SECURITY LEVEL AND STATUS EXCHANGE BETWEEN TCP/UDP CLIENT(S) AND SERVER(S) FOR SECURE TRANSACTIONS
First Claim
1. A system, comprising:
- a processor; and
logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to cause the processor to;
inform a second peer about a security issue in one or more secure transmission control protocol/user datagram protocol (TCP/UDP) sessions using a first peer of the one or more TCP/UDP sessions; and
perform at least one action at the first peer in response to detecting the security issue, the at least one action resolving the security issue, avoiding the security issue, or resolving and avoiding the security issue,wherein the at least one action comprises informing, via a socket call or an extension of a socket call on the one or more TCP/UDP sessions, one or more applications operating on the second peer to limit information exchange based on a severity of the security issue.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a method includes informing a second peer about a security issue in one or more secure transmission control protocol/user datagram protocol (TCP/UDP) using a first peer of the one or more TCP/UDP sessions. The method also includes performing at least one action at the first peer in response to detecting the security issue. The at least one action resolves the security issue, avoids the security issue, or resolves and avoids the security issue. Also, the at least one action includes informing, via a socket call or an extension of a socket call on the one or more TCP/UDP sessions, one or more applications operating on the second peer to limit information exchange based on a severity of the security issue. Other systems, methods, and computer program products are described in accordance with more embodiments.
-
Citations
20 Claims
-
1. A system, comprising:
-
a processor; and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to cause the processor to; inform a second peer about a security issue in one or more secure transmission control protocol/user datagram protocol (TCP/UDP) sessions using a first peer of the one or more TCP/UDP sessions; and perform at least one action at the first peer in response to detecting the security issue, the at least one action resolving the security issue, avoiding the security issue, or resolving and avoiding the security issue, wherein the at least one action comprises informing, via a socket call or an extension of a socket call on the one or more TCP/UDP sessions, one or more applications operating on the second peer to limit information exchange based on a severity of the security issue. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
informing a second peer about a security issue in one or more secure transmission control protocol/user datagram protocol (TCP/UDP) sessions using a first peer of the one or more TCP/UDP sessions; and performing at least one action at the first peer in response to detecting the security issue, the at least one action resolving the security issue, avoiding the security issue, or resolving and avoiding the security issue, wherein the at least one action comprises informing, via a socket call or an extension of a socket call on the one or more TCP/UDP sessions, one or more applications operating on the second peer to limit information exchange based on a severity of the security issue. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, comprising a computer readable storage device having program code embodied therewith, the embodied program code being executable by a processor to cause the processor to:
-
inform, by the processor, a second peer about a security issue in one or more secure transmission control protocol/user datagram protocol (TCP/UDP) sessions using a first peer of the one or more TCP/UDP sessions; and perform, by the processor, at least one action at the first peer in response to detecting the security issue, the at least one action resolving the security issue, avoiding the security issue, or resolving and avoiding the security issue, wherein the at least one action comprises informing, via a socket call or an extension of a socket call on the one or more TCP/UDP sessions, one or more applications operating on the second peer to limit information exchange based on a severity of the security issue. - View Dependent Claims (18, 19, 20)
-
Specification