Claims
- 1. A communications system comprising:
a first communications subsystem comprising a first processing subsystem providing first logic for data packet processing, rules of transmission and security tag generation, for selectively transmitting trusted data packets; a second communications subsystem comprising a second processing subsystem providing logic for checking, validating and mapping of the selectively transmitted trusted data packets responsive to a defined validation logic; and a communications access network coupling the first communications subsystem and the second communications subsystem.
- 2. The system as in claim 1, wherein the mapping of the selectively transmitted trusted data packets is further comprised of mapping logic;
wherein mapping logic further comprised of at least one of: a mapping table, decision-tree, a processing logic, a data packet processing logic, a data packet header processing decision-tree, a security tag processing logic, a data packet identification processing logic, a data packet priority processing logic, a data packet class of service processing logic, and a secure time-stamp processing logic.
- 3. The system as in claim 1, further comprising:
a communications service network for coupling the second communications subsystem to a destination; and
wherein the rules of transmission are provided to the first communications subsystem from the communications service network.
- 4. The system as in claim 2, wherein the second communications subsystem is further comprised of: a subsystem for forwarding data packets responsive to the mapping logic.
- 5. The system as in claim 1, wherein the rules of transmission are further characterized as defining at least one of: transmission rate, maximum window size, port number, destination IP, source IP, data packet priority, transmission time, and transmission schedule.
- 6. The system as in claim 1, wherein the rules of transmission and security tag generation are further characterized as responsive to a at least one of: predefined schedule, secure timestamp, renewable codes and parameters, and update codes and parameters.
- 7. The system as in claim 1, providing the rules of transmission, wherein the rules of transmission are provided from an external storage medium.
- 8. The system as in claim 1, wherein the first logic is comprised of an interlocking of a plurality of logic modules responsive to the data packet processing, the rules of transmission and the security tag generation.
- 9. The system as in claim 8, wherein the interlocking is further characterized in that each respective one of the plurality of logic modules is associated with a respective one of a plurality of defined subtasks;
wherein the combined plurality of defined subtasks defines the first logic; and wherein all of the logic modules are required to properly perform the respective defined subtask to provide the first logic.
- 10. The system as in claim 1, further comprising:
an update controller providing update codes and parameters to the first processing subsystem.
- 11. The system as in claim 10, further comprising:
a security management server (SMS) for providing update information to the update controller.
- 12. The system as in claim 1, further comprising:
a renewable controller providing update codes and parameters to the first processing subsystem.
- 13. The system as in claim 12, further comprising:
a security management server (SMS) providing renewable information to the renewable controller.
- 14. The system as in claim 1, wherein the first processing subsystem is further comprised of cryptographic modules; wherein the cryptographic modules provide for at least one of: program authentication, user authentication, cryptographic authentication, application authentication, encryption, secure time-stamp, and digital signature.
- 15. The system as in claim 1, wherein the second processing subsystem is further comprised of validation modules; wherein the validation modules further provide for at least one of: program authentication checking, user authentication checking, cryptographic authentication checking, application authentication checking, decryption, secure time-stamp, and digital signature validation.
- 16. A communications method comprising:
providing, via a first communications subsystem comprising a first processing subsystem logic for data packet processing, rules of transmission and security tag generation, for selectively transmitting trusted data packets; providing, via a second communications subsystem comprising a second processing subsystem logic for checking, validating and mapping of the selectively transmitted trusted data packets responsive to a defined validation logic; and coupling the first communications subsystem and the second communications subsystem via a communications access network.
- 17. The method as in claim 16, further comprising:
mapping the selectively transmitted trusted data packets responsive to mapping logic;
wherein the mapping logic is further comprised of at least one of: a mapping table, decision-tree, a processing logic, a data packet processing logic, a data packet header processing decision-tree, a security tag processing logic, a data packet identification processing logic, a data packet priority processing logic, a data packet class of service processing logic, and a secure time-stamp processing logic.
- 18. The method as in claim 16, further comprising:
coupling the second communications subsystem to a destination via a communications service network; and providing the rules of transmission to the first communications subsystem from the communications service network.
- 19. The method as in claim 17, further comprising:
forwarding data packets via the second communications subsystem responsive to the mapping logic.
- 20. The method as in claim 16, further comprising:
defining via the rules of transmission at least one of: transmission rate, maximum window size, port number, destination IP, source IP, data packet priority, transmission time, and transmission schedule.
- 21. The method as in claim 16, further comprising:
providing the rules of transmission and security tag generation as responsive to at least one of a predefined schedule, a secure time-stamp, renewable codes and parameters, and update codes and parameters.
- 22. The method as in claim 16, further comprising:
providing the rules of transmission from an external storage medium.
- 23. The method as in claim 16, further comprising:
interlocking, via the first logic, a plurality of logic modules responsive to the data packet processing, the rules of transmission and the security tag generation.
- 24. The method as in claim 23, wherein the interlocking is further characterized in that each respective one of the plurality of logic modules is associated with a respective one of a plurality of defined subtasks;
wherein the combined plurality of defined subtasks defines the first logic; and wherein all of the logic modules are required to properly perform the respective defined subtask to provide the first logic.
- 25. The method as in claim 16, further comprising:
providing update codes and parameters to the first processing subsystem via an update controller.
- 26. The method as in claim 25, further comprising:
providing an update information to the update controller via a security management server (SMS).
- 27. The method as in claim 16, further comprising:
providing update codes and parameters to the first processing subsystem via a renewable controller.
- 28. The method as in claim 27, further comprising:
providing renewable information to the renewable controller via a security management server (SMS).
- 29. The method as in claim 16, further comprising:
providing via the first processing subsystem for at least one of: program authentication, user authentication, cryptographic authentication, application authentication, encryption, secure time-stamp, and digital signature.
- 30. The method as in claim 16, wherein the second processing subsystem further comprising of validation modules; wherein validation modules further providing for at least one of: program authentication checking, user authentication checking, cryptographic authentication checking, application authentication checking, decryption, secure time-stamp, and digital signature validation.
- 31. A method of controlling communications data flow between at least two computing elements comprising:
generating a security tag; associating the security tag with a first computing element responsive to compliance logic; generating a data packet which includes a security portion; transmitting the data packet over a communications path; receiving the data packet at least a second computing element; and processing the data packet to validate the security portion responsive to the security portion and at least a portion of the data packet.
- 32. The method as in claim 31, further comprising:
further transmitting the data packet from the second computing element for further processing at least a third computing element.
- 33. The method as in claim 32,
wherein the communications path includes at least the second computing element and the third computing element.
- 34. The method as in claim 33,
wherein the transmitting is responsive to the processing of the second computing element and the third computing element.
- 35. The method as in claim 34,
wherein processing in at least one of: the second computing element and the third computing element, computing of additional security.
- 36. A system for providing secure communications, comprising:
a tag generator operating from an initial generator state to generate a sequence of security tags for association with data packets for transmission; means providing for transmission of the data packets with associated security tags; a tag verifier operating from an initial verification state to generate a sequence of comparison security tags for selective comparison to the security tags; means for coordinating the initial generator state and the initial verifier state prior to transmission of any of the data packets in the sequence; wherein the tag verifier provides valid comparison tags responsive to the means for coordinating.
- 37. The system as in claim 36, wherein the tag generator includes a sequence number as part of the security tag.
- 38. The system as in claim 37,
wherein the tag verifier generates a comparison sequence number for selective comparison to the sequence number that is part of the security tag.
- 39. The system as in claim 37,
wherein the sequence number is used for at least detecting data packet loss.
- 40. The system as in claim 36, wherein the tag generator includes provides a secure timestamp as part of the security tag.
- 41. The system as in claim 40,
wherein the tag verifier generate a comparison secure time-stamp for selective comparison to the secure time-stamp that is part of the security tag.
- 42. A method for providing secure communications, comprising:
operating from an initial generator state to generate a sequence of security tags for association with data packets for transmission; providing for transmission of the data packets with associated security tags; operating from an initial verification state to generate a sequence of comparison security tags for selective comparison to the security tags; coordinating the initial generator state and the initial verifier state prior to transmission of any of the data packets in the sequence; and providing the comparison security tags responsive to the means for coordinating.
- 43. The method as in claim 42, further comprising:
including a sequence number as part of the security tag.
- 44. The method as in claim 43, further comprising:
generating a comparison sequence number for selective comparison to the sequence number that is part of the security tag.
- 45. The method as in claim 43, further comprising:
utilizing the sequence number for at least detecting data packet loss.
- 46. The method as in claim 42, further comprising:
including a secure time-stamp as part of the security tag.
- 47. The method as in claim 46, further comprising:
generating a comparison secure time-stamp for selective comparison to the secure time-stamp that is part of the security tag.
- 48. A system for providing secure communications, comprising:
a tag generator operating from an initial generator state to generate a sequence of security tags and related information for association with data packets for transmission; means providing for transmission of the data packets with associated security tags; a tag verifier operating from an initial verification state to generate a sequence of comparison tags for selective comparison to the security tags responsive to the related information; and wherein the tag verifier only provides validation of the data packets responsive to comparing the comparison tags and the respective security tags for the respective data packets, and to the synchronization of the initial generator state and the initial verification state.
- 49. The system as in claim 48,
wherein the related information is at least of: program authentication, user authentication, cryptographic authentication, application authentication, encryption, secure time-stamp, time-stamp, clock reading, and digital signature.
- 50. A method for providing secure communications, comprising:
operating from an initial generator state to generate a sequence of security tags and related information for association with data packets for transmission; providing for transmission of the data packets with associated security tags; operating from an initial verification state to generate a sequence of comparison tags for selective comparison to the security tags responsive to the related information; and providing validation of the data packets responsive to comparing the comparison tags and the respective security tags for the respective data packets, and to the synchronization of the initial generator state and the initial verification state.
- 51. The method as in claim 50,
wherein the related information is at least of: program authentication, user authentication, cryptographic authentication, application authentication, encryption, secure time-stamp, time-stamp, clock reading, and digital signature.
RELATED APPLICATIONS
[0001] This application claims priority from the Provisional Patent Application with serial No. 60/365,148; entitled, “BEST EFFORT LINEARIZATION OF TCP PACKET FLOWS,” filed Mar. 16, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60365148 |
Mar 2002 |
US |