System and method for performing security operations on network data
First Claim
1. A system, the system comprising:
- memory;
a data coprocessor configured to transfer data into and out of the memory for independent instruction streams;
a plurality of processors coupled to the memory and to the data coprocessor, each processor being configured to perform, in parallel to one another, security operations on a portion of the data for the independent instruction streams, wherein the security operations comprise execution of at least one security protocol; and
a plurality of security coprocessors coupled to the memory, each security coprocessor being coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data, wherein assistance for the respective processor comprises execution of at least one algorithm of the at least one security protocol, and each security coprocessor being configured to maintain separate queues for each of the independent instruction streams.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are described for performing security operations on network data. According to an exemplary embodiment, a system for performing security operations on network data includes memory and a data coprocessor configured to transfer data into and out of the memory. A plurality of processors are coupled to the memory and to the data coprocessor. Each processor is configured to perform, in parallel to one another, security operations on a portion of the data. The system includes a plurality of security coprocessors coupled to the memory. Each security coprocessor is coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data.
38 Citations
29 Claims
-
1. A system, the system comprising:
-
memory; a data coprocessor configured to transfer data into and out of the memory for independent instruction streams; a plurality of processors coupled to the memory and to the data coprocessor, each processor being configured to perform, in parallel to one another, security operations on a portion of the data for the independent instruction streams, wherein the security operations comprise execution of at least one security protocol; and a plurality of security coprocessors coupled to the memory, each security coprocessor being coupled to a respective one of the processors and configured to assist the respective processor in performing security operations on the portion of the data, wherein assistance for the respective processor comprises execution of at least one algorithm of the at least one security protocol, and each security coprocessor being configured to maintain separate queues for each of the independent instruction streams. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, the method comprising:
-
transferring data into memory for more than one independent instruction streams; performing security operations on respective portions of the data in parallel using a plurality of processors, wherein the performing comprises executing at least one security protocol; using a plurality of security coprocessors to assist in performing the security operations on the respective portions of the data, each security coprocessor being coupled to a respective one of the processors, wherein the using comprises tasking the security coprocessors with execution of at least one algorithm of the at least one security protocol and maintaining separate queues for each of the more than one independent instruction streams within at least one of the plurality of security coprocessors; and transferring the operated-on portions of the data out of the memory. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer readable medium containing a computer program, wherein the computer program comprises executable instructions for:
-
transferring data into memory for more than one independent instruction streams; performing security operations on respective portions of the data in parallel using a plurality of processors, wherein the performing comprises executing at least one security protocol; using a plurality of security coprocessors to assist in performing the security operations on the respective portions of the data, each security coprocessor being coupled to a respective one of the processors, wherein the using comprises tasking the security coprocessors with execution of at least one algorithm of the at least one security protocol and maintaining separate queues for each of the more than one independent instruction streams within at least one of the plurality of security coprocessors; and transferring the operated-on portions of the data out of the memory. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification