×

Security chip architecture and implementations for cryptography acceleration

  • US 6,971,006 B2
  • Filed: 08/23/2002
  • Issued: 11/29/2005
  • Est. Priority Date: 07/08/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for cryptography processing of data packets, the method comprising:

  • identifying a first fixed-sized cell at a cryptography accelerator, the first fixed-sized cell comprising one of a plurality of fixed-sized cells derived from a first packet;

    maintaining first context information corresponding to the first fixed-sized cell, the first context information identifying a first key and a first algorithm for cryptographically processing the first fixed-sized cell;

    identifying a second fixed-sized cell at a cryptography accelerator, the second fixed-sized cell comprising one of a plurality of fixed-sized cells derived from a second packet; and

    maintaining second context information associated with the second fixed-sized cell, the second context information identifying a second key and a second algorithm for cryptographically processing the second fixed-sized cell.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×