×

Network Communications Security Agent

  • US 20070294525A1
  • Filed: 08/28/2007
  • Published: 12/20/2007
  • Est. Priority Date: 04/07/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method for implementing data security in a transfer of an event from a sending client to a receiving client located remotely therefrom across a network, the network further including a key server located remotely from each of the sending and receiving clients, the method comprising:

  • (a) at each of the sending and receiving clients, receiving keying information associated with the event from the key server, the keying information including a plurality of selector/security association pairs corresponding to different timewise intervals of the event;

    (b) at the sending client, populating a first database of selector/security association pairs local to the sending client using said keying information received from the key server;

    (c) at the receiving client, populating a second database of selector/security association pairs local to the receiving client using said keying information received from the key server;

    (d) at the sending client, receiving first data from a network application program interface (API) of the sending client, the first data comprising a portion of the event to be sent from the sending client to the receiving client;

    (e) at the sending client, determining if the first data is eligible for a first security operation, wherein eligibility is determined by first selector data contained in the first data;

    (f) at the sending client, creating a first selector based on the first selector data and using said first selector to search the first database for at least one selector/security association pair identifying a first security association corresponding to the first selector;

    (g) at the sending client, applying the first security operation to the first data if the first data is eligible, wherein applying the first security operation comprises using the first security association on the at least a portion of the first data; and

    (h) at the sending client, sending the first data to which the first security operation has been applied to a network protocol layer of the sending client for transfer over the network and reception by a network protocol layer of the receiving client;

    (i) at the receiving client, receiving second data from the network protocol layer of the receiving client, the second data including the first data to which the first security operation has been applied;

    (j) at the receiving client, determining if said second data is eligible for a second security operation, wherein eligibility is determined by second selector data contained in the second data;

    (k) at the receiving client, creating a second selector based on the second selector data and using said second selector to search the second database for at least one selector/security association pair identifying a second security association corresponding to the second selector;

    (l) at the receiving client, applying the second security operation to the second data if the second data is eligible, wherein applying the second security operation comprises using the second security association on the at least a portion of the second data; and

    (m) at the receiving client, sending the second data to which the second security operation has been applied to a network API of the receiving client.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×