Method and system for providing security using a loopback interface
First Claim
1. A method of providing security for data using a loopback interface, the method comprising:
- setting an Internet Protocol Security (IPsec) security policy configuration on a host device and a client device, the security policy configuration including a first loopback interface and an IP address for the host device and a second loopback interface and an IP address for the client device;
sending an HTTP/IPP packet to the first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to the second loopback interface;
sending the HTTP/IPP packet from the first loopback interface to a security module on the host device for encryption pursuant to an IPsec security protocol;
filtering the encrypted packet received from the first loopback interface on the host device and configuring the encrypted packet to be sent via Universal Serial Bus (USB) protocol over a USB connection to the client;
sending the encrypted packet from the host device to the client device over the USB connection;
injecting the encrypted packet into the second loopback interface on the client device;
sending the encrypted packet from the second loopback interface on the client device to the security module on the client device for decryption; and
sending the decrypted packet to the second loopback interface on the client device, wherein the packet is received on the client device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of providing security for data using a loopback interface, the method includes setting a security policy on a host device and a client device, the security policy configuration including a first loopback interface and an IP address for the host device and a second loopback interface and an IP address for the client device; sending an IP packet to the first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to the second loopback interface; sending the IP packet from the first loopback interface to a security module on the host device for encryption pursuant to a security protocol; filtering the encrypted packet received from first loopback interface and configuring the encrypted packet be sent to the client device; and sending the encrypted packet from the host device to the client device.
20 Citations
17 Claims
-
1. A method of providing security for data using a loopback interface, the method comprising:
-
setting an Internet Protocol Security (IPsec) security policy configuration on a host device and a client device, the security policy configuration including a first loopback interface and an IP address for the host device and a second loopback interface and an IP address for the client device; sending an HTTP/IPP packet to the first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to the second loopback interface; sending the HTTP/IPP packet from the first loopback interface to a security module on the host device for encryption pursuant to an IPsec security protocol; filtering the encrypted packet received from the first loopback interface on the host device and configuring the encrypted packet to be sent via Universal Serial Bus (USB) protocol over a USB connection to the client; sending the encrypted packet from the host device to the client device over the USB connection; injecting the encrypted packet into the second loopback interface on the client device; sending the encrypted packet from the second loopback interface on the client device to the security module on the client device for decryption; and sending the decrypted packet to the second loopback interface on the client device, wherein the packet is received on the client device. - View Dependent Claims (2, 3, 4, 5, 12, 13)
-
-
6. A non-transitory computer readable medium containing a computer program having computer readable code embodied to carry out a method of providing security for data using a loopback interface, the method comprising:
-
setting an Internet Protocol Security (IPsec) security policy configuration on a host device, the security policy configuration including a first loopback interface and an IP address for the host device; sending an HTTP/IPP packet to the first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to a second loopback interface on a client device, wherein the second loopback interface is configured to decrypt the packet; sending the HTTP/IPP packet from the first loopback interface to a security module on the host device for encryption pursuant to an IPsec security protocol; filtering the encrypted packet received from first loopback interface on the host device and configuring the encrypted packet be sent via Universal Serial Bus (USB) protocol over a USB connection to the client; and sending the encrypted packet from the host device to the client device over the USB connection. - View Dependent Claims (7, 8, 14, 15)
-
-
9. A non-transitory computer readable medium containing a computer program having computer readable code embodied to carry out a method of providing security for data using a loopback interface, the method comprising:
-
setting an Internet Protocol Security (IPsec) security policy configuration on a client device, the security policy configuration including a second loopback interface and an IP address for the client device; receiving an encrypted HTTP/IPP packet from a host device via Universal Serial Bus (USB) protocol over a USB connection, the HTTP/IPP packet being encrypted pursuant to an IPsec security protocol; injecting the encrypted packet into the second loopback interface on the client device; sending the encrypted packet from the second loopback interface on the client device to the security module on the client device for decryption; and sending the decrypted packet to the second loopback interface on the client device, wherein the HTTP/IPP packet is received on the client device. - View Dependent Claims (10, 11, 16, 17)
-
Specification