Claims
- 1. A communications control system comprising:
an access point for coupling data packets to a network; a first software application comprising a user operative portion and a hidden program portion, for selectively sending data packets for transmission through the access point; and a controller for selectively coupling the data packets to the access point responsive to the hidden program portions.
- 2. The system as in claim 1, wherein a security signal representative of the hidden program portion is coupled to the controller for selectively coupling associated ones of the data packets to the access point.
- 3. The system as in claim 2, wherein the security signal authenticates the first software application.
- 4. The system as in claim 2, wherein the security signal is a digital signature derived from at least one of the associated ones of the data packets and representative of the hidden program portion.
- 5. The system as in claim 2, wherein the access point couples a secure time-stamp to the hidden program portion,
wherein the security signal is generated responsive to the secure time-stamp and the hidden program portion.
- 6. The system as in claim 5, wherein the secure time-stamp is generated responsive to a UTC (Universal Coordinated Time) signal.
- 7. The system as in claim 4, further comprising:
a UTC signal, wherein the digital signature derived from the UTC signal and representative of the hidden program portion.
- 8. The system as in claim 2, further comprising:
a mapping table; wherein the controller for selectively coupling is further responsive to the mapping table for associating the data packets with a priority class responsive to the security signal.
- 9. The system as in claim 2, wherein the data packets are further comprised of a header portion and a payload portion;
wherein the security signal is part of at least one of the header portion and the payload portion.
- 10. The system as in claim 8, wherein the data packets are further comprised of a header portion;
wherein the priority class is part of the header portion.
- 11. The system as in claim 8, wherein the priority class is defined in accordance with at least one of the following: differentiated services, DiffServ, IEEE 802.1p, class of service (CoS), time-driven priority.
- 12. The system as in claim 2, further comprising:
a mapping table; and a flow identification (ID); wherein each flow ID is associated with at least one entry in the mapping table for determining a priority class; wherein the controller for selectively coupling is responsive to the priority class and the security signal.
- 13. A method of communications control for coupling data packets to a network from an access point, the method comprising:
providing a first software application comprising a user operative portion and a hidden program portion; selectively sending data packets for transmission through the access point utilizing the first software application program; and selectively coupling the data packets via a controller to the access point responsive to the hidden program portion.
- 14. The method as in claim 13, further comprising:
providing a security signal representative of the hidden program portion coupled to the controller for selectively coupling of associated ones of the data packets.
- 15. The method as in claim 14, further comprising:
utilizing the security signal to authenticate the first software application.
- 16. The method as in claim 14, further comprising:
deriving the security signal as a digital signature derived from at least one of the associated ones of the data packets and representative of the hidden program portion.
- 17. The method as in claim 14, further comprising:
coupling a secure time-stamp to the hidden program portion of the first software application from the access point, and generating the security signal responsive to the secure time-stamp and the hidden program portion.
- 18. The method as in claim 17, further comprising:
generating the secure time-stamp responsive to a UTC (Universal Coordinated Time) signal.
- 19. The method as in claim 16, further comprising:
providing a UTC signal, wherein the security signal is a digital signature derived from a UTC signal and representative of the hidden program portion.
- 20. The method as in claim 13, further comprising:
providing for a mapping table; providing a flow identification (ID) for each data packet; accessing at least one entry in the mapping table for each flow ID for determining a priority class; and enabling the coupling by the controller responsive to the priority class and the security signal.
- 21. A communications control system comprising:
an access point for coupling data packets to a network; a first software application and a second software application each comprising a user operative portion and a hidden program portion, for selectively sending data packets for transmission through the access point; wherein the data packets are sent between the first software application and the second software application; and a controller for selectively coupling the data packets to the access point responsive to the hidden program portions of the first software application and the second software application.
- 22. The system as in claim 21, wherein a first security signal representative of the hidden program portion of the first software application and a second security signal representative of the hidden program portion of the second software application are selectively coupled to the controller for selectively coupling of associated ones of the data packets.
- 23. The system as in claim 22, wherein the first security signal authenticates the first software application and the second security signal authenticates the second software application.
- 24. The system as in claim 22, wherein the first security signal and the second security signal are digital signatures derived from at least one of the associated ones of the data packets and representative of the hidden program portion of the respective first and second software applications.
- 25. The system as in claim 22, wherein the access point couples a secure time-stamp to at least one of the hidden program portions of the first software application and the hidden program portion of the second software application,
wherein at least one of the first security signal and the second security signal are selectively generated responsive to the secure time-stamp and the hidden program portions.
- 26. The system as in claim 25, wherein the secure time-stamp is generated responsive to a UTC (Universal Coordinated Time) signal.
- 27. The system as in claim 24, further comprising:
a UTC signal, wherein the digital signature derived from the UTC signal and representative of the hidden program portion.
- 28. A communications control method comprising:
coupling data packets via an access point to a network; selectively sending data packets for transmission through the access point responsive to a first software application and a second software application each comprising a user operative portion and a hidden program portion; sending the data packets between the first software application and the second software application; and selectively coupling the data packets via a controller to the access point responsive to the hidden program portions of the first software application and the second software application.
- 29. The method as in claim 28, further comprising:
selectively coupling a first security signal representative of the hidden program portion of the first software application and a second security signal representative of the hidden program portion of the second software application to the controller for selectively coupling associated ones of the data packets.
- 30. The method as in claim 29, further comprising:
authenticating the first software application responsive to the first security signal; authenticating the second software application responsive to the first security signal.
- 31. The method as in claim 29, further comprising:
deriving the first security signal and the second security signal as digital signatures derived from at least one of the associated ones of the data packets and representative of the hidden program portion.
- 32. The method as in claim 29, further comprising:
coupling a secure time-stamp to at least one of the hidden program portions of the first software application and the hidden program portion of the second software application, and selectively generating at least one of the first security signal and the second security signal responsive to the secure time-stamp and the hidden program portions.
RELATED APPLICATIONS
[0001] This application claims priority from the Provisional Patent Application with serial No. 60/365,148; entitled, “BEST EFFORT LINEARIZATION OF TCP PACKET FLOWS,” filed Mar. 16, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60365148 |
Mar 2002 |
US |