System and method for performing security operations on network data
First Claim
1. A system for performing security operations on network data, the system comprising:
- memory;
a data coprocessor configured to transfer data into and out of the memory;
a plurality of processors coupled to the memory and to the data coprocessor, each processor being configured to perform, in parallel to one another, security operations on a portion of the data; and
a plurality of security coprocessors coupled to the memory, each security coprocessor being coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are described for performing security operations on network data. According to an exemplary embodiment, a system for performing security operations on network data includes memory and a data coprocessor configured to transfer data into and out of the memory. A plurality of processors are coupled to the memory and to the data coprocessor. Each processor is configured to perform, in parallel to one another, security operations on a portion of the data. The system includes a plurality of security coprocessors coupled to the memory. Each security coprocessor is coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data.
-
Citations
29 Claims
-
1. A system for performing security operations on network data, the system comprising:
-
memory;
a data coprocessor configured to transfer data into and out of the memory;
a plurality of processors coupled to the memory and to the data coprocessor, each processor being configured to perform, in parallel to one another, security operations on a portion of the data; and
a plurality of security coprocessors coupled to the memory, each security coprocessor being coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for performing security operations on network data, the method comprising:
-
transferring data into memory;
performing security operations on respective portions of the data in parallel using a plurality of processors;
using a plurality of security coprocessors to assist in performing the security operations on the respective portions of the data, each security coprocessor being coupled to a respective one of the processors; and
transferring the operated-on portions of the data out of the memory. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer readable medium containing a computer program for performing security operations on network data, wherein the computer program comprises executable instructions for:
-
transferring data into memory;
performing security operations on respective portions of the data in parallel using a plurality of processors;
using a plurality of security coprocessors to assist in performing the security operations on the respective portions of the data, each security coprocessor being coupled to a respective one of the processors; and
transferring the operated-on portions of the data out of the memory. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification