Electrical computers and digital processing systems: multicomput – Computer-to-computer data modifying
Reexamination Certificate
2006-07-25
2006-07-25
Dharia, Rupal (Department: 2141)
Electrical computers and digital processing systems: multicomput
Computer-to-computer data modifying
C370S392000, C370S395600
Reexamination Certificate
active
07082477
ABSTRACT:
A method and apparatus for virtual application of features to electronic messages is disclosed. When a device applies a set of features to an electronic message, one or more of the features may be virtually applied instead of actually applied. For example, instead of encrypting a payload portion of a packet and adding an encryption header, the packet may not be encrypted. However, an appropriate encryption header may still be included in the packet such that the packet appears to have been encrypted when other features are applied. Prior to sending the packet, the payload portion is actually encrypted, such as by using a hardware accelerator. Some implementations may use a dual processor router, in which the input/output processor controls the hardware accelerator, the routing processor performs the virtual application of a feature, and prior to sending the packet the input/output processor actually applies the virtually applied feature.
REFERENCES:
patent: 6253321 (2001-06-01), Nikander et al.
patent: 6907042 (2005-06-01), Oguchi
patent: 2002/0133608 (2002-09-01), Godwin et al.
patent: 2003/0074473 (2003-04-01), Pham et al.
patent: 2003/0193949 (2003-10-01), Kojima et al.
Phillip Rogaway et al., “A Software-Optimized Encryption Algorithm,” Dept. Computer Science, Univ. Calif. at Davis, Sep. 18, 1997.
B. Schneier et al., “Cryptographic Support for Secure Logs on Untrusted Machines,” Proc. Seventh USENIX Security Symposium, USENIX Press, Jan. 1998, pp. 53-62.
S. Kent et al., “Security Architecture for the Internet Protocol,” IETF Request for Comments (RFC) 2401, The Internet Society, Nov. 1998.
S. Kent et al., “IP Authentication Header,” IETF Request for Comments (RFC) 2402, The Internet Society, Nov. 1998.
S. Kent et al., “IP Encapsulating Security Payload (ESP),” IETF Request for Comments (RFC) 2406, The Internet Society, Nov. 1998.
D. Harkins et al., “The Internet Key Exchange (IKE),” RFC 2409, The Internet Society, Nov. 1998.
H. Orman, “The OAKLEY Key Determination Protocol,” RFC 2412, The Internet Society, Nov. 1998.
Cisco Systems, “VPN Acceleration Module for Cisco 7200 and 7100 Series Routers,” Aug. 2001, 4 pages.
Cisco Systems, “Cisco VPN Routers, Setting the Standard in Site-to-Site VPN Solutions,” Aug. 2001, 4 pages.
Cisco Systems, “Cisco 7100 Series VPN Router, An integrated enterprise VPN router for deploying self-healing, self defending VPNs,” Nov. 2001, 6 pages.
Cisco Systems, “Enhanced VPN Acceleration for Cisco 7100 Series VPN Routers,” Nov. 2001, 2 pages.
Cisco Systems, “Integrated Services Adapter (ISA),” Mar. 2000, 6 pages.
Cisco Systems, “Integrated Services Module (ISM),” Nov. 1999, 6 pages.
Fung Anders K.
Leavy Nicholas R.
Liang Bin
Sadhasivam Karthik M.
Trehus Eric M.
Dharia Rupal
Hickman Palermo & Truong & Becker LLP
Patel Chirag R
LandOfFree
Virtual application of features to electronic messages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Virtual application of features to electronic messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Virtual application of features to electronic messages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3526980