Protocol translation
First Claim
Patent Images
1. A method, comprising:
- receiving data from a transmitting device at a security appliance, at least a portion of the received data previously encrypted according to a first encryption protocol;
decrypting the received data within the security appliance;
re-encrypting at least a portion of the decrypted data according to a second encryption protocol within the security appliance; and
transmitting the re-encrypted data to a receiving device.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of methods and/or systems for protocol translation are described.
129 Citations
31 Claims
-
1. A method, comprising:
-
receiving data from a transmitting device at a security appliance, at least a portion of the received data previously encrypted according to a first encryption protocol;
decrypting the received data within the security appliance;
re-encrypting at least a portion of the decrypted data according to a second encryption protocol within the security appliance; and
transmitting the re-encrypted data to a receiving device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article comprising:
- a storage medium having stored thereon instructions, that, if executed, result in performance of a method comprising;
receiving data from a transmitting device at a security appliance, at least a portion of the received data previously encrypted according to a first encryption protocol;
decrypting the received data within the security appliance;
re-encrypting at least a portion of the decrypted data according to a second encryption protocol within the security appliance; and
transmitting the re-encrypted data to a receiving device. - View Dependent Claims (10, 11)
- a storage medium having stored thereon instructions, that, if executed, result in performance of a method comprising;
-
12. An apparatus, comprising:
a security appliance adapted to;
receive data from a transmitting device at a security appliance, at least a portion of the received data previously encrypted according to a first encryption protocol, decrypt the received data within the security appliance, re-encrypt at least a portion of the decrypted data according to a second encryption protocol within the security appliance, and transmit the re-encrypted data to a receiving device.- View Dependent Claims (13, 14)
-
15. A system, comprising:
-
a transmitting device;
a receiving device; and
a security device coupled to the transmitting and receiving devices, the security appliance adapted to;
receive data from a transmitting device at a security appliance, at least a portion of the received data previously encrypted according to a first encryption protocol, decrypt the received data within the security appliance, re-encrypt at least a portion of the decrypted data according to a second encryption protocol within the security appliance, and transmit the re-encrypted data to a receiving device. - View Dependent Claims (16, 17)
-
-
18. A method, comprising:
-
receiving data from a transmitting device at a security appliance, the data transmitted according to a first data transfer protocol;
encrypting at least a portion of the received data within the security appliance if the received data is un-encrypted;
decrypting and then again encrypting the data if the received data is encrypted at least in part; and
transmitting the encrypted data to a receiving device according to a second data transfer protocol. - View Dependent Claims (19)
-
-
20. A method, comprising:
-
receiving data from a transmitting device at a security appliance, at least a portion of the data previously encrypted, the data transmitted according to a first data transfer protocol;
decrypting the encrypted portion of the received data; and
transmitting the decrypted data to a receiving device according to a second data transfer protocol. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A method, comprising:
-
receiving non-encrypted data from a transmitting device at a security appliance, the data transmitted according to a first data transfer protocol;
encrypting at least a portion of the received data within the security appliance; and
transmitting the encrypted data to a receiving device according to a second data transfer protocol. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification