Adaptive data security systems and methods
First Claim
1. A method for applying adaptive security to a data stream, comprising the steps of:
- identifying a desired security level range and a desired actual security level which falls within the desired security level range for communicating a data stream from a send host to a receive host;
determining an actual security level in the receive host based upon the availability of a number of security processor operations;
communicating the actual security level from the receive host to the send host;
generating a plurality of data packets associated with the data stream in the send host, the data packets having an authentication header including the desired security level range and the actual security level;
reallocating computing resources at the receive host if data packets cannot be verified at the desired actual security level with a current allocation of resources; and
verifying the data packets at the actual security level, the actual security level being within the desired security level range.
0 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to a method for communicating and applying adaptive security to a data stream comprising a plurality of data packets. The method comprises the steps of identifying a desired security level range and a desired actual security level which falls within the desired security level range. The availability of a number of security processor operations at the host is determined so that, if needed, computing resources at the host can be reallocated to ensure that the data stream can be verified at the desired actual security level. If there are not sufficient resources available for reallocation at the host, communication resources can be reallocated, for example by changing the bandwidth of the data stream or another incoming data stream. With this method, the actual security level will be kept within the desired security level range.
89 Citations
31 Claims
-
1. A method for applying adaptive security to a data stream, comprising the steps of:
-
identifying a desired security level range and a desired actual security level which falls within the desired security level range for communicating a data stream from a send host to a receive host;
determining an actual security level in the receive host based upon the availability of a number of security processor operations;
communicating the actual security level from the receive host to the send host;
generating a plurality of data packets associated with the data stream in the send host, the data packets having an authentication header including the desired security level range and the actual security level;
reallocating computing resources at the receive host if data packets cannot be verified at the desired actual security level with a current allocation of resources; and
verifying the data packets at the actual security level, the actual security level being within the desired security level range. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for communicating and applying adaptive security to a data stream comprising a plurality of data packets, comprising the steps of:
-
identifying a desired security level range and a desired actual security level which falls within the desired security level range for the data stream to be received by a host;
determining the availability of a number of security processor operations at the host;
reallocating computing resources at the host if the data stream cannot be verified at the desired actual security level;
reallocating communication resources if there are insufficient computing resources available for reallocation at the host; and
verifying the data packets at the actual security level, the actual security level being within the desired security level range. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system for facilitating data communication to a host with adaptive security, comprising:
-
means for determining whether a desired actual security level for a transmitted data stream falls within a desired security level range;
means for determining the availability of a number of security processor operations at the host;
means for reallocating computing resources at the host if the data stream cannot be verified at the desired actual security level; and
means for reallocating communication resources if there are insufficient computing resources available for reallocation at the host. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A computer program embodied on a computer-readable medium for facilitating data communication to a host with adaptive security, comprising:
-
logic configured to determine whether a desired actual security level for a transmitted data stream falls within a desired security level range;
logic configured to determine the availability of a number of security processor operations at the host;
logic configured to reallocate computing resources at the host if the data stream cannot be verified at the desired actual security level; and
logic configured to reallocate communication resources if there are insufficient computing resources available for reallocation at the host. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
Specification