfuscated with other traffic on the logical communication channel.