Method and system for including security information with a packet
First Claim
1. A method comprising:
- detecting a packet exiting a first network and entering a second network, wherein the first network is configured to support a network security technique, and the second network is not configured to support the network security technique; and
including network security information with the packet, wherein the network security information is associated with the network security technique.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for including security information with a packet is disclosed. A packet is detected as it exits a first network and enters a second network. The first network is configured to support a network security technique, and the second network is not configured to support the network security technique. Network security information associated with the network security technique is included with the packet. A network device is configured to include network security information in overhead of a packet. A method for identifying a first network device in a network is also disclosed. Identification information of the first network is communicated to a second network device.
-
Citations
56 Claims
-
1. A method comprising:
-
detecting a packet exiting a first network and entering a second network, wherein the first network is configured to support a network security technique, and the second network is not configured to support the network security technique; and
including network security information with the packet, wherein the network security information is associated with the network security technique. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
means for detecting a packet exiting a first network and entering a second network, wherein the first network is configured to support a network security technique, and the second network is not configured to support the network security technique; and
means for including network security information with the packet, wherein the network security information is associated with the network security technique. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product comprising:
-
a first set of instructions, executable on a computer system, configured to detect a packet exiting a first network and entering a second network, wherein the first network is configured to support a network security technique, and the second network is not configured to support the network security technique;
a second set of instructions, executable on the computer system, configured to include network security information with the packet, wherein the network security information is associated with the network security technique; and
computer readable media, wherein the computer program product is encoded in the computer readable media. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. An apparatus comprising:
a first network device configured to include network security information in overhead of a packet in the event of the packet being conveyed from the first network device to a second network device, wherein the first network device supports a first network protocol layer, and the second network device is incapable of processing the network security information. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50)
-
51. A method comprising:
-
identifying a first network device in a network, and communicating identification information to a second network device in the network, wherein the identification information is associated with the first network device, the first and second network devices are each capable of processing network security information, and a third network device within the network is incapable of processing the network security information. - View Dependent Claims (52, 53, 54, 55, 56)
-
Specification