×

Method and apparatus for conveying a security context in addressing information

  • US 7,254,835 B2
  • Filed: 01/04/2002
  • Issued: 08/07/2007
  • Est. Priority Date: 01/04/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for conveying a security context, comprising:

  • obtaining a virtual address associated with a process executing on a recipient computer system;

    issuing a first Internet Protocol version compliant packet, comprising;

    invoking a Supernet Attach Command on an authentication server daemon;

    receiving, in response to the Supernet Attach Command, Supernet configuration information comprising the security context; and

    registering a mapping of the Supernet configuration information with a virtual address daemon,wherein the first Internet Protocol version compliant packet comprises a first Internet Protocol version compliant header,wherein the first Internet Protocol version compliant header comprises the security context,wherein the security context comprises a Supernet identifier, a Channel identifier, and the virtual address, andwherein data in a payload of the first Internet Protocol version compliant packet is encrypted using the Supernet identifier and the Channel identifier to obtain an encrypted payload;

    issuing a second Internet Protocol version compliant packet, wherein the second Internet Protocol version compliant packet comprises a second Internet Protocol version compliant header,wherein the second Internet Protocol version compliant header comprises a second Internet Protocol version compliant address of the recipient computer system,wherein a payload of the second Internet Protocol version compliant packet comprises the first Internet Protocol version compliant packet, andwherein the first Internet Protocol version is different from the second Internet Protocol version; and

    forwarding the second Internet Protocol version compliant packet to the recipient computer system,wherein the security context is used by the recipient computer to decrypt the encrypted payload.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×