Claims
- 1. A method of providing controlled communication in accordance with defined rules of transmission, the method comprising:
processing data in accordance with defined logic to construct a first data packet; generating a security tag responsive to validating the processing in accordance with the defined logic; and constructing a trusted data packet responsive to the processing and generating.
- 2. The method as in claim 1, further comprising:
transmitting the trusted data packet onto a communications path in accordance with the defined rules of transmission.
- 3. The method as in claim 2, further comprising:
receiving the trusted data packet from the communications path; and validating the trusted data packet responsive to analyzing the trusted data packet to verify the security tag responsive to the defined logic.
- 4. The method as in claim 3, further comprising:
mapping the trusted data packet to a first communications class of service responsive to the validating the trusted data packet and verifying the respective security tag; and mapping the trusted data packet to a second communications class of service responsive to the validating the trusted data packet resulting in failed verifying of the security tag.
- 5. The method as in claim 4, wherein the first communications class of service is coupling the trusted data packet for further communication therefrom.
- 6. The method as in claim 5, wherein the second communications class of service is denial of further communication therefrom.
- 7. The method as in claim 5, wherein the second communications class of service is local storage without further transmission.
- 8. The method as in claim 5, wherein the second communications class of service is at a lower priority level than the first communications class of service.
- 9. The method as in claim 8, wherein the priorities are determined responsive to set bits within the trusted data packet.
- 10. The method as in claim 3, wherein the transmitting is performed in a first computing element; and
wherein the receiving is performed in a second computing element.
- 11. The method as in claim 10, wherein the first computing element and the second computing element are both contained within a single physical computing system.
- 12. The method as in claim 10, wherein the first computing element and the second computing element are contained in separate physical computing systems.
- 13. The method as in claim 10, wherein the second computing element has non-modifiable processing logic.
- 14. The method as in claim 10, wherein at least one of the first computing element and the second computing element is comprised of at least one of: tamper-proof hardware and tamper-proof firmware, self-destructive hardware.
- 15. The method as in claim 10, further comprising:
making the second computing element inoperative responsive to detection of at least one of: tampering, attempt to replace hardware, attempt to replace firmware, attempt to replace software.
- 16. The method as in claim 11, wherein the single physical computing system is at least one of: a single printed circuit board, a single chip, a single computing module, a single chassis, an hand held device, a PDA, a cellular phone, a single box, a user terminal.
- 17. The method as in claim 1, further comprising:
generating the security tag and the processing data in accordance with defined logic to construct an obfuscated first data packet.
- 18. The method as in claim 1, wherein the generating the security tag is hidden within the processing data in accordance with defined logic to construct the first data packet.
- 19. The method as in claim 1, wherein the generating the security tag is encrypted within the processing data in accordance with defined logic to construct the first data packet.
- 20. The method as in claim 10, further comprising:
coupling the first computing element and the second computing element through a communications network.
- 21. The method as in claim 20, wherein the communications network is at least one of: an access network, a metropolitan network, a local area network, a wireless network, an enterprise network, a cellular telephone network, a cable modem network, a passive optical network, Ethernet, token ring, a spatial reuse ring, SONET ring, resilient packet ring, a costumer premise network (CPN), an IP, Internet, a 3G wireless network, IEEE 802 standards, ATM network, frame relay (FR) network, a virtual private network (VPN), a shared media, and a storage area network (SAN).
- 22. The method as in claim 20, further comprising:
directly coupling the first computing element and the second computing element.
- 23. The method as in claim 10, wherein the first computing element is part of at least one of: a single printed circuit board, a single chip, a single computing module, a single chassis, an hand held device, a PDA, a cellular phone, a single box, a user terminal, an application software module, an operating system module, a Java applet, a communications software module, a firmware component, a software driver, and a distributed system software module.
- 24. The method as in claim 10, wherein the second computing element is part of at least one of: a firewall, a gateway, a router, a routing controller, a local area network bridge, a local area network switch, a wireless base station, a wireless 3G base station, an IEEE 802.11 base station, a cable modem head-end, a central office, an ADSL DSLAM, and a point-of-presence (PoP).
- 25. The method as in claim 4, further comprising:
forwarding the trusted data packet for further communication over a defined communications path.
- 26. The method as in claim 25, wherein the defined communications path is part of at least one of: a VPN, an ATM, a FR, a CPN, a content delivery network (CDN), an ISP, a shared media, a firewall, a local area network, an Internet, a metropolitan area network, a SAN, a link to application server, a link to web server, a link to data base server, a link to Internet server, a link to network server, a public network, an enterprise network, and a carrier network.
- 27. The method as in claim 4, further comprising:
forwarding the trusted data packet to a further computing device.
- 28. The method as in claim 27, wherein the further computing device is at least one of: an application server, a web server, a data base server, an Internet server, a network server, a firewall, a multimedia server, a video server.
- 29. The method as in claim 4, wherein the first class of service is comprised of a local processing the trusted data packet.
- 30. The method as in claim 29, wherein the local processing is done by at least one of: a router, a server, a web-server, a database, a firewall, a network appliance.
- 31. The method as in claim 1, further comprising:
receiving at least some of the defined rules of transmission from a separate rules controller.
- 32. The method as in claim 31, wherein the defined rules of transmission determine at least one of: performance characteristics, access characteristics, transmission limitations, transmission rates, window sizes, port numbers, IP addresses, network addresses, quotas, renewable quotas, packet structure limitations, and transmission schedule.
- 33. The method as in claim 1, wherein at least one of the defined rules of transmission determines a renewable precondition for transmission.
- 34. The method as in claim 33, wherein the renewable precondition for transmission is defined by least one of: renewable transmission quota of trusted data packets, number of trusted data packets that can be transmitted per unit of time, time signal, UTC time signal, digitally signed time signal, digitally signed time-stamp, digitally signed time-stamp from UTC (coordinated universal time), digital cash for transmission of trusted data packets, and cryptographic keys for marking trusted data packets,
- 35. The method as in claim 33, wherein the renewable precondition for transmission is obtained from at least one of: a predefined logic, an external rule controller, a security management system (SMS), network interface, network appliance, server, network management system, firewall, local computation, smart card device, portable device.
- 36. The method as in claim 33, further comprising: suspending the transmission responsive to the renewable precondition for transmission not being valid.
- 37. The method as in claim 1, further comprising:
updating the defined logic.
- 38. The method as in claim 37, wherein the updating comprises at least one of: adding data, deleting data and replacing data and wherein data comprises at least one of lines of codes, machine codes, obfuscated codes, object codes, tables of codes, program parameters, subroutine parameters, tables of parameters, data structure of parameters, software modules, alpha numeric values, cryptographic fields, assembly language code, software applets, program control information, firmware code, instructions for reprogramming programmable hardware elements such as PLAs.
- 39. The method as in claim 1, wherein the generating is comprised of at least one of applying a pseudo-random generator, applying a pseudo-random function, applying a cryptographic function, applying an encryption function, applying a scrambling subroutine, applying an authentication function, applying a digital signing function, applying a cryptographic hash function, applying a subroutine, applying a computational logic module, applying a symmetric cryptography function, applying an asymmetric cryptography function, employing a cryptographic key, employing a cryptographic seed, employing an encrypted software, employing an obfuscated software, employing a hidden program, employing logic with a set of parameters, employing a hardware module, employing a smart card, employing a portable device, and employing a distributed protocol.
- 40. A method of validating compliance with communications processing for the transmittal of data packets comprised of a received security tag, the method comprising:
receiving one of the data packets; generating a local security tag; comparing the local security tag to the received security tag; and mapping the received data packet to a defined class of service responsive to the comparing.
- 41. The method as in claim 40, further comprising:
mapping the received data packet to a first class of service responsive to the local security tag equaling the received security tag; and mapping the received data packet to a second class of service responsive to the local security tag being different from the received security tag.
- 42. The method as in claim 40, further comprising:
forwarding the received data packet for further communication over a defined communications path.
- 43. The method as in claim 42, wherein the defined communications path is part of at least one of: a VPN, an ATM, a FR, a CPN, a content delivery network (CDN), an ISP, a shared media, a firewall, a local area network, an Internet, a metropolitan area network, a SAN, a link to application server, a link to web server, a link to data base server, a link to Internet server, a link to network server, a public network, an enterprise network, and a carrier network.
- 44. The method as in claim 40, further comprising:
forwarding the received data packet to a further computing device.
- 45. The method as in claim 44, wherein the further computing device is at least one of: an application server, a web server, a data base server, an Internet server, a network server, a firewall, a multimedia server, a video server.
- 46. The method as in claim 41, wherein the first class of service is comprised of a local processing of the received data packet.
- 47. The method as in claim 46, wherein the local processing is done by at least one of: a router, a server, a web-server, a database, a firewall, and a network appliance.
- 48. The method as in claim 40, further comprising:
updating the logic for generating a local security tag.
- 49. The method as in claim 48, wherein the updating is comprised of using information obtained by at least one of: local operation, predefined logic, an external rule controller, a security management system, network interface, network appliance, server, network management system, firewall, local computation, smart card device, and portable device.
- 50. A method of providing controlled signaling in accordance with defined rules of at least one of transmission and operation, the method comprising:
processing data in accordance with defined logic to construct operation; generating a security tag responsive to validating the processing in accordance with the defined logic; and constructing a signal responsive to computing with security tag.
- 51. The method as in claim 50, further comprising:
transmitting the signal onto a communications path in accordance with the operation.
- 52. The method as in claim 51, further comprising:
receiving the signal from the communications path; and validating the signal responsive to verify the computing with security tag.
- 53. The method as in claim 50, further comprising:
receiving at least some of the defined rules of at least one of transmission and operation, from a separate rules controller.
- 54. The method as in claim 50, further comprising:
determining a renewable precondition for at least one of transmission and operation responsive to at least one of the defined rules of at least one of transmission and operation.
- 55. The method as in claim 50, wherein the generating comprises at least one of applying a pseudo-random generator, applying a pseudo-random function, applying a cryptographic function, applying an encryption function, applying a scrambling subroutine, applying an authentication function, applying a digital signing function, applying a cryptographic hash function, applying a subroutine, applying a computational logic module, applying a symmetric cryptography function, applying an asymmetric cryptography function, employing a cryptographic key, employing a cryptographic seed, employing an encrypted software, employing an obfuscated software, employing a hidden program, employing logic with a set of parameters, employing a hardware module, employing a smart card, employing a portable device, and employing a distributed protocol.
- 56. The method as in claim 50, further comprising:
determining an action based on a context responsive to at least one of the defined rules of at least one of transmission and operation.
- 57. The method as in claim 56, wherein the context involves at least one of a system user present, a system user present at an end-station, a system user present at the computer used for transmission and operation, application program present, a data information available, a cryptographic keys available and parameters available.
- 58. The method as in claim 56, wherein when said context is missing for at least one of transmission and operation there will be no transmitting the signal onto a communications path in accordance with the operation.
- 59. A system of providing controlled communication in accordance with defined rules of transmission, the system comprising:
processing logic for constructing a first data packet; tag logic for generating a security tag responsive to validating the processing in accordance with the defined rules; and constructing a trusted data packet responsive to the processing logic and the tag logic.
- 60. The system as in claim 59, further comprising:
communications logic for transmitting the trusted data packet onto a communications path in accordance with the defined rules of transmission.
- 61. The system as in claim 60, further comprising:
a receiver for receiving the trusted data packet from the communications path; and validation logic for validating the trusted data packet responsive to analyzing the trusted data packet to verify the security tag responsive to the defined logic.
- 62. The system as in claim 61, further comprising:
first mapping logic for mapping the trusted data packet to a first communications class of service responsive to the validating the trusted data packet and verifying the respective security tag; and second mapping logic for mapping the trusted data packet to a second communications class of service responsive to the validating the trusted data packet resulting in failed verifying of the security tag.
- 63. The system as in claim 62, wherein the first communications class of service provides for coupling the trusted data packet for further communication therefrom.
- 64. The system as in claim 63, wherein the second communications class of service provides for denial of further communication therefrom.
- 65. The system as in claim 63, wherein the second communications class of service provides for local storage without further transmission.
- 66. The system as in claim 63, wherein the second communications class of service is at a lower priority level than the first communications class of service.
- 67. The system as in claim 66, wherein the priorities are determined responsive to set bits within the trusted data packet.
- 68. The system as in claim 61, wherein the transmitting is performed in a first computing element; and
wherein the receiving is performed in a second computing element.
- 69. The system as in claim 68, wherein the first computing element and the second computing element are both contained within a single physical computing system.
- 70. The system as in claim 68, wherein the first computing element and the second computing element are contained in separate physical computing systems.
- 71. The system as in claim 68, wherein the second computing element has non-modifiable processing logic.
- 72. The system as in claim 68, wherein at least one of the first computing element and the second computing element is comprised of at least one of: tamper-proof hardware, tamper-proof firmware, and self-destructive hardware.
- 73. The system as in claim 68, wherein the second computing element is made inoperative responsive to detection of at least one of: tampering, attempt to replace hardware, attempt to replace firmware, and attempt to replace software.
- 74. The system as in claim 69, wherein the single physical computing system is at least one of: a single printed circuit board, a single chip, a single computing module, a single chassis, an hand held device, a PDA, a cellular phone, a single box, a user terminal.
- 75. The system as in claim 59, wherein the processor logic provides for the generating the security tag and the processing data in accordance with defined logic to construct the first data packet that is obfuscated.
- 76. The system as in claim 59, wherein the processing logic provides for generating of the security tag that is hidden within the processing data in accordance with defined logic to construct the first data packet.
- 77. The system as in claim 59, wherein the processing logic provides for the generating of the security tag as encrypted within the processing data in accordance with defined logic to construct the first data packet.
- 78. The system as in claim 68, further comprising:
a communications network for coupling the first computing element and the second computing element through.
- 79. The system as in claim 78, wherein the communications network is at least one of: an access network, a metropolitan network, a local area network, a wireless network, an enterprise network, a cellular telephone network, a cable modem network, a passive optical network, Ethernet, token ring, a spatial reuse ring, SONET ring, resilient packet ring, a costumer premise network (CPN), an IP, Internet, a 3G wireless network, IEEE 802 standards, ATM network, frame relay (FR) network, a virtual private network (VPN), a shared media, and a storage area network (SAN).
- 80. The system as in claim 78, wherein the first computing element and the second computing element are directly coupled.
- 81. The system as in claim 68, wherein the first computing element is part of at least one of: a single printed circuit board, a single chip, a single computing module, a single chassis, an hand held device, a PDA, a cellular phone, a single box, a user terminal, an application software module, an operating system module, a Java applet, a communications software module, a firmware component, a software driver, and a distributed system software module.
- 82. The system as in claim 68, wherein the second computing element is part of at least one of: a firewall, a gateway, a router, a routing controller, a local area network bridge, a local area network switch, a wireless base station, a wireless 3G base station, an IEEE 802.11 base station, a cable modem head-end, a central office, an ADSL DSLAM, and a point-of-presence (PoP).
- 83. The system as in claim 62, further comprising:
means for forwarding the trusted data packet for further communication over a defined communications path.
- 84. The system as in claim 83, wherein the defined communications path is part of at least one of: a VPN, an ATM, a FR, a CPN, a content delivery network (CDN), an ISP, a shared media, a firewall, a local area network, an Internet, a metropolitan area network, a SAN, a link to application server, a link to web server, a link to data base server, a link to Internet server, a link to network server, a public network, an enterprise network, and a carrier network.
- 85. The system as in claim 62, further comprising:
communications logic for forwarding the trusted data packet to a further computing device.
- 86. The system as in claim 85, wherein the further computing device is at least one of: an application server, a web server, a data base server, an Internet server, a network server, a firewall, a multimedia server, a video server.
- 87. The system as in claim 62, wherein the first communications class of service is comprised of a local processing the trusted data packet.
- 88. The system as in claim 87, wherein the local processing is done by at least one of: a router, a server, a web-server, a database, a firewall, a network appliance.
- 89. The system as in claim 59, further comprising:
a separate rules controller for transmitting at least some of the defined rules of transmission.
- 90. The system as in claim 89, wherein the defined rules of transmission determine at least one of: performance characteristics, access characteristics, transmission limitations, transmission rates, window sizes, port numbers, IP addresses, network addresses, quotas, renewable quotas, packet structure limitations, and transmission schedule.
- 91. The system as in claim 59,
wherein at least one of the defined rules of transmission determines a renewable precondition for transmission.
- 92. The system as in claim 91, wherein the renewable precondition for transmission is defined by least one of: renewable transmission quota of trusted data packets, number of trusted data packets that can be transmitted per unit of time, time signal, UTC time signal, digitally signed time signal, digitally signed time-stamp, digitally signed time-stamp from UTC (coordinated universal time), digital cash for transmission of trusted data packets, and cryptographic keys for marking trusted data packets,
- 93. The system as in claim 91, wherein the renewable precondition for transmission is obtained from at least one of: a predefined logic, an external rule controller, a security management system (SMS), network interface, network appliance, server, network management system, firewall, local computation, smart card device, portable device.
- 94. The system as in claim 91, wherein the renewable precondition for transmission is not valid, transmission is suspended.
- 95. The system as in claim 59, wherein the defined logic is modified responsive to at least one of: adding data, deleting data and replacing data and wherein data comprises at least one of lines of codes, machine codes, obfuscated codes, object codes, tables of codes, program parameters, subroutine parameters, tables of parameters, data structure of parameters, software modules, alpha numeric values, cryptographic fields, assembly language code, software applets, program control information, firmware code, instructions for reprogramming programmable hardware elements such as PLAs.
- 96. The system as in claim 59, wherein the tag logic utilizes at least one of applying a pseudo-random generator, applying a pseudo-random function, applying a cryptographic function, applying an encryption function, applying a scrambling subroutine, applying an authentication function, applying a digital signing function, applying a cryptographic hash function, applying a subroutine, applying a computational logic module, applying a symmetric cryptography function, applying an asymmetric cryptography function, employing a cryptographic key, employing a cryptographic seed, employing an encrypted software, employing an obfuscated software, employing a hidden program, employing logic with a set of parameters, employing a hardware module, employing a smart card, employing a portable device, and employing a distributed protocol.
- 97. A system of providing controlled signaling in accordance with defined rules of at least one of transmission and operation, the system comprising:
defined logic for processing data to construct operation; tag logic for generating a security tag responsive to validating the processing in accordance with the defined logic; and construct logic for constructing a signal responsive to computing utilizing the security tag.
- 98. The system as in claim 97, further comprising:
a communications path coupled for transmitting the signal in accordance with the operation.
- 99. The system as in claim 98, further comprising:
a receiver for receiving the signal from the communications path; and validation logic for validating the signal responsive to verify the computing with security tag.
- 100. The system as in claim 97, further comprising:
a separate rules controller for providing at least some of the defined rules of at least one of transmission and operation.
- 101. The system as in claim 97,
wherein at least one of the defined rules of at least one of transmission and operation, determines a renewable precondition for at least one of transmission and operation.
- 102. The system as in claim 97,
wherein at least one of the defined rules of at least one of transmission and operation, determines an action based on a context.
- 103. The system as in claim 102,
wherein the context involves at least one of a system user present, a system user present at an end-station, a system user present at the computer used for transmission and operation, application program present, a data information available, a cryptographic keys available and parameters available.
- 104. The system as in claim 102,
wherein when said context is missing for at least one of transmission and operation there will be no transmitting the signal onto a communications path in accordance with the operation.
RELATED APPLICATIONS
[0001] This application claims priority from the Provisional Patent Application with serial No. 60/365,148; entitled, “BEST EFFORT LINEARIZATION OF TCP PACKET FLOWS,” filed Mar. 16, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60365148 |
Mar 2002 |
US |