scispace - formally typeset
Patent

High performance IPSEC hardware accelerator for packet classification

TLDR
An architecture for a high performance IPSEC accelerator is described in this paper, which includes components for scanning fields of packets, programming an IPSEC services device according to the scanned fields, and modifying the scanned packet with an output from the IPSEC security services device.
Abstract
An architecture for a high performance IPSEC accelerator. The architecture includes components for scanning fields of packets, programming an IPSEC services device according to the scanned fields, and modifying the scanned packet with an output from the IPSEC security services device. Preferably, the architecture is implemented in hardware, and attached to a host machine. Hardware devices, fast in comparison to software processing and network speeds, allows the computationally intensive IPSEC processes to be completed in real-time and reduce or eliminate bottlenecks in the path of a packet being sent or received to/from a network.

read more

Citations
More filters
Patent

Tagging mechanism for data path security processing

TL;DR: In this article, the authors describe protocols and associated systems for providing secured data transmission over a data network, where data to be encrypted and encryption information may be sent to a security processor via a packet network so that the security processor may extract the encryption information and use it to encrypt the data.
Patent

Data path security processing

TL;DR: In this paper, a security device provides security processing in the data path of a packet network and is configured as an in-line security processor that processes packets that pass through the device as the packets are routed to/from the data network.
Patent

Classification engine in a cryptography acceleration chip

TL;DR: In this paper, the authors present an architecture for a cryptography accelerator chip that allows significant performance improvements over previous prior art designs, with much reduced local memory requirements, in some cases requiring no additional external memory.
Patent

Distributed processing in a cryptography acceleration chip

TL;DR: In this article, the authors present an architecture for a cryptography accelerator chip that allows significant performance improvements over previous prior art designs, with much reduced local memory requirements, in some cases requiring no additional external memory.
Patent

System and method for authentication via a proximate device

TL;DR: In this paper, strong authentication is provided to the effect that credentials associated with specific users have been received from specific components in the system, and the server may then enable the components to access selected services.
References
More filters
Patent

Secure firewall supporting different levels of authentication based on address or encryption status

TL;DR: In this paper, a system and method for regulating the flow of messages through a firewall having a network protocol stack includes an Internet Protocol (IP) layer, the method comprising establishing a security policy, determining, at the IP layer, if a message is encrypted, if the message is not encrypted, passing the unencrypted message up the network protocol Stack to an application level proxy, and if the encrypted message is decrypted, decrypting the message and passing the decrypted message up to the application level Proxy.
Patent

Apparatus and method for providing network security.

TL;DR: In this paper, a multi-level security apparatus and method for a network employs a secure network interface unit (SNIU) coupled between each host or user computer unit (TS, S, S-U, PC, U) and a security manager (SM) coupled to the network, for controlling the operation and configuration of the SNIUs.
Patent

Generalized security policy management system and method

TL;DR: In this paper, a system and method for regulating the flow of internetwork connections through a firewall having a network protocol stack which includes an Internet Protocol (IP) layer is presented and a determination is made of the parameters characteristic of a connection request, including a netelement parameter characteristic of where the connection request came from.
Patent

Method and arrangement for secure tunneling of data between virtual routers

Tatu Ylonen, +1 more
TL;DR: In this article, a security association is established for secure transmission of data packets between the transmitting computer device and the receiving computer device, where the transmitting virtual router and the receiver are identified within the security association.
Journal ArticleDOI

Child-proof authentication for MIPv6 (CAM)

TL;DR: This work presents a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives, intended to enable experimentation with (mobile) IPv6 before the transition to a comprehensive IPSEC infrastructure.
Related Papers (5)