×

Network communications security agent

  • US 7,917,745 B2
  • Filed: 11/17/2008
  • Issued: 03/29/2011
  • Est. Priority Date: 04/07/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer program product embodied on at least one non-transitory computer readable storage medium for use with at least one computer processor for implementing data security in a transfer of an event from a sending client to a receiving client located remotely therefrom across a network, the network further including a key server located remotely from each of the sending and receiving clients, the computer program product comprising:

  • (a) computer code for receiving, at each of the sending and receiving clients, keying information associated with the event from the key server, the keying information including a plurality of selector/security association pairs corresponding to different timewise intervals of the event;

    (b) computer code for populating, at the sending client, a first database of selector/security association pairs local to the sending client using said keying information received from the key server;

    (c) computer code for populating, at the receiving client, a second database of selector/security association pairs local to the receiving client using said keying information received from the key server;

    (d) computer code for receiving, at the sending client, first data from a network application program interface (API) of the sending client, the first data comprising a portion of the event to be sent from the sending client to the receiving client;

    (e) computer code for determining, at the sending client, whether the first data is eligible for a first security operation, wherein eligibility is determined by first selector data contained in the first data;

    (f) computer code for creating, at the sending client, a first selector based on the first selector data and using said first selector to search the first database for at least one selector/security association pair identifying a first security association corresponding to the first selector;

    (g) computer code for applying, at the sending client, the first security operation to the first data if the first data is eligible, wherein said computer code for applying the first security operation comprises computer code for using the first security association on the at least a portion of the first data;

    (h) computer code for sending, at the sending client, the first data to which the first security operation has been applied to a network protocol layer of the sending client for transfer over the network and reception by a network protocol layer of the receiving client;

    (i) computer code for receiving, at the receiving client, second data from the network protocol layer of the receiving client, the second data including the first data to which the first security operation has been applied;

    (j) computer code for determining, at the receiving client, whether said second data is eligible for a second security operation, wherein eligibility is determined by second selector data contained in the second data;

    (k) computer code for creating, at the receiving client, a second selector based on the second selector data and using said second selector to search the second database for at least one selector/security association pair identifying a second security association corresponding to the second selector;

    (l) computer code for applying, at the receiving client, the second security operation to the second data if the second data is eligible, wherein said computer code for applying the second security operation comprises computer code for using the second security association on the at least a portion of the second data; and

    (m) computer code for sending, at the receiving client, the second data to which the second security operation has been applied to a network API of the receiving client.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×