Systems and methods for protecting communications
First Claim
Patent Images
1. A method, comprising:
- receiving an Ethernet data packet comprising a header having a structure from an operating system at a virtualization layer, the virtualization layer being above a physical layer and below all other layers;
performing an operation on a portion of the Ethernet data packet other than the header, thereby creating a modified data packet and maintaining the original header structure;
accessing, by the virtualization layer, an encryption modulation chart;
updating the virtualization layer to apply a first encryption algorithm to a first portion of the Ethernet data packet and to apply a second encryption algorithm to a second portion of the Ethernet data packet;
selecting, by the virtualization layer, an encryption algorithm from the encryption modulation chart;
applying different encryption algorithms, by the virtualization layer to the Ethernet data packet at the same point in time;
transmitting the modified data packet, including the original header structure, to the physical layer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a data packet including a header having a structure from an operating system at a virtualization layer, where the virtualization layer is above a physical layer and below all other layers. The method also includes performing an operation on a portion of the data packet other than the header, thereby creating a modified data packet and maintaining the original header structure. The method further includes transmitting the modified data packet, including the original header structure, to the physical layer.
-
Citations
9 Claims
-
1. A method, comprising:
-
receiving an Ethernet data packet comprising a header having a structure from an operating system at a virtualization layer, the virtualization layer being above a physical layer and below all other layers; performing an operation on a portion of the Ethernet data packet other than the header, thereby creating a modified data packet and maintaining the original header structure; accessing, by the virtualization layer, an encryption modulation chart; updating the virtualization layer to apply a first encryption algorithm to a first portion of the Ethernet data packet and to apply a second encryption algorithm to a second portion of the Ethernet data packet; selecting, by the virtualization layer, an encryption algorithm from the encryption modulation chart; applying different encryption algorithms, by the virtualization layer to the Ethernet data packet at the same point in time; transmitting the modified data packet, including the original header structure, to the physical layer. - View Dependent Claims (2, 3, 4)
-
-
5. A method for device authentication, the method comprising:
-
sending a request from a device to an authentication client; receiving a response including a virtualization client, obtaining, by the virtualization client, unique device identification information from the device; sending the unique device identification information to the authentication client, thereby authenticating the device at the authentication client; sending a request for user authentication information from the authentication client to the virtualization client; sending user authentication information from the device to the authentication client, thereby authenticating a user of the device at the authentication client; and authenticating the user by using the user authentication information and unique device identification information to authenticate the user; receiving an Ethernet data packet comprising a header having a structure from an operating system at a virtualization layer; and performing an operation on a portion of the Ethernet data packet, other than the header, thereby creating a modified data packet and maintaining the original header structure, wherein the operation comprises; encrypting the portion of the data packet while not encrypting the original packet header structure; updating the virtualization layer to apply a different encryption algorithm to the portion of the Ethernet data packet; and selecting and applying different encryption algorithms, by the virtualization layer, to the Ethernet data packet at the same point in time; transmitting the modified data packet, including the original header structure, to a physical layer of the device. - View Dependent Claims (6, 7, 8, 9)
-
Specification