Authenticity of communications traffic
First Claim
Patent Images
1. A method capable of storing information in a packet, comprising:
- performing a data integrity operation over one selectable portion of the packet to calculate an integrity check value using a secret key, wherein the one selectable portion of the packet includes a Virtual Local Area Network (VLAN) field, an Internet Protocol (IP) field, and a Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field; and
performing a data transformation operation over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet, wherein the another selectable portion of the packet is a data field;
wherein the data transformation operation comprises a reversible operation.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a techniques for storing information in a packet. A data integrity operation is performed over one portion of the packet to calculate an integrity check value using a secret key. The data transformation operation is performed over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet.
Other embodiments are described and claimed.
-
Citations
26 Claims
-
1. A method capable of storing information in a packet, comprising:
-
performing a data integrity operation over one selectable portion of the packet to calculate an integrity check value using a secret key, wherein the one selectable portion of the packet includes a Virtual Local Area Network (VLAN) field, an Internet Protocol (IP) field, and a Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field; and performing a data transformation operation over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet, wherein the another selectable portion of the packet is a data field; wherein the data transformation operation comprises a reversible operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
- a packet to be transmitted over a communication path;
a network adapter that is coupled to the communication path; and
an authenticity system coupled to the network adapter;
wherein the authenticity system performs a data integrity operation over one selectable portion of the packet to calculate an integrity check value using a secret key, wherein the one selectable portion of the packet includes a Virtual Local Area Network (VLAN) field, an Internet Protocol (IP) field, and a Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field; andwherein the authenticity system performs a data transformation operation over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet, wherein the another selectable portion of the packet is a data field; wherein the data transformation operation comprises a reversible operation. - View Dependent Claims (11, 12, 13, 14)
- a packet to be transmitted over a communication path;
-
15. A method capable of retrieving information from a packet, further comprising:
-
receiving a packet, including, a Virtual Local Area Network (VLAN) field, an Internet Protocol (IP) field, a Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field, and a data field; performing a data integrity operation over one portion of the packet to calculate an integrity check value using a secret key, wherein the one portion of the packet includes the Virtual Local Area Network (VLAN) field, the Internet Protocol (IP) field, and the Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field; storing the integrity check value in the data field by performing a data transformation operation over the data field without increasing a size of the packet; and performing a data transformation operation over another portion of the packet to retrieve data from the packet using the calculated integrity check value, wherein the other portion of the packet is the data field; wherein the data transformation operation comprises a reverse data transformation operation relative to another data transformation operation performed on the packet prior to the packet being received. - View Dependent Claims (16, 17)
-
-
18. An article of manufacture for storing information in a packet, wherein the article of manufacture comprises a computer readable medium storing instructions, and wherein the article of manufacture is operable to:
-
perform a data integrity operation over one selectable portion of the packet to calculate an integrity check value using a secret key, wherein the one selectable portion of the packet includes a Virtual Local Area Network (VLAN) field, an Internet Protocol (IP) field, and a Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) field; and perform a data transformation operation over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet, wherein the another selectable portion of the packet is a data field; wherein the data transformation operation comprises a reversible operation. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
Specification