Method for universal transport encapsulation for Internet Protocol network communications
First Claim
1. A method of transmitting a data payload packet in a communications network comprising:
- identifying a first packet protocol of said payload packet;
determining a first mapping function from said first packet protocol, said determining further comprising determining a security key; and
mapping said payload packet to a transport packet using said first mapping function, said mapping further comprising embedding said security key in said transport packet.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for implementing a simple protocol, referred to as the universal transport interface (UTI), that can be used to create high speed Internet Protocol (IP) tunnels for transmitting a variety of different payloads across a network. Payload packets may comprise any currently known packet protocol, including but not limited to time division multiplex data, IP packets, asynchronous transfer mode (ATM) cells, Packet-over-SONET/SDH (POS) packets, and Frame Relay frames. The universal transport interface protocol consists of a predefined set of mappings whereby any known protocol can be packaged into a single, conceptually simple packet format. This format is referred to as the universal transport encapsulation (UTE) format. UTE format packets are, by design, amenable to transport over an IP network without further modification beyond standard IP encapsulation. The disclosed method further implements a security key system to prevent unauthorized use or interception of UTE packets on the network.
-
Citations
44 Claims
-
1. A method of transmitting a data payload packet in a communications network comprising:
-
identifying a first packet protocol of said payload packet;
determining a first mapping function from said first packet protocol, said determining further comprising determining a security key; and
mapping said payload packet to a transport packet using said first mapping function, said mapping further comprising embedding said security key in said transport packet. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of receiving a data payload packet in a communications network comprising:
-
determining a second mapping function from a transport packet, wherein said second mapping function is an inverse of a first mapping function; and
mapping said transport packet to said data payload packet using said second mapping function, said mapping said transport packet further comprising verifying a security key. - View Dependent Claims (9, 10, 11)
-
-
12. A computer system for transmitting a data payload in a communications network, comprising computer instructions for:
-
identifying a first packet protocol of said payload packet;
determining a first mapping function from said first packet protocol, said determining further comprising determining a security key; and
mapping said payload packet to a transport packet using said first mapping function, said mapping further comprising embedding said security key in said transport packet. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer system for transmitting a data payload in a communications network, comprising computer instructions for:
-
determining a second mapping function from a transport packet, wherein said second mapping function is an inverse of a first mapping function; and
mapping said transport packet to said data payload packet using said second mapping function, said mapping said transport packet further comprising verifying a security key. - View Dependent Claims (20, 21, 22)
-
-
23. A computer readable storage medium, comprising computer instructions for:
-
identifying a first packet protocol of said payload packet;
determining a first mapping function from said first packet protocol, said determining further comprising determining a security key; and
mapping said payload packet to a transport packet using said first mapping function, said mapping further comprising embedding said security key in said transport packet. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A computer readable storage medium, comprising computer instructions for:
-
determining a second mapping function from a transport packet, wherein said second mapping function is an inverse of a first mapping function; and
mapping said transport packet to said data payload packet using said second mapping function, said mapping said transport packet further comprising verifying a security key. - View Dependent Claims (31, 32, 33)
-
-
34. A computer data signal embodied in a carrier wave, comprising computer instructions for:
-
identifying a first packet protocol of a payload packet;
determining a first mapping function from said first packet protocol, said determining further comprising determining a security key; and
mapping said payload packet to a transport packet using said first mapping function, said mapping further comprising embedding said security key in said transport packet. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A computer data signal embodied in a carrier wave, comprising computer instructions for:
-
determining a second mapping function from a transport packet, wherein said second mapping function is an inverse of a first mapping function; and
mapping said transport packet to said data payload packet using said second mapping function, said mapping said transport packet further comprising verifying a security key. - View Dependent Claims (42, 43, 44)
-
Specification