Claims
- 1. A method for preventing completed reception of an unauthorized packet by a network adaptor comprising:
- beginning to receive a packet from a communication channel;
- using a count value and a value bit vector (VBV) to compare data in said packet at said count value to said value bit vector;
- completing reception of said packet if said compare indicates that data in said packet matches said value bit vector; and
- aborting reception of said packet without passing said packet to higher layer software if said compare indicates that data in said packet does not match said value bit vector.
- 2. The method according to claim 1 further comprising:
- using a don't care bit vector (DCBV) to indicate that certain bits in said VBV should not be compared to bits in said packet.
- 3. The method according to claim 2 wherein said count value is a non-alterable value and may be implicit in said compare function.
- 4. The method according to claim 1 wherein said compare takes place at a data link layer protocol and said packets are never passed up to a higher layer protocol if said compare fails.
- 5. The method according to claim 4 wherein said count value indicates data in a layer 3 address of said packet.
- 6. The method according to claim 3 wherein said data comprise a security field included in said packet.
- 7. The method according to claim 1 wherein said count value indicates data in a packet header.
- 8. The method according to claim 7 wherein said count value indicates data in a layer 2 address of said packet.
- 9. The method according to claim 1 wherein said count value is a non-alterable value and may be implicit in said compare function.
- 10. A method for preventing completed transmission of an unauthorized packet by an adaptor card comprising:
- receiving a packet to transmit from a higher layer protocol:
- beginning to transmit a packet on a communication channel;
- using a count value and a value bit vector (VBV) to compare data in said packet at said count value to said value bit vector;
- if said compare indicates that data in said packet matches said value bit vector, completing transmission of said packet; and
- if said compare indicates that data in said packet does not match said value bit vector, aborting transmission of said packet.
- 11. The method according to claim 10 further comprising:
- using a don't care bit vector (DCBV) to indicate that certain bits in said VBV should not be compared to bits in said packet.
- 12. The method according to claim 10 wherein said compare takes place at a data link layer.
- 13. The method according to claim 10 wherein said count value indicates data in a packet header.
- 14. The method according to claim 13 wherein said count value indicates data in a layer 2 address of said packet.
- 15. The method according to claim 13 wherein said data comprises a layer 3 address of said packet.
- 16. The method according to claim 13 wherein said data comprises a security field included in said packet.
- 17. A method for preventing completed reception of an unauthorized packet by a network adaptor comprising:
- beginning to receive a packet from a communication channel;
- applying a rule to said packet at a packet reception layer;
- completing reception of said packet if said rule indicates that said packet is valid; and
- aborting reception of said packet without passing said packet to higher layer software if said rule indicates that said packet is not valid.
- 18. A method for preventing completed transmission of an unauthorized packet by an adaptor card comprising:
- receiving a packet to transmit from a higher layer protocol;
- applying a rule to said packet at a packet transmission layer;
- completing transmission of said packet if said rule indicates that said packet is valid; and
- aborting transmission of said packet if said rule indicates that said packet is not valid.
- 19. An adaptor driver for use in an end system comprising:
- an application interface for passing packets between a network and higher network layers;
- a set of adaptor layer packet verification rules;
- a data pattern enforcer for applying said rules to packets at the adaptor layer; and
- a network interface for communicating packets on a network.
- 20. A method for preventing completed reception of an unauthorized packet by a network adaptor comprising:
- beginning to receive a packet from a communication channel;
- using a count value and a value bit vector to apply a simple validation rule to packet values in said packet at said count value;
- completing reception of said packet if said simple validation rule indicates that data in said packet is valid; and
- aborting reception of said packet without passing said packet to higher layer protocols if said simple validation rule indicates that data in said packet is not valid.
- 21. The method according to claim 20 wherein said simple validation rule takes place at a data link layer protocol and said packets are never passed up to a higher layer protocol if said rule fails.
- 22. The method according to claim 20 wherein said count value indicates packet values in a packet header.
- 23. The method according to claim 20 wherein said packet values comprise a security field included in said packet.
- 24. The method according to claim 20 wherein said count value is a preset, non-alterable value and may be implicit in said simple validation rules.
Parent Case Info
This application claims priority from provisional patent application Ser. No. 60/032,842, filed Dec. 13, 1996, which discussed a number of background concepts related to the invention.
US Referenced Citations (3)
Foreign Referenced Citations (3)
Number |
Date |
Country |
0 658 837 |
Jun 1995 |
EPX |
0 668 680 |
Aug 1995 |
EPX |
WO 89 08887 |
Sep 1989 |
WOX |
Non-Patent Literature Citations (1)
Entry |
Bellovin, S.M., et al., "Network Firewalls," IEEE Communications Magazine, vol. 32, No. 8, Sep. 1, 1994, pp. 50-57. |