Sign In to Follow Application
View All Documents & Correspondence

A System For Peer To Peer Secured Communication

Abstract: The present invention relates to a system(100) for peer to peer secured communication. The present invention includes a client device(102), a directory authority node server(106), an entry node server(112), a middle node server(116), an exit node server(120), and a receiver device(104). The client device(102) executes computer-readable instructions to search for the node servers in the directory authority database(110). The client device(102) further executes computer-readable instructions to develop a secured network circuit of the entry node server(112), the middle node server(116), and the exit node server(120). The client device(102) sends the multi-layer encrypted message to the entry node server(112). The entry node server(112) further forwards the multi-layer encrypted message to the middle node server(116). The middle node server(116) further forwards the multi-layer encrypted message to the exit node server(120). The exit node server(120) sends the message to the receiver device(104).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
07 May 2020
Publication Number
46/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
ishasharmasharma1987@gmail.com
Parent Application

Applicants

Adaptive Security Global Corporate Pvt Ltd
602, Deepsikha Tower, 19 Rajendra Place Delhi Central Delhi 110008

Inventors

1. Ankush Kumari
602, Deepsikha Tower, 19 Rajendra Place Delhi Central Delhi 110008

Specification

The present invention relates to a system for communication. Most specifically the present invention relates to a system for peer to peer secured communication.
BACKGROUND OF THE INVENTION

Computers and other network devices are increasingly interconnected over private and public networks which expose them to an increased risk of attack. The use of electronic devices to access content on the network has grown significantly over the years. People are now getting information, share ideas, manage private lives, enjoy, and access websites via networks such as the Internet for many other reasons. As the Internet becomes an increasingly important part of modern-day communication and electronic commerce, protecting the privacy of electronic messages also becomes increasingly important. Just like mail, electronic messages travel in envelopes, that is, electronic envelopes. Protecting the privacy of electronic messages requires both safeguarding the contents of their envelopes and hiding the addresses on their envelopes. Both eavesdropping and traffic analysis are hard that makes the privacy of communication difficult and challenging. Though various techniques have been used to secure, encrypt and/or anonymize communications. However, these techniques are limited, complex to implement and / or inconvenient. These techniques may also have disadvantages for network communication such as increased packet size and decreased network communication speed. Furthermore, many users may not even know that these technologies are available.
US6266704B1 discloses The onion routing network is used to protect Internet initiators and responders against both eavesdropping and traffic analysis from other users of the Internet. In the onion routing of the invention, instead of making connections directly to the responding machine, users make connections through onion routers. The onion routing network allows the connection between the

initiator and responder to remain anonymous. Anonymous connections hide who is connected to whom and for what purpose from outside eavesdroppers.
The existing inventions are not able to overcome the problem associated with the current network communication technologies and security. The existing inventions are complex and are not easily accessible. Thus there is a need for the present invention to overcome the above mention problems.
OBJECTIVE OF THE INVENTION

The main objective of the present invention is to develop a secure system used to hide the identity of the user over the network for anonymous communication.
Another objective of the present invention is to prevent backtracking of the user IP Address.
Yet another objective of the present invention is to provide peer -to- peer communication with no middle data storing servers over the network.
Yet another objective of the present invention is to enhance message security as the message is encrypted at every node as it leaves from the sender till it reaches the destination.
Yet another objective of the present invention is to prevent location determination over the network.
Yet another objective of the present invention is to provide a multi-part stream file transfer.
Further objectives, advantages, and features of the present invention will become apparent from the detailed description provided hereinbelow, in which various embodiments of the disclosed invention are illustrated by way of example.
SUMMARY OF THE PRESENT INVENTION

The present invention relates to a system for peer to peer secured communication. The present invention includes a client device, a directory authority node server,

an entry node server, a middle node server, an exit node server, and a receiver device. The client device stores computer-readable instructions to execute the communication process. In an embodiment, the client device is including, but not limited to, a laptop, a tab, a smartphone, and a desktop. The directory authority node server includes a directory authority processor and a directory authority database. The directory authority processor executes computer-readable instructions for communication with the client device. The directory authority database stores list of available and trusted node servers that are being advertised by the directory authority node server. The client device executes computer- readable instructions to communicates with the directory authority processor and further executes computer-readable instructions to search for the entry node server, the middle node server, and the exit node server from the list of available list trusted node server in the directory authority database. The directory authority processor executes computer-readable instructions and communicates the list of recommended node servers to the client device. The node servers referred to as the entry node server, the middle node server, and the exit node server. Firstly the client device executes computer-readable instructions to randomly select the exit node server from the list of the node servers in the directory authority database. The client device further executes computer-readable instructions to randomly select the entry node server and the middle node server from the list of the node servers in the directory authority database. The client device further executes computer-readable instructions to develop a secured network circuit of the entry node server, the middle node server, and the exit node server. The entry node server includes an entry node server processor. The entry node server processor executes computer-readable instructions to receive the multi-layer encrypted message from the client device and forward the multi-layer encrypted message. The middle node server is connected to the entry node server. The middle node server includes a middle node server processor. The middle node server processor executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the entry node server processor of the entry node server and forward the multi-layer encrypted message. The exit node server is

connected to the middle node server. The exit node server includes an exit node server processor. The exit note server processor executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the middle node server processor of the middle node server and forward the multi- layer encrypted message. The receiver device executes computer-readable instructions to receive the multi-layer encrypted message from the exit note server processor of the exit node server.
The main advantage of the present invention is that the present invention hides the identity of the user over the network for anonymous communication.
Another advantage of the present invention is that the present invention prevents backtracking of the user IP Address.
Yet another advantage of the present invention is that the present invention provides peer -to- peer communication with no middle data storing servers over the network.
Yet another advantage of the present invention is that the present invention effectively enhances message security as the message is encrypted at every node as it leaves from the sender until it reaches the destination.
Yet another advantage of the present invention is that the present invention prevents location determination over the network.
Yet another advantage of the present invention is that the present invention provides a multi-part stream file transfer.
Further objectives, advantages, and features of the present invention will become apparent from the detailed description provided herein below, in which various embodiments of the disclosed invention are illustrated by way of example.
BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are incorporated in and constitute a part of this specification to provide a further understanding of the invention. The drawings

illustrate one embodiment of the invention and together with the description, serve to explain the principles of the invention.
Fig.1 illustrates the schematic diagram of the present invention. Fig.2 illustrates a method for creating a secure network circuit. Fig.3 illustrates a method for peer to peer secured communication. DETAILED DESCRIPTION OF THE INVENTION
Definition

The terms “a” or “an”, as used herein, are defined as one or as more than one. The term “plurality”, as used herein, is defined as two as or more than two. The term “another”, as used herein, is defined as at least a second or more. The terms “including” and/or “having”, as used herein, are defined as comprising (i.e., open language). The term “coupled”, as used herein, is defined as connected, although not necessarily directly, and not necessarily mechanically.
The term “comprising” is not intended to limit inventions to only claiming the present invention with such comprising language. Any invention using the term comprising could be separated into one or more claims using “consisting” or “consisting of” claim language and is so intended. The term “comprising” is used interchangeably used by the terms “having” or “containing”.
Reference throughout this document to “one embodiment”, “certain embodiments”, “an embodiment”, “another embodiment”, and “yet another embodiment” or similar terms means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of such phrases or in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics are combined in any suitable manner in one or more embodiments without limitation.

The term “or” as used herein is to be interpreted as an inclusive or meaning any one or any combination. Therefore, “A, B or C” means any of the following: “A; B; C; A and B; A and C; B and C; A, B and C”. An exception to this definition will occur only when a combination of elements, functions, steps, or acts are in some way inherently mutually exclusive.
As used herein, the term "one or more" generally refers to, but not limited to, singular as well as the plural form of the term.
The drawings featured in the figures are to illustrate certain convenient embodiments of the present invention and are not to be considered as a limitation to that. The term "means" preceding a present participle of operation indicates the desired function for which there is one or more embodiments, i.e., one or more methods, devices, or apparatuses for achieving the desired function and that one skilled in the art could select from these or their equivalent in view of the disclosure herein and use of the term "means" is not intended to be limiting.
Fig.1 Illustrates the schematic diagram of the system(100). The system(100) includes a client device(102), a directory authority node server(106), an entry node server(112), a middle node server(116), an exit node server(120), and a receiver device(104). The directory authority node server(106) includes a directory authority processor(108) and a directory authority database(110). The entry node server(112) is connected to the client device(102). The entry node server(112) includes an entry node server processor(114). The middle node server(116) is connected to the entry node server(112). The middle node server(116) includes a middle node server processor(118). The exit node server(120) is connected to the middle node server(116). The exit node server(120) includes an exit node server processor(122). The receiver device(104) executes computer-readable instructions to receive the multi-layer encrypted message from the exit note server processor(122) of the exit node server(120).
Fig. 2 illustrates a method for creating a secure network circuit. In step(124), a client device(102) executes computer-readable instructions to communicates with

a directory authority processor(108) and further executes computer-readable instructions to search for an entry node server(112), a middle node server(116) and an exit node server(120) from the list of available list trusted node server recommended by the directory authority database(110). In step(126), firstly the client device(102) executes computer-readable instructions to select an exit node server(120) from the list of the node server recommended by the directory authority database(110). In step(128), the client device(102) further executes computer-readable instructions to randomly select an entry node server(112) and a middle node server(116) from the list of the node servers in the directory authority database(110). In step(130), the client device(102) further executes computer- readable instructions to create a secured network circuit of the entry node server(112), the middle node server(116), and the exit node server(120). In step(132), a 16-character USER-ID is generated on the client device(102) and the receiver device(104) after the formation of the secured network circuit, thus all devices are completely anonymous having no link with any server/email/phone- number no user info required and all communication are established with this 16- character USER-ID and all data list of multiple the receiver device(104) are stay on the client device(102) in encrypted form and after the formation of the secured network circuit, a 16-character USER-ID uniquely identifies the client device(102) over the secured network circuit. Also, the entry node server(112), the middle node server(116), and the exit node server(120) are provided with a decryption key.
Fig.3 illustrates a method for peer to peer secured communication. In step(134), the client device(102) encodes the message and further generates a multi-layer encrypted message having three-layer of encryption, and each layer of encryption of has only two pieces of information that are the address of the previous node server and address of next node server. In step(136), the client device(102) sends the multi-layer encrypted message to the entry node server(112). In step(138), the entry node server(112) decrypts the first layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with two layers of encryption. In step(140), the entry node

server(112) further extracts the address of the middle node server(116) from the first layer of encryption and forwards the multi-layer encrypted message to the middle node server(116). In step(142), the middle node server(116) decrypts the second layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with one layer of encryption. In step(144), the middle node server(116) further extracts the address of the exit node server(120) from the second layer of encryption and forwards the multi-layer encrypted message to the exit node server(120). In step(146), the exit node server(120) decrypts the third layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with no layers of encryption and the whole message gets decrypted. In step(148), the exit node server(120) sends the encoded message to the receiver device(104) and the receiver device(104) decodes the message to read. The receiver device(104) uses the same secured network circuit to send the multi-layer encrypted message, with three layers of encryption, to the client device(102).

The present invention relates to a system for peer to peer secured communication. The present invention includes a client device, a directory authority node server, an entry node server, a middle node server, an exit node server, and a receiver device. The client device stores computer-readable instructions to execute the communication process. In an embodiment, the client device is including, but not limited to, a laptop, a tab, a smartphone, and a desktop. The directory authority node server includes a directory authority processor and a directory authority database. The directory authority processor executes computer-readable instructions for communication with the client device. The directory authority database stores list of available and trusted node servers that are being advertised by the directory authority node server. The client device executes computer- readable instructions to communicates with the directory authority processor and further executes computer-readable instructions to search for the entry node server, the middle node server, and the exit node server from the list of available list trusted node server recommended by the directory authority database. The

directory authority processor executes computer-readable instructions and communicates the list of recommended node servers to the client device. The node servers referred to as the entry node server, the middle node server, and the exit node server. Firstly the client device executes computer-readable instructions to randomly select the exit node server from the list of the node servers recommended by the directory authority database. The client device further executes computer-readable instructions to randomly select the entry node server and the middle node server from the list of the node servers in the directory authority database. The client device further executes computer-readable instructions to develop a secured network circuit of the entry node server, the middle node server, and the exit node server. The entry node server includes an entry node server processor. The entry node server processor executes computer- readable instructions to receive the multi-layer encrypted message from the client device and forward the multi-layer encrypted message. The middle node server is connected to the entry node server. The middle node server includes a middle node server processor. The middle node server processor executes computer- readable instructions to receive the multi-layer encrypted message that is being sent by the entry node server processor of the entry node server and forward the multi-layer encrypted message. The exit node server is connected to the middle node server. The exit node server includes an exit node server processor. The exit note server processor executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the middle node server processor of the middle node server and forward the multi-layer encrypted message. The receiver device executes computer-readable instructions to receive the multi-layer encrypted message from the exit note server processor of the exit node server. In an embodiment, the receiver device is including, but not limited to, a laptop, a tab, a smartphone, and a desktop. In the preferred embodiment, the entry node server has only got the address of the middle node server and the client device from the first layer of encryption. Thus the entry node server does not have information of the last recipient of the multi-layer encrypted message. In the preferred embodiment, the middle node server has only got the address of the exit

node server and the entry node server from the second layer of encryption. Thus the middle node server does not have information on the last recipient and origin point of the multi-layer encrypted message. In the preferred embodiment, the exit node server has only got the address of the receiver device and the middle node server from the third layer of encryption. Thus the exit node server does not have information on the origin point of the multi-layer encrypted message.
In an embodiment, the present invention relates to a system for peer to peer secured communication. The present invention includes a client device, one or more directory authority node servers, one or more middle node servers, one or more exit node servers, and a receiver device. The client device stores computer- readable instructions to execute the communication process. In an embodiment, the client device is including, but not limited to, a laptop, a tab, a smartphone, and a desktop. The one or more directory authority node servers include a directory authority processor and a directory authority database. The directory authority processor executes computer-readable instructions for communication with the client device. The directory authority database stores list of available and trusted node servers that are being advertised by the one or more directory authority node servers. The client device executes computer-readable instructions to communicates with the directory authority processor and further executes computer-readable instructions to search for the one or more entry node servers, the one or more middle node servers and the one or more exit node servers from the list of available list trusted node server recommended by the directory authority database. The directory authority processor executes computer-readable instructions and communicates the list of recommended node servers to the client device. The node servers referred to as the one or more entry node servers, the one or more middle node servers, and the one or more exit node servers. Firstly the client device executes computer-readable instructions to randomly select one or more exit node servers from the list of the node servers recommended by the directory authority database. The client device further executes computer-readable instructions to randomly select the one or more entry node servers and the one or more middle node servers from the list of the node servers in the directory

authority database. The client device further executes computer-readable instructions to develop a secured network circuit of the one or more entry node servers, the one or more middle node servers, and the one or more exit node servers. The one or more entry node servers are connected to the client device. The one or more entry node servers include an entry node server processor. The entry node server processor executes computer-readable instructions to receive the multi-layer encrypted message from the client device and forward the multi-layer encrypted message. The one or more middle node servers are connected to the one or more entry node servers. The one or more middle node servers include a middle node server processor. The middle node server processor executes computer- readable instructions to receive the multi-layer encrypted message that is being sent by the entry node server processor of the one or more entry node servers and forward the multi-layer encrypted message. The one or more exit node servers is connected to the one or more middle node servers. The one or more exit node servers include an exit node server processor. The exit note server processor executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the middle node server processor of the one or more middle node servers and forward the multi-layer encrypted message. The receiver device executes computer-readable instructions to receive the multi-layer encrypted message from the exit note server processor of the one or more exit node servers. In an embodiment, the receiver device including, but not limited to, a laptop, a tab, a smartphone, and a desktop. In the preferred embodiment, the one or more entry node servers have only got the address of the one or more middle node servers and the client device from the first layer of encryption. Thus the one or more entry node servers do not have information of the last recipient of the multi-layer encrypted message. In the preferred embodiment, the one or more middle node servers have only got the address of the one or more exit node servers and the one or more entry node servers from the second layer of encryption. Thus the one or more middle node servers do not have information of the last recipient and origin point of the multi-layer encrypted message. In the preferred embodiment, the one or more exit node servers have only got the

address of the receiver device and the one or more middle node servers from the third layer of encryption. Thus the one or more the exit node servers do not have information on the origin point of the multi-layer encrypted message.
In an embodiment, the present invention relates to a method for the peer to peer secured communication, the method including:
a method for creating secures network circuit, the method including

a client device executes computer-readable instructions to communicates with a directory authority processor and further executes computer- readable instructions to search for the entry node server, the middle node server and the exit node server from the list of available list trusted node server recommended by the directory authority database;
firstly the client device executes computer-readable instructions to randomly select an exit node server from the list of the node servers recommended by the directory authority database;
the client device further executes computer-readable instructions to randomly select an entry node server and a middle node server from the list of the node servers in the directory authority database;
the client device further executes computer-readable instructions to a secured network circuit of the entry node server, the middle node server and the exit node server;
a 16-character USER-ID is generated on the client device and the receiver device(104) after the formation of the secured network circuit, thus all devices are completely anonymous having no link with any server/email/phone-number no user info required and all communication are established with this 16-character USER-ID and all data list of multiple the receiver device are stay on the client device in encrypted form; and
after the formation of the secured network circuit, a 16-character USER-ID uniquely identifies the client device over the secured network circuit and,

also the entry node server, the middle node server, and the exit node server provided with a decryption key.
Herein, the node servers referred to as the entry node server, the middle node server, and the exit node server.
A method for peer to peer secured communication, the method including

the client device encodes the message and further generates a multi-layer encrypted message having three-layer of encryption and each layer of encryption of has only two information that is the address of the previous node server and address of next node server;
the client device sends the multi-layer encrypted message to the entry node server;
the entry node server decrypts the first layer of encryption of the multi- layer encrypted message by using the decryption key and the multi-layer encrypted message left with two layers of encryption;
the entry node server further extracts the address of the middle node server from the first layer of encryption and forwards the multi-layer encrypted message to the middle node server;
the middle node server decrypts the second layer of encryption of the multi-layer encrypted message by using the decryption key and the multi- layer encrypted message left with one layer of encryption;
the middle node server further extracts the address of the exit node server from the second layer of encryption and forwards the multi-layer encrypted message to the exit node server;
the exit node server decrypts the third layer of encryption of the multi- layer encrypted message by using the decryption key and the multi-layer encrypted message left with no layers of encryption and the whole message gets decrypted;

the exit node server sends the encoded message to the receiver device and the receiver device decodes the message to read; and
the receiver device uses the same secured network circuit to send the multi-layer encrypted message, with three layers of encryption, to the client device.
Herein each layer of encryption, out of three layers of encryption, has the only address of the previous node server and address of the next node server. Herein the entry node server has only got the address of the middle node server and the client device from the first layer of encryption. Thus the entry node server does not have information of the last recipient of the multi-layer encrypted message. Herein the middle node server has only got the address of the exit node server and the entry node server from the second layer of encryption. Thus the middle node server does not have information of the last recipient and origin point of the multi- layer encrypted message. Herein the exit node server has only got the address of the receiver device and the middle node server from the third layer of encryption. Thus the exit node server does not have information on the origin point of the multi-layer encrypted message. Herein the multi-layer encrypted message remains anonymous until the multi-layer encrypted message reaches the receiver device.
In an embodiment, the present invention relates to a method for the peer to peer secured communication, the method including:
a method for creating secures network circuit, the method including

a client device executes computer-readable instructions to communicates with a directory authority processor and further executes computer- readable instructions to search for the one or more entry node servers, the at least one middle node server and the one or more exit node servers from the list of available list trusted node server recommended by the directory authority database;

firstly the client device executes computer-readable instructions to randomly select one or more exit node servers from the list of the node servers recommended by the directory authority database;
the client device further executes computer-readable instructions to randomly select one or more entry node servers and one or more middle node servers from the list of the node servers in the directory authority database;
the client device further executes computer-readable instructions to a secured network circuit of the one or more entry node servers, the one or more middle node servers and the one or more exit node servers; and
a 16-character USER-ID is generated on the client device(102) and the receiver device after the formation of the secured network circuit, thus all devices are completely anonymous having no link with any server/email/phone-number no user info required and all communication are established with this 16-character USER-ID and all data list of multiple the receiver device are stay on the client device in encrypted form; and
after the formation of the secured network circuit, a 16-character USER-ID uniquely identifies the client device over the secured network circuit and, also the one or more entry node servers, the one or more middle node servers, and the one or more exit node servers are provided with a decryption key.
Herein, the node servers referred to as the one or more entry node servers, the one or more middle node servers, and the one or more exit node servers.
A method for peer to peer secured communication, the method including

the client device encodes the message and further generates a multi-layer encrypted message having three-layer of encryption and each layer of encryption of has only two information that is the address of the previous node server and address of next node server;

the client device sends the multi-layer encrypted message to the one or more entry node servers;
the one or more entry node servers decrypts the first layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with two layers of encryption;
the one or more entry node servers further extracts the address of the one or more middle node servers from the first layer of encryption and forwards the multi-layer encrypted message to the one or more middle node servers;
the one or more middle node servers decrypts the second layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with one layer of encryption;
the one or more middle node servers further extracts the address of the one or more exit node servers from the second layer of encryption and forwards the multi-layer encrypted message to the one or more exit node servers;
the one or more exit node servers decrypts the third layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with no layers of encryption and the whole message gets decrypted;
the one or more exit node servers send the encoded message to the receiver device and the receiver device decodes the message to read; and
the receiver device uses the same secured network circuit to send the multi-layer encrypted message, with three layers of encryption, to the client device.
Herein each layer of encryption, out of three layers of encryption, has the only address of the previous node server and address of the next node server. Herein the one or more entry node servers have only got the address of the one or more

middle node servers and the client device from the first layer of encryption, thus the one or more entry node servers do not have information of the last recipient of the multi-layer encrypted message. Herein the one or more middle node servers has only got the address of the one or more exit node servers and one or more entry node servers from the second layer of encryption thus the one or more middle node servers does not have information of the last recipient and origin point of the multi-layer encrypted message. Herein the one or more exit node servers have only got the address of the receiver device and the one or more middle node servers from the third layer of encryption thus the one or more the exit node servers do not have information of the origin point of the multi-layer encrypted message. Herein the multi-layer encrypted message remains anonymous until the multi-layer encrypted message reaches the receiver device.

Further objectives, advantages, and features of the present invention will become apparent from the detailed description provided herein below, in which various embodiments of the disclosed present invention are illustrated by way of example and appropriate reference to accompanying drawings. Those skilled in the art to which the present invention pertains may make modifications resulting in other embodiments employing principles of the present invention without departing from its spirit or characteristics, particularly upon considering the foregoing teachings. Accordingly, the described embodiments are to be considered in all respects only as illustrative, and not restrictive, and the scope of the present invention is, therefore, indicated by the appended claims rather than by the foregoing description or drawings. Consequently, while the present invention has been described with reference to particular embodiments, modifications of structure, sequence, materials and the like apparent to those skilled in the art still fall within the scope of the invention as claimed by the applicant.

WE CLAIM

1.A system(100) for peer to peer secured communication, the system (100) comprising:
a client device(102), the client device(102) stores computer-readable instructions to execute the communication process;
an at least one directory authority node server(106), the at least one directory authority node server(106) having
a directory authority processor(108), the directory authority processor(108) executes computer-readable instructions for communication with the client device(102) and, and
a directory authority database(110), the directory authority database(110) stores list of available and trusted node servers that are being advertised and recommended by the at least one directory authority node server(106);
an at least one entry node server(112), the at least one entry node server(112) is connected to the client device(102), the at least one entry node server(112) having
an entry node server processor(114), the entry node server processor(114) executes computer-readable instructions to receive the multi-layer encrypted message from the client device(102) and forward the multi-layer encrypted message;
an at least one middle node server(116), the at least one middle node server(116) is connected to the at least one entry node server(112), the at least one middle node server(116) having
a middle node server processor(118), the middle node server processor(118) executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the entry node server processor(114) of the at least one entry node server(112) and forward the multi-layer encrypted message;

an at least one exit node server(120), the at least one exit node server(120) is connected to the at least one middle node server(116), the at least one exit node server(120) having
an exit node server processor(122), the exit note server processor(122) executes computer-readable instructions to receive the multi-layer encrypted message that is being sent by the middle node server processor(118) of the at least one middle node server(116) and forward the multi-layer encrypted message;
a receiver device(104), the receiver device(104) executes computer-readable instructions to receive the multi-layer encrypted message from the exit note server processor(122) of the at least one exit node server(120);
wherein, the client device(102) securely send the multi-layer encrypted message to the receiver device(104) via the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120),
wherein, the client device(102) executes computer-readable instructions to communicates with the directory authority processor(108) and further executes computer-readable instructions to search for the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120) from the list of available list trusted node server recommended by the directory authority database(110),
wherein, the node servers referred as the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120),
wherein, firstly the client device(102) executes computer-readable instructions to randomly select the at least one exit node server(120) from the list of the node servers recommended by the directory authority database(110),
wherein, the client device(102) further executes computer-readable instructions to randomly select the at least one entry node server(112) and the at least one middle node server(116) from the list of the node servers in the directory authority database(110),

wherein, the client device(102) further executes computer-readable instructions to develop a secured network circuit of the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120),
wherein, a 16-character USER-ID is generated on the client device(102) and the receiver device(104) after the formation of the secured network circuit, thus all devices are completely anonymous having no link with any server/email/phone- number no user info required and all communication are established with this 16- character USER-ID and all data list of multiple the receiver device(104) stay on the client device(102) in encrypted form,
wherein, the after the formation of the secured network circuit a 16-character USER-ID uniquely identifies the client device(102) over the secured network circuit and, also the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120) provided with a decryption key,
wherein, the client device(102) encodes the message and further generates the multi-layer encrypted message having three-layer of encryption and each layer of encryption of has only two information that is the address of the previous node server and address of next node server,
wherein, the client device(102) sends the multi-layer encrypted message to the at least one entry node server(112),
wherein, the at least one entry node server(112) decrypts the first layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with two layers of encryption,
wherein, the at least one entry node server(112) further extracts the address of the at least one middle node server(116) from the first layer of encryption and forwards the multi-layer encrypted message to the at least one middle node server(116),

wherein, the at least one middle node server(116) decrypts the second layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with one layer of encryption,
wherein, the at least one middle node server(116) further extracts the address of the at least one exit node server(120) from the second layer of encryption and forwards the multi-layer encrypted message to the at least one exit node server(120),
wherein, the at least one exit node server(120) decrypts the third layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with no layers of encryption and the whole message gets decrypted,
wherein, the at least one exit node server(120) sends the encoded message to the receiver device(104) and the receiver device(104) decodes the message to read,
wherein, thus the multi-layer encrypted message remains anonymous until the multi-layer encrypted message reaches the receiver device(104)
wherein, the receiver device(104) uses the same secured network circuit to send the multi-layer encrypted message, with three layers of encryption, to the client device(102),
wherein, only the at least one entry node server(112) is aware of your IP address of the client device(102) but the at least one middle node server(116), the at least one exit node server(120) and the receiver device(104) is aware of actual IP- address of the client device(102),
wherein, the system(100) is based on a secured network circuit of the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120), thus for any adversary to monitor traffic, block, delay, replay and modify traffic, becomes impossible.
2. The system (100) as claimed in claim 1, wherein the client device(102) is selected from a laptop, a tab, a smartphone, and a desktop.

3. The system (100) as claimed in claim 1, wherein the receiver device(104) is selected from a laptop, a tab, a smartphone, and a desktop.
4. The system (100) as claimed in claim 1, wherein the at least one entry node server(112) has only got the address of the at least one middle node server(116) and the client device(102) from the first layer of encryption, thus the at least one entry node server(112) does not have information of the last recipient of the multi- layer encrypted message.
5. The system (100) as claimed in claim 1 and claim 4, wherein the at least one middle node server(116) has only got the address of the at least one exit node server(120) and the at least one entry node server(112) from the second layer of encryption thus the at least one middle node server(116) does not have information of the last recipient and origin point of the multi-layer encrypted message.
6. The system (100) as claimed in claim 1, claim 4 and claim 5, wherein the at least one exit node server(120) has only got the address of the receiver device(104) and the at least one middle node server(116) from the third layer of encryption thus the at least one exit node server(120) does not have information of the origin point of the multi-layer encrypted message.
7. A method for peer to peer secured communication, the method having: a method for creating secures network circuit, the method having
a client device(102) executes computer-readable instructions to communicates with a directory authority processor(108) and further executes computer-readable instructions for the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120) from the list of available list trusted node server recommended by the directory authority database(110),
firstly the client device(102) executes computer-readable instructions to randomly select an at least one exit node server(120) from the list of the node servers in the directory authority database(110),

the client device(102) further executes computer-readable instructions to randomly select an at least one entry node server(112) and an at least one middle node server(116) from the list of the node servers recommended by the directory authority database(110),
the client device(102) further executes computer-readable instructions to a secured network circuit of the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120), and
a 16-character USER-ID is generated on the client device(102) and the receiver device(104) after the formation of the secured network circuit, thus all devices are completely anonymous having no link with any server/email/phone-number no user info required and all communication are established with this 16-character USER-ID and all data list of multiple the receiver device(104) are stay on the client device(102) in encrypted form,
the after the formation of the secured network circuit a 16-character USER-ID uniquely identifies the client device(102) over the secured network circuit and, also the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120) provided with a decryption key,
wherein, the node servers referred as the at least one entry node server(112), the at least one middle node server(116) and the at least one exit node server(120);
a method for peer to peer secured communication, the method having

the client device(102) encodes the message and further generates a multi- layer encrypted message having three-layer of encryption and each layer of encryption of has only two information that is the address of the previous node server and address of next node server,
the client device(102) sends the multi-layer encrypted message to the at least one entry node server(112),

the at least one entry node server(112) decrypts the first layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with two layers of encryption,
the at least one entry node server(112) further extracts the address of the at least one middle node server(116) from the first layer of encryption and forwards the multi-layer encrypted message to the at least one middle node server(116),
the at least one middle node server(116) decrypts the second layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with one layer of encryption,
the at least one middle node server(116) further extracts the address of the at least one exit node server(120) from the second layer of encryption and forwards the multi-layer encrypted message to the at least one exit node server(120),
the at least one exit node server(120) decrypts the third layer of encryption of the multi-layer encrypted message by using the decryption key and the multi-layer encrypted message left with no layers of encryption and the whole message gets decrypted,
the at least one exit node server(120) sends the encoded message to the receiver device(104) and the receiver device(104) decodes the message to read, and
the receiver device(104) uses the same secured network circuit to send the multi-layer encrypted message, with three layers of encryption, to the client device(102);
wherein each layer of encryption, out of three layers of encryption, has the only address of the previous node server and address of next node server,

wherein the at least one entry node server(112) has only got the address of the at least one middle node server(116) and the client device(102) from the first layer of encryption, thus the at least one entry node server(112) does not have information of the last recipient of the multi-layer encrypted message,
wherein the at least one middle node server(116) has only got the address of the at least one exit node server(120) and the at least one entry node server(112) from the second layer of encryption thus the at least one middle node server(116) does not have information of the last recipient and origin point of the multi-layer encrypted message,
wherein the at least one exit node server(120) has only got the address of the receiver device(104) and the at least one middle node server(116) from the third layer of encryption thus the at least one exit node server(120) does not have information of the origin point of the multi-layer encrypted message,
wherein the multi-layer encrypted message remains anonymous until the multi- layer encrypted message reaches the receiver device(104).

Documents

Application Documents

# Name Date
1 202011019440-COMPLETE SPECIFICATION [06-05-2021(online)].pdf 2021-05-06
1 202011019440-STATEMENT OF UNDERTAKING (FORM 3) [07-05-2020(online)].pdf 2020-05-07
2 202011019440-DRAWING [06-05-2021(online)].pdf 2021-05-06
2 202011019440-PROVISIONAL SPECIFICATION [07-05-2020(online)].pdf 2020-05-07
3 202011019440-DECLARATION OF INVENTORSHIP (FORM 5) [07-05-2020(online)].pdf 2020-05-07
3 202011019440-PROOF OF RIGHT [07-05-2020(online)].pdf 2020-05-07
4 202011019440-DRAWINGS [07-05-2020(online)].pdf 2020-05-07
4 202011019440-POWER OF AUTHORITY [07-05-2020(online)].pdf 2020-05-07
5 202011019440-FORM 1 [07-05-2020(online)].pdf 2020-05-07
6 202011019440-DRAWINGS [07-05-2020(online)].pdf 2020-05-07
6 202011019440-POWER OF AUTHORITY [07-05-2020(online)].pdf 2020-05-07
7 202011019440-DECLARATION OF INVENTORSHIP (FORM 5) [07-05-2020(online)].pdf 2020-05-07
7 202011019440-PROOF OF RIGHT [07-05-2020(online)].pdf 2020-05-07
8 202011019440-DRAWING [06-05-2021(online)].pdf 2021-05-06
8 202011019440-PROVISIONAL SPECIFICATION [07-05-2020(online)].pdf 2020-05-07
9 202011019440-COMPLETE SPECIFICATION [06-05-2021(online)].pdf 2021-05-06
9 202011019440-STATEMENT OF UNDERTAKING (FORM 3) [07-05-2020(online)].pdf 2020-05-07