×

Validating network communications

  • US 9,130,937 B1
  • Filed: 03/07/2011
  • Issued: 09/08/2015
  • Est. Priority Date: 03/07/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving a message at a first network interface of a first node, the first node comprising;

    a first network interface for communicating with a first network, the first network comprising a first security level, the first security level being a governmental security level defined in accordance with a governmental agency certification process; and

    a second network interface for communicating with a second network, the second network comprising a second security level different than the first security level, wherein an enclave associated with the first security level is implemented using a protocol for secret or classified information and an enclave associated with the second security level is implemented using a protocol for non-classified information;

    determining a set of expected tokens in response to analyzing the message at the first node;

    determining an expected order of tokens in response to analyzing the message at the first node;

    accessing a plurality of tokens generated prior to the first node receiving the message, each of the plurality of tokens indicating that a respective policy service of a plurality of policy services has been performed on the message, wherein a respective token of the plurality of tokens indicates a result of applying the respective policy service to the message, and wherein each token of the expected set of tokens is associated with the respective policy service of the plurality of policy services;

    generating a plurality of decrypted tokens from the plurality of tokens using a first parameter associated with the plurality of policy services;

    validating the decrypted tokens by comparing the decrypted tokens to the set of expected tokens and verifying that the policy services associated with the expected set of tokens have been applied to the message;

    determining whether the decrypted tokens are in the expected order, wherein the expected order includes an order in which the plurality of policy services were to be applied to the message;

    generating an approval in response to validating the decrypted tokens and determining that the decrypted tokens are in the expected order; and

    sending the message through the second network interface to the second network, the message comprising the approval.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×