Virtual private network mechanism incorporating security association processor
    1.
    发明授权
    Virtual private network mechanism incorporating security association processor 有权
    包含安全关联处理器的虚拟专用网络机制

    公开(公告)号:US07107464B2

    公开(公告)日:2006-09-12

    申请号:US09902770

    申请日:2001-07-10

    IPC分类号: G06F17/00

    摘要: A novel and useful virtual private network (VPN) mechanism and related security association processor for maintaining the necessary security related parameters to perform security functions such as encryption, decryption and authentication. A security association database (SAD) and related circuitry is adapted to provide the necessary parameters to implement the IPSec group of security specifications for encryption/decryption and authentication. Each security association (SA) entry in the database comprises all the parameters that are necessary to receive and transmit VPN packets according to the IPSec specification.

    摘要翻译: 一种新颖有用的虚拟专用网(VPN)机制和相关的安全关联处理器,用于维护必要的安全相关参数以执行诸如加密,解密和认证的安全功能。 安全关联数据库(SAD)和相关电路适用于提供必要的参数来实现用于加密/解密和认证的IPSec安全规范组。 数据库中的每个安全关联(SA)条目包括根据IPSec规范接收和发送VPN数据包所需的所有参数。

    Dynamic packet filter utilizing session tracking
    3.
    发明授权
    Dynamic packet filter utilizing session tracking 有权
    动态包过滤器利用会话跟踪

    公开(公告)号:US06816455B2

    公开(公告)日:2004-11-09

    申请号:US09851768

    申请日:2001-05-09

    IPC分类号: H04L1266

    CPC分类号: H04L63/0254

    摘要: A novel and useful dynamic packet filter that can be incorporated in a hardware based firewall suitable for use in portable computing devices such as cellular telephones and wireless connected PDAs adapted to connect to the Internet. The invention performs dynamic packet filtering on packets received over an input packet stream. The dynamic filter checks dynamic protocol behavior using information extracted from the received packet. Sessions are created and stored in a session database to track the state of communications between the source and destination. Recognition of a session is accelerated by use of a hash table to quickly determine the corresponding session record in the session database. Session related data is read from the session database and the received packet is checked against a set of rules to determine whether to allow or deny the packet.