Secure networking using a resource-constrained device
First Claim
1. A method of secure communication between a resource-constrained device and remote network nodes over a network wherein the remote network nodes communicate with the resource-constrained device using unmodified network clients and servers and wherein the resource-constrained device has a central processing unit, a random access memory, a non-volatile memory, a read-only memory, and an input and output component, comprising:
- using a physical link selected from one of several physical link methods;
executing on the resource-constrained device a communications module implementing networking protocols and one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device;
implementing an execution model, wherein the communication module is driven by input events and by the applications and wherein the resource-constrained device uses at least one optimization technique selected from;
swapping data from the random access memory to the non-volatile memory;
swapping data from the non-volatile memory to the random access memory;
sharing data buffers between one or more communications protocol layers or security protocol layers;
executing on the host computer one or more link layer communication protocols operable to communicate with the resource-constrained device and operable to communicate with the remote network nodes; and
executing one or more secure network applications on the resource-constrained device wherein the network applications call upon the communication module of the resource-constrained device to communicate with the remote network node wherein the secure network applications are securely accessible by the remote network nodes using unmodified network clients and servers.
4 Assignments
0 Petitions
Accused Products
Abstract
Secure communication between a resource-constrained device and remote network nodes over a network with the resource-constrained acting as a network node. The remote network nodes communicate with the resource-constrained device using un-modified network clients and servers. Executing on the resource-constrained device, a communications module implements one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device.
-
Citations
60 Claims
-
1. A method of secure communication between a resource-constrained device and remote network nodes over a network wherein the remote network nodes communicate with the resource-constrained device using unmodified network clients and servers and wherein the resource-constrained device has a central processing unit, a random access memory, a non-volatile memory, a read-only memory, and an input and output component, comprising:
-
using a physical link selected from one of several physical link methods;
executing on the resource-constrained device a communications module implementing networking protocols and one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device;
implementing an execution model, wherein the communication module is driven by input events and by the applications and wherein the resource-constrained device uses at least one optimization technique selected from;
swapping data from the random access memory to the non-volatile memory;
swapping data from the non-volatile memory to the random access memory;
sharing data buffers between one or more communications protocol layers or security protocol layers;
executing on the host computer one or more link layer communication protocols operable to communicate with the resource-constrained device and operable to communicate with the remote network nodes; and
executing one or more secure network applications on the resource-constrained device wherein the network applications call upon the communication module of the resource-constrained device to communicate with the remote network node wherein the secure network applications are securely accessible by the remote network nodes using unmodified network clients and servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A resource-constrained device connected to a network and enabled to communicate with other nodes on the network, comprising:
-
at least one Internet application;
a communication module connected to the at least one Internet application and having;
a protocol module operable to implement TCP and IP protocols; and
a link layer module operable to implement the PPP protocol and a link layer protocol wherein the link layer protocol provides a bridge between Internet protocols and a lower level communications protocol. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 41, 42, 43, 44, 45)
-
-
37. A resource constrained device connected to a network and enabled to communicate with other nodes on a network having an architecture in which processing of application commands are separated from communications commands, comprising:
-
at least one Internet application; and
a communications module connected to the at least one Internet application and operable to implement at least one communications protocol independent from applications commands. - View Dependent Claims (38, 39, 40, 46, 47)
-
-
48. A resource-constrained device connected to a network and enabled to communicate with other nodes on the network, comprising:
-
means for connecting the resource-constrained device to the network;
at least one application program executing on the resource-constrained device;
means for communicating with other nodes using a secure communications protocol stack including a link layer communications protocol, network communications protocol, and secure socket layer protocol;
wherein the at least one application program may communicate securely with a remote application program executing on another node by calling the means for communicating with other nodes.
-
-
49. A resource-constrained device for communicating with remote computers connected via a network wherein the resource constrains is a small random access memory, comprising:
-
connectors for connecting the resource-constrained device to the network;
a random access memory;
a reprogrammable non-volatile memory;
a central processing unit connected to the connectors, the random access memory, and the reprogrammable non-volatile memory, wherein the reprogrammable non-volatile memory contains instructions for the central processing unit to cause the central processing unit to communicate with the remote computers on a peer-to-peer basis. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification