System and method for accelerating cryptographically secured transactions
First Claim
Patent Images
1. A method for providing network security, comprising the steps of:
- receiving a plurality of network protocol packets, wherein a network protocol packet includes a network protocol header and a plurality of network protocol data, and wherein the network protocol data include a first cryptographic protocol header and a first plurality of encrypted data;
determining a first plurality of cryptographic protocol rules associated with the network protocol data;
establishing a cryptographic session, if required by said first cryptographic rules;
applying the first plurality of cryptographic protocol rules to the first encrypted data to obtain a first plurality of cleartext data;
translating the first plurality of cleartext data into a second plurality of cleartext data in accordance with at least one translation rule; and
encrypting the second plurality of cleartext data in accordance with at least one rule associated with a second cryptographic protocol, resulting in a second plurality of encrypted data.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for accelerating cryptographically secured transactions is disclosed. In an embodiment of the present invention, cryptographically secured transactions are accelerated to increase the speed at which encrypted network transcriptions may be processed by offloading encryption processing to central encryption servers equipped with hardware built to accelerate encryption speed and to reduce encryption latency.
-
Citations
18 Claims
-
1. A method for providing network security, comprising the steps of:
-
receiving a plurality of network protocol packets, wherein a network protocol packet includes a network protocol header and a plurality of network protocol data, and wherein the network protocol data include a first cryptographic protocol header and a first plurality of encrypted data;
determining a first plurality of cryptographic protocol rules associated with the network protocol data;
establishing a cryptographic session, if required by said first cryptographic rules;
applying the first plurality of cryptographic protocol rules to the first encrypted data to obtain a first plurality of cleartext data;
translating the first plurality of cleartext data into a second plurality of cleartext data in accordance with at least one translation rule; and
encrypting the second plurality of cleartext data in accordance with at least one rule associated with a second cryptographic protocol, resulting in a second plurality of encrypted data. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
2. A system for providing network security, comprising:
-
an input module for receiving a plurality of network protocol packets;
a translation module for translating a first plurality of data into a second plurality of data;
an output module; and
a cryptographic module responsive to the input module and the output module for performing cryptographic operations.
-
-
3. A system for providing network security, comprising:
-
means for receiving a request to perform a cryptographic operation;
means for returning a response to the cryptographic operation request;
at least one module for performing said cryptographic operations. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification