×

Establishing secure TCP/IP communications using embedded IDs

  • US 7,660,980 B2
  • Filed: 03/23/2007
  • Issued: 02/09/2010
  • Est. Priority Date: 11/18/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for selectively requiring secure TCP/IP communications between a source node and a destination node within a computer network, the method comprising:

  • assigning a unique user identifier to each authorized user within the computer network;

    creating a plurality of policy rules defining when secure communications are required for TCP/IP communications within the computer network as a function of the authorized users initiating the TCP/IP communications;

    identifying the respective authorized user logged into the source node;

    retrieving the unique user identifier associated with the respective authorized user;

    upon initiation of a TCP/IP communication from the source node, intercepting by a first interceptor a TCP SYN packet of the TCP/IP communication prior to transmission of the TCP SYN packet to the destination node, wherein the packet includes a packet header;

    embedding the unique user identifier into the packet header;

    forwarding the TCP SYN packet with the embedded unique user identifier to the destination node;

    intercepting by a second interceptor the TCP SYN packet with the embedded unique user identifier prior to arrival of the packet at the destination node;

    determining whether secure communications are required for the respective authorized user logged into the source node by comparing the unique user identifier embedded in the TCP SYN packet header to the plurality of policy rules to identify a policy rule for the respective authorized user;

    if secure communications are required for the respective authorized user logged into the source node based on an identified policy rule, refusing passage of the TCP SYN packet to the destination node and returning an embed signal RST packet to the source node, the RST packet including a secure communications identifier to indicate that secure communications are required;

    intercepting by the first interceptor the RST packet and verifying the inclusion of the secure communications identifier; and

    thereafterrequiring secure communications for all subsequent packets associated with the TCP/IP communication in either direction between the source node and the destination node until the TCP/IP communication is completed.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×