Network security protocol processor and method thereof

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C726S026000

Reexamination Certificate

active

07603549

ABSTRACT:
A cryptographic processor having an in-line (i.e., “bump-in-the-wire”) architecture processes data packets between a trusted domain and a untrusted domain, according to a predetermined security protocol. The cryptographic processor can be implemented as a stand-alone device, without requiring a change in the configuration of the host machine. Unlike a conventional hardware acceleration of a “bump-in-the-stack” implementation, which is typically implemented as a layer between the native IP layer and the network drivers in an IP protocol stack and uses a single bus interface (e.g., a PCI-X bus) for all data traffic, the cryptographic processor acts as a security gateway, providing separate interfaces for the trusted and the untrusted domains. The cryptographic processor includes pipeline stages for carrying a feedback encryption algorithm with optimal throughput.

REFERENCES:
patent: 5802320 (1998-09-01), Baehr et al.
patent: 6101543 (2000-08-01), Alden et al.
patent: 6286104 (2001-09-01), Buhle et al.
patent: 6870929 (2005-03-01), Greene
patent: 7003118 (2006-02-01), Yang et al.
Orman, The Oakley Key Determination Protocol, Department of Computer Science University of Arizona, 1997, p. 58.
Waldvogel, Scalable High Speed IP Routing Lookups, 1997, ACM, p. 2.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network security protocol processor and method thereof does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network security protocol processor and method thereof, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security protocol processor and method thereof will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4130155

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.