System and method for routing and processing data packets
First Claim
1. A method for transmitting secured data packets over a network comprising the following steps:
- (a) receiving a data packet having a source address from a point external to the network;
(b) determining whether the data packet is a zero packet, and if so;
(i) determining the binary sequence of a predesignated bit set in the source address of the packet;
(ii) forwarding the packet to a processor whose number corresponds with the sequence of the bit set;
(iii) using a security table to generate an IT entry in an IT table for directing the processing of data packets;
(iv) transmitting the IT entry to a plurality of processors for inclusion in said IT table;
(v) processing the packet in accordance with the entry in the IT table that corresponds to the source address, destination address and point number of the packet;
(c) determining whether the packet is the last packet of the message, and if so;
(i) deleting the IT entry for the message from the IT table; and
(ii) forwarding the packet for further processing.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a system for processing data packets between an internal environment to the system and external environment to the system comprising a plurality of processors within the internal system, each processor processing data packets based upon a criteria of the packet, first cable means for connecting the plurality of processors and for transmitting data packets between said plurality of processors, second cable means for transmitting the data packets between the plurality of processors and to the external environment, and third cable means for transmitting data between the plurality of processors and the internal environment.
88 Citations
14 Claims
-
1. A method for transmitting secured data packets over a network comprising the following steps:
-
(a) receiving a data packet having a source address from a point external to the network;
(b) determining whether the data packet is a zero packet, and if so;
(i) determining the binary sequence of a predesignated bit set in the source address of the packet;
(ii) forwarding the packet to a processor whose number corresponds with the sequence of the bit set;
(iii) using a security table to generate an IT entry in an IT table for directing the processing of data packets;
(iv) transmitting the IT entry to a plurality of processors for inclusion in said IT table;
(v) processing the packet in accordance with the entry in the IT table that corresponds to the source address, destination address and point number of the packet;
(c) determining whether the packet is the last packet of the message, and if so;
(i) deleting the IT entry for the message from the IT table; and
(ii) forwarding the packet for further processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
determining the last several bits of the packet number;
forwarding the packet for processing to the processor whose number corresponds with the bit set of the packet number;
completing steps (b)(iv) and (b)(v).
-
-
3. The method of claim 1, further comprising the step of checking the source or destination address of a packet and determining whether the source or destination is permissible.
-
4. The method of claim 1, further comprising the step of examining the contents of a packet and determining whether the packet may be transmitted.
-
5. The method of claim 1, further comprising the step of determining the processor which should process the data based upon a plurality of criteria.
-
6. The method of claim 1, comprising the additional step of converting in-coming data from an IPv6 format to an IPv4 format.
-
7. The method of claim 1, comprising the additional step of jamming impermissible transmissions.
-
8. The method of claim 7, wherein said jamming is accomplished utilizing a network interface card.
-
9. A method for transmitting secured data packets over a network comprising the following steps:
-
(a) receiving a data packet from a point external to the network;
(b) determining whether the data packet is a zero packet, and if so;
(i) determining the binary sequence of the third and fourth bits of the source address of the packet;
(ii) forwarding the packet to a processor whose number corresponds with the sequence of the third and fourth bits;
(iii) using a security table to generate an IT entry in an IT table for directing the processing of data packets;
(iv) transmitting the IT entry to a plurality of processors for inclusion in said IT table;
(v) processing the packet in accordance with the entry in the IT table that corresponds to the source address, destination address and point number of the packet. (c) determining whether the packet is the last packet of the message, and if so;
(i) deleting the IT entry for the message from the IT table; and
(ii) forwarding the packet for further processing.
-
-
10. A system for processing data packets between a first external environment to the system and a second external environment to the system comprising:
-
a plurality of processors external to an internal environment, each processor processing data packets based upon an initial criteria of the packet;
first logical cable means for connecting the plurality of processors and for transmitting data packets between said plurality of processors based upon said initial criteria;
second logical cable means for transmitting the data packets between the plurality of processors and the first and second external environments; and
third logical cable means for transmitting data between the plurality of processors and the first and second external environments, wherein a second set of plurality of processors communicates over a logical status and load information cable. - View Dependent Claims (11, 12, 13, 14)
-
Specification