Java cryptographic engine to crypto acceleration integration
First Claim
Patent Images
1. A method for accelerating processing of security functions in a network, said method comprising the steps of:
- 1) intercepting data being transferred across the network;
2) determining that a security function to be performed can be offloaded for hardware acceleration;
3) utilizing a proxy engine to transparently offload the data; and
4) performing the security function in hardware.
1 Assignment
0 Petitions
Accused Products
Abstract
A networking appliance having a Java proxy engine that transparently offloads security functions into a cryptographic accelerator, thereby enabling rapid prototyping and platform independence, while increasing the speed of cryptographic and other security functions.
-
Citations
25 Claims
-
1. A method for accelerating processing of security functions in a network, said method comprising the steps of:
-
1) intercepting data being transferred across the network;
2) determining that a security function to be performed can be offloaded for hardware acceleration;
3) utilizing a proxy engine to transparently offload the data; and
4) performing the security function in hardware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for accelerating processing of cryptographic functions in a network, said system comprised of:
-
a cryptographic hardware accelerator for performing cryptographic functions; and
a cryptographic proxy engine for offloading a message to the cryptographic hardware accelerator for cryptographic processing. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification