Method to maximize hardware utilization in flow-thru IPsec...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07818563

ABSTRACT:
The invention relates to a network interface system for interfacing a host system with a network. The network interface system includes a bus interface system, a media access control system, a memory system, and a security system. The security system is coupled to the memory system and is adapted to selectively perform security processing on incoming and outgoing data. For at least one of receive or transmit processing, the security system comprises one or more encryption pipelines and at least two sets of one or more authentication pipelines. The encryption pipelines are adapted to perform one or more encryption or decryption algorithms. The authentication pipelines are adapted to perform one or more authentication algorithms. The security system is configured to selectively process frames through the encryption pipelines and then through the two sets of authentication pipelines. The system toggles whereby successive frames alternate between the two sets of authentication pipelines.

REFERENCES:
patent: 4912487 (1990-03-01), Porter et al.
patent: 6275588 (2001-08-01), Videcrantz et al.
patent: 6446204 (2002-09-01), Pang et al.
patent: 7412726 (2008-08-01), Viswanath
patent: 2002/0184498 (2002-12-01), Qi
patent: 2004/0010612 (2004-01-01), Pandya
patent: 2005/0123139 (2005-06-01), Chin

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method to maximize hardware utilization in flow-thru IPsec... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method to maximize hardware utilization in flow-thru IPsec..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to maximize hardware utilization in flow-thru IPsec... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4241393

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.