ULTRA-LOW POWER SINGLE-CHIP FIREWALL SECURITY DEVICE, SYSTEM AND METHOD
First Claim
1. A firewall security device, comprising:
- a processor; and
an operating system (OS) embedded in the processor, the operating system being a state machine and comprising a protocol stack for communicating with one or more devices via a network interface, wherein the OS blocks unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies.
1 Assignment
0 Petitions
Accused Products
Abstract
A firewall security device, system and corresponding method are provided that includes an operating system of an entirely new architecture. The operating system is based fundamentally around a protocol stack (e.g., TCP/IP stack), rather than including a transport/network layer in a conventional core operating system. The firewall security device may include a processor and an operating system (OS) embedded in the processor. The OS may include a kernel. The operating system kernel is a state machine and may include a protocol stack for communicating with one or more devices via a network interface. The OS may be configured to receive and transmit data packets and block unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies.
72 Citations
22 Claims
-
1. A firewall security device, comprising:
-
a processor; and an operating system (OS) embedded in the processor, the operating system being a state machine and comprising a protocol stack for communicating with one or more devices via a network interface, wherein the OS blocks unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving a data packet, within a protocol stack-based operating system (OS) embedded and executing within a processor, the OS being a state machine that processes the data packet according to a network protocol; processing the received data packet within one or more layers of the protocol stack to determine whether the data packet is authorized based on predetermined firewall policies, wherein unauthorized data packets are blocked while authorized data packets are transmitted; and idling the state machine using intelligent tasking. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium having embodied instructions thereon, the instructions executable by a processor to:
-
receive a data packet, within a protocol stack-based operating system (OS) embedded and executing within a processor, the OS being a state machine that processes the data packet according to a network protocol; process the received data packet within one or more layers of the protocol stack to determine whether the data packet is authorized based on predetermined firewall policies, wherein unauthorized data packets are blocked while authorized data packets are transmitted; and idling the state machine using intelligent tasking.
-
-
18. A system for routing data packets across communication networks, comprising:
-
a plurality of communication ports; a switch, the switch being configured to transmit multiple data packets between the plurality of communication ports; and at least one firewall security device, the firewall security device comprising a processor and an operating system (OS) embedded in the processor, the operating system being a state machine having a protocol stack for communicating with one or more devices via a network interface, wherein the OS blocks unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies. - View Dependent Claims (19, 20, 21)
-
-
22. An operating system embedded within a processor, the operating system consisting of:
- a state machine that comprises a protocol stack for communicating with one or more devices via a network interface, blocking unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies, and allowing authorized data packets.
Specification