QUARANTINING PACKETS RECEIVED AT DEVICE IN NETWORK COMMUNICATIONS UTILIZING VIRTUAL NETWORK CONNECTION
First Claim
1. A method of engaging in network communications by a device, comprising the steps of:
- (a) spawning a first virtual machine for a network connection that virtualizes network capabilities of a device;
(b) receiving a packet communicated from a transmitting device at the first virtual machine of the device;
(c) determining that the packet is corrupted, said determination being based on information from an application running on the device;
(d) in response to said step of determining that the packet is corrupted, quarantining the packet;
(e) spawning a second virtual machine for a network connection that virtualizes network capabilities of the device; and
(f) communicating, using the second virtual machine, a message to the transmitting device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of engaging in network communications by a device includes spawning a first virtual machine for a network connection that virtualizes network capabilities of a device; receiving a packet communicated from a transmitting device at the first virtual machine of the device; determining that the packet is corrupted, said determination being based on information from an application running on the device; in response to said step of determining that the packet is corrupted, quarantining the packet; spawning a second virtual machine for a network connection that virtualizes network capabilities of the device; and communicating, using the second virtual machine, a message to the transmitting device.
28 Citations
20 Claims
-
1. A method of engaging in network communications by a device, comprising the steps of:
-
(a) spawning a first virtual machine for a network connection that virtualizes network capabilities of a device; (b) receiving a packet communicated from a transmitting device at the first virtual machine of the device; (c) determining that the packet is corrupted, said determination being based on information from an application running on the device; (d) in response to said step of determining that the packet is corrupted, quarantining the packet; (e) spawning a second virtual machine for a network connection that virtualizes network capabilities of the device; and (f) communicating, using the second virtual machine, a message to the transmitting device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of responding to a corrupted packet comprising:
-
(a) receiving a packet communicated from a transmitting device via a first virtual network connection of the device; (b) determining that the packet is corrupted, said determination being based on information from an application running on the device; (c) in response to said step of determining that the packet is corrupted, quarantining the corrupted packet; and (d) communicating, using a second virtual network connection, a message to the transmitting device. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A device, the device comprising:
-
(a) a processor; (b) one or more network adapters providing network capabilities; (c) one or more computer readable media containing computer executable instructions configured to; (i) receive a packet communicated from a transmitting device via a first virtual network connection of the device; (ii) determine that the packet is corrupted, said determination being based on information from an application running on the device; (iii) in response to said step of determining that the packet is corrupted, quarantine the packet; and (iv) communicate, using a second virtual network connection, a message to the transmitting device.
-
Specification