Adaptive data security system and method

Data processing: generic control systems or specific application – Generic control system – apparatus or process – Supervisory control

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

700 7, 700 8, 700 68, 700 67, 709229, 709230, 709213, 713186, 713187, 713188, G05B 1502, G05B 1918

Patent

active

061085839

ABSTRACT:
A system and method for data communication with adaptive security in which a send host transmits a data stream to a receive host in packets which contain an authentication data block with an authentication header and a signature block. The authentication header advantageously contains various fields including a verification type, a security algorithm, a minimum security level, a target security level, and an actual security level. The receive host adaptively performs verification of the data packets using varying security levels based in part on the availability of security operations per second (SOPS) in the receive host. Where a data stream in the receive host is delayed by a security processing bottleneck, the receive host may alter the verification type, security algorithm, or the actual security level to speed up the processing of the data stream by reducing the amount of security processing performed. The receive host further allocates the SOPS among the data streams received based on a priority assigned to each data stream.

REFERENCES:
patent: 4771391 (1988-09-01), Blasbalg
patent: 4965827 (1990-10-01), McDonald
patent: 5005137 (1991-04-01), Ernst
patent: 5107415 (1992-04-01), Sato et al.
patent: 5477531 (1995-12-01), McKee et al.
patent: 5481735 (1996-01-01), Mortensen et al.
patent: 5490252 (1996-02-01), Macera et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5541852 (1996-07-01), Eyuboglu et al.
patent: 5544322 (1996-08-01), Cheng et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5566310 (1996-10-01), Mathewson, II
patent: 5586260 (1996-12-01), Hu
patent: 5590197 (1996-12-01), Chen et al.
patent: 5623601 (1997-04-01), Vu
patent: 5627970 (1997-05-01), Keshav
patent: 5627972 (1997-05-01), Shear
patent: 5642360 (1997-06-01), Trainin
patent: 5689566 (1997-11-01), Nguyen
patent: 5715397 (1998-02-01), Ogawa et al.
patent: 5727159 (1998-03-01), Kikinis
patent: 5737535 (1998-04-01), Bagley et al.
patent: 5761438 (1998-06-01), Sasaki
patent: 5764921 (1998-06-01), Banham et al.
patent: 5768536 (1998-06-01), Strongin et al.
patent: 5784571 (1998-07-01), Mantopoulos et al.
patent: 5784572 (1998-07-01), Rostoker et al.
patent: 5784578 (1998-07-01), Galloway et al.
patent: 5793763 (1998-08-01), Mayes et al.
Meyer, et al., "MPEG-FAQ 4.1," Security Mechanisms for Multimedia-Data with the Example MPEG-I-Project, Project Description of SECMPEG, 1995, pp. 1-2.
Jha, et al., "Adaptive Resource Allocation for Embedded Parallel Applications," Proceedings of the Third International Conference on High Performance Computing, Dec. 1996.
Ivan-Rosu, et al., "Improving Protocol Performance by Dynamic Control of Communication Resources," Proceedings of the 2.sup.nd IEEE Conference on Complex Computer Systems (ICECCS), Oct. 1996.
Rosu, et al., "On Adaptive Resource Allocation for Complex Real-Time Applications," Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS), IEEE, 1997.
Schneck, et al., "DRRM: Dynamic Resource Reservation Manager," International Conference on Computer Communications and Networks, IEEE, 1996.
Waldsperger, et al., "Lottery Scheduling: Flexible Proportional-Share Resource Management," Operating Systems Review, 1994, pp. 1-12.
Agi, et al., "An Empirical Study of Secure MPEG Video Transmissions," IEEE, Mar. 1996, pp. 1-8.
Li, et al., "Security Enhanced MPEG Player," Department of Computer Science, Unviersity of Illinois at Urbana-Champaign, 1996.
Nahrstedt, et al., "Resource Management in Networked Multimedia Systems," Handbook of Multimedia Networking, Auerbach Publications, 1995, pp. 381-405.
Needham, et al., "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 210-216.
Reiter, et al., "A security Architecture for Fault-Tolerant Systems," ACM Transactions on Computer Systems, vol. 12, No. 4, Nov. 1994, pp. 340-371.
Larry L. Peterson, "OS Support for High-Speed Networking," http://www.cs.arizona.edu/xkernel/projects/cryptography-and-protocols, pp. 1-11.
Hudson, et al., "Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems," Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work, pp. 248-257.
Varadharajan, et al., "A Practical Approach to Design and Management of Secure ATM Networks," Jul. 1997 pp. 213-232.
Rumen Stainov, "Dynamic Protocol Configuration for Multimedia Networks," Microprocessing and Microprogramming, 38, 1993, pp. 741-748.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Adaptive data security system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Adaptive data security system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Adaptive data security system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-592518

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.