SECURED COMMUNICATIONS ARRANGEMENT APPLYING INTERNET PROTOCOL SECURITY
First Claim
1. An endpoint comprising a computing system, the computing system including:
- a user level services component;
a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint;
a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel; and
a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.
5 Assignments
0 Petitions
Accused Products
Abstract
A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.
-
Citations
20 Claims
-
1. An endpoint comprising a computing system, the computing system including:
-
a user level services component; a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint; a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel; and a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A secure communications arrangement comprising:
an endpoint comprising a computing system, the computing system including; a user level services component; a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint; a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel; and a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
20. A secure communications arrangement comprising:
-
a first endpoint comprising a computing system, the computing system including; a user level services component; a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a second endpoint; a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel; a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec; a second endpoint comprising a second computing system, the second computing system including; a second user level services component; a second kernel level callout driver interfaced to the second user level services component and configured to establish an IPsec tunnel with the first endpoint; a second filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel; a second kernel level driver configured to establish a second secure tunnel using a second security protocol different from IPsec; a security appliance communicatively connected to the first endpoint via the secure tunnel and to the second endpoint via the second secure tunnel; and an administration server communicatively connected to the first and second endpoints and configured to provide community of interest keys to the first and second endpoints.
-
Specification