Process for prioritized end-to-end secure data protection
First Claim
9. A process for prioritizing messages from a first computer system having at least one computer connected to a first edge router to be sent to a second computer system having at least one second computer connected to a second edge router, and the above two edge routers are connected via at least one core router includes the steps of:
- the source computer builds and sends IP packet to the first inner side of the edge router;
the edge router providing and encrypted priority status message to the core router;
decrypting the priority status of the message at the core router;
de-encrypting the priority status message at the core router; and
sending the message based on its priority status to other core or edge router if no more core router exist.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is a process for prioritizing messages from a first computer system having at least one computer connected to a first edge router to be sent to a second computer system having at least one computer connected to a second edge router, the process includes the steps of: 1) providing priority status from the at least one first computer to the at the first edge router; 2) determining the priority status of the message by the first edge router; 3) prioritizing the sending of the message by the first edge router; 4) encrypting the priority status prior to sending the message to the at least one second computer a the selected priority status; and 5) upon receiving the encrypted message, the second edge router decrypts the priority status of the message and sends it to the at least one second computer at the selected priority status.
78 Citations
22 Claims
-
9. A process for prioritizing messages from a first computer system having at least one computer connected to a first edge router to be sent to a second computer system having at least one second computer connected to a second edge router, and the above two edge routers are connected via at least one core router includes the steps of:
-
the source computer builds and sends IP packet to the first inner side of the edge router; the edge router providing and encrypted priority status message to the core router; decrypting the priority status of the message at the core router; de-encrypting the priority status message at the core router; and sending the message based on its priority status to other core or edge router if no more core router exist. - View Dependent Claims (10, 11)
-
-
13. The process as set forth in claim 12 wherein QoS is applied by the process consisting of the application layer for message queuing;
- in the network layer for IP packet queuing;
or in the link layer for Ethernet frame queuing. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 14, 15, 16, 17, 18, 19, 20, 21, 22)
- in the network layer for IP packet queuing;
-
14-1. The process as set forth in claim 13 wherein
internet traffic priority delivery value is carried by encrypted traffic class or the ToS or the DSCP; -
the flow label field is used for specifying special router handling from source to destination) for a sequence of packets; the source address field is used to contain source address of the sending node; the destination address field is used to contain address of the destination node.
-
Specification