Security protocols on incompatible transports
First Claim
1. A method for communicating between a first and a second machine using the User Datagram Protocol (UDP), comprising:
- providing a reliability delivery layer (RDL) interface to the UDP;
establishing a UDP connection between the first and the second machine; and
establishing a transport layer security over the RDL interface to the UDP, wherein the transport layer security is incompatible with the UDP.
1 Assignment
0 Petitions
Accused Products
Abstract
“Honest” is a nice word. Sadly, some people in this world are not honest. In an increasingly wired world, dishonest people have found myriad opportunities to illicitly acquire one'"'"'s confidential data, to monitor or interfere with one'"'"'s networking activities, e.g., to monitor what you are doing, downloading, accessing, etc., to eavesdrop on or hijack telephony control and voice data or other protocols on your network, etc. To address such risks, typically a secured communication protocol, e.g., TLS or SSL, is utilized to protect communication. Unfortunately, TLS, SSL, and many other security environments require the underlying communication protocol to be TCP/IP, while some protocols needing communication protection, such as VoIP, RTP, SNMP, etc. only operate on UDP and not TCP/IP. Thus, a network shim or other embodiments disclosed herein may be used to allow such UDP based application programs and protocols to use security environments requiring a TCP/IP type transport.
40 Citations
22 Claims
-
1. A method for communicating between a first and a second machine using the User Datagram Protocol (UDP), comprising:
-
providing a reliability delivery layer (RDL) interface to the UDP;
establishing a UDP connection between the first and the second machine; and
establishing a transport layer security over the RDL interface to the UDP, wherein the transport layer security is incompatible with the UDP. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for utilizing a transport layer security compatible with a reliable transport over an incompatible unreliable transport, the method comprising:
-
providing a reliability delivery layer (RDL) interface to the unreliable transport, the RDL adding selected ones of data corruption detection and data loss detection to the unreliable transport and masking incompatibility of the unreliable transport;
establishing a communication session using the unreliable transport; and
establishing a secure communication session using the transport layer security over the RDL interface. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for utilizing a transport layer security over an incompatible unreliable transport, comprising:
-
modifying a network application program to substitute selected networking calls in the network application program to the unreliable transport with networking calls to the transport layer security;
installing a reliability delivery layer (RDL) in a network stack above the unreliable transport to masquerade the unreliable transport as a reliable transport compatible with the transport layer security; and
configuring the transport layer security to utilize the RDL. - View Dependent Claims (14, 15)
-
-
16. An article comprising a machine-accessible medium having one or more associated instructions for communicating between a first and a second machine using the User Datagram Protocol (UDP), wherein the one or more instructions, if executed, results in a machine performing:
-
providing a reliability delivery layer (RDL) interface to the UDP;
establishing a UDP connection between the first and the second machine; and
establishing a transport layer security over the RDL interface to the UDP, wherein the transport layer security is incompatible with the UDP. - View Dependent Claims (17, 18)
-
-
19. An article comprising a machine-accessible medium having one or more associated instructions for utilizing a transport layer security compatible with a reliable transport over an incompatible unreliable transport, wherein the one or more instructions, if executed, results in a machine performing:
-
providing a reliability delivery layer (RDL) interface to the unreliable transport, the RDL adding selected ones of data corruption detection and data loss detection to the unreliable transport and masking incompatibility of the unreliable transport;
establishing a communication session using the unreliable transport; and
establishing a secure communication session using the transport layer security over the RDL interface. - View Dependent Claims (20)
-
-
21. An article comprising a machine-accessible medium having one or more associated instructions for utilizing a transport layer security over an incompatible unreliable transport, wherein the one or more instructions, if executed, results in a machine performing:
-
modifying a network application program to substitute selected networking calls in the network application program to the unreliable transport with networking calls to the transport layer security;
installing a reliability delivery layer (RDL) in a network stack above the unreliable transport to masquerade the unreliable transport as a reliable transport compatible with the transport layer security; and
configuring the transport layer security to utilize the RDL. - View Dependent Claims (22)
-
Specification