METHOD AND APPARATUS FOR REDUCED REDUNDANT SECURITY SCREENING
First Claim
Patent Images
1. A computer implemented method for screening data packets, the computer implemented method comprising:
- responsive to receiving a data packet, determining whether a signature of a trusted security element is present in a header of the data packet, wherein the signature indicates that a previous security action has been performed on the data packet; and
responsive to the signature of the trusted security element being present, performing a security action on the data packet based on the previous security action performed on the data packet.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented method, apparatus, and computer usable program code for screening data packets. A determination is made as to whether a signature of a trusted security element is present in a header of the data packet in response to receiving a data packet. The signature indicates that a previous security action has been performed on the data packet. A security action is performed on the data packet based on the previous security action performed on the data packet in response to the signature of the trusted security element being present.
-
Citations
34 Claims
-
1. A computer implemented method for screening data packets, the computer implemented method comprising:
-
responsive to receiving a data packet, determining whether a signature of a trusted security element is present in a header of the data packet, wherein the signature indicates that a previous security action has been performed on the data packet; and responsive to the signature of the trusted security element being present, performing a security action on the data packet based on the previous security action performed on the data packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising:
-
a computer usable medium having computer usable program code for screening data packets, the computer program medium comprising; computer usable program code, responsive to receiving a data packet, for determining whether a signature of a trusted security element is present in a header of the data packet, wherein the signature indicates that a previous security action has been performed on the data packet; and computer usable program code, responsive to the signature of the trusted security element being present, for performing a security action on the data packet based on the previous security action performed on the data packet. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing system comprising:
-
a bus; a communications unit connected to the bus; a storage device connected to the bus, wherein the storage device includes computer usable program code; and a processor unit connected to the bus, wherein the processor unit executes the computer usable program code to determine whether a signature of a trusted security element is present in a header of the data packet in response to receiving a data packet, wherein the signature indicates that a previous security action has been performed on the data packet; and
perform a security action on the data packet based on the previous security action performed on the data packet in response to the signature of the trusted security element being present. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A data processing system for screening data packets, the data processing system comprising:
-
determining means, responsive to receiving a data packet, for determining whether a signature of a trusted security element is present in a header of the data packet, wherein the signature indicates that a previous security action has been performed on the data packet; and performing means, responsive to the signature of the trusted security element being present, for performing a security action on the data packet based on the previous security action performed on the data packet. - View Dependent Claims (30, 31)
-
-
32. A network data processing system comprising:
-
a network; a set of data processing systems connected to the network; and a set of trusted security devices connected to the network, wherein data packets are sent through the network, a digital signature is added to a data packet in the data packets each time a trusted security device in the set of trusted security devices performs a security action on the data packet in which multiple digital signatures may be present, a determination is made by a data processing system in the set of data processing systems as to whether an additional security action is needed by looking for t presence of the digital signature in a received data packet. - View Dependent Claims (33, 34)
-
Specification