×

Secure networking using a resource-constrained device

  • US 20050108571A1
  • Filed: 05/19/2004
  • Published: 05/19/2005
  • Est. Priority Date: 09/29/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of secure communication between a resource-constrained device and remote network nodes over a network wherein the remote network nodes communicate with the resource-constrained device using unmodified network clients and servers and wherein the resource-constrained device has a central processing unit, a random access memory, a non-volatile memory, a read-only memory, and an input and output component, comprising:

  • using a physical link selected from one of several physical link methods;

    executing on the resource-constrained device a communications module implementing networking protocols and one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device;

    implementing an execution model, wherein the communication module is driven by input events and by the applications and wherein the resource-constrained device uses at least one optimization technique selected from;

    swapping data from the random access memory to the non-volatile memory;

    swapping data from the non-volatile memory to the random access memory;

    sharing data buffers between one or more communications protocol layers or security protocol layers;

    executing on the host computer one or more link layer communication protocols operable to communicate with the resource-constrained device and operable to communicate with the remote network nodes; and

    executing one or more secure network applications on the resource-constrained device wherein the network applications call upon the communication module of the resource-constrained device to communicate with the remote network node wherein the secure network applications are securely accessible by the remote network nodes using unmodified network clients and servers.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×