IPv6 to IPv4 data packet migration in a trusted security zone
First Claim
Patent Images
1. A method for secure migration of IPv6 protocol packets, comprising:
- receiving, by a communication channel stored in a trusted security zone, a request from a first application to engage in an exchange of communication with a second application, wherein the first application is associated with an IPv6 protocol and the second application is associated with an IPv4 protocol;
determining, by the communication channel, whether the second application has a security feature activated;
in response to a determination that the second application does not have the security feature activated, determining, by the communication channel, whether the second application is a trusted application or resides in a secure environment; and
in response to a determination that the second application is at least one of a trusted application or resides in a secure environment, migrating, by the communication channel, packet communication to the second application.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods discussed herein relate to enabling communications between IPv4 and IPv6 hosts using a communication channel in a trusted security zone associated with a first host to determine the IP-versions and/or other security features that may be present or enabled on the first host or the second host.
-
Citations
20 Claims
-
1. A method for secure migration of IPv6 protocol packets, comprising:
-
receiving, by a communication channel stored in a trusted security zone, a request from a first application to engage in an exchange of communication with a second application, wherein the first application is associated with an IPv6 protocol and the second application is associated with an IPv4 protocol; determining, by the communication channel, whether the second application has a security feature activated; in response to a determination that the second application does not have the security feature activated, determining, by the communication channel, whether the second application is a trusted application or resides in a secure environment; and in response to a determination that the second application is at least one of a trusted application or resides in a secure environment, migrating, by the communication channel, packet communication to the second application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for secure migration of IPv6 protocol packets, comprising:
-
receiving, by a communication channel stored in a trusted security zone, a request from a first application, wherein the request is to engage in an exchange of communication with a second application, and wherein the first application is associated with an IPv6 protocol; determining, by the communication channel, if the second application is associated with an IPv6 protocol; in response to a determination that the second application is not associated with the IPv6 protocol, determining, by the communication channel, if the second application is associated with an IPv4 protocol and whether the IPv4 protocol comprises an active security feature; and in response to a determination that the second application is associated with an IPv4 protocol comprising the active security feature, sending, by the communication channel, an IPv6 protocol packet to the second application to migrate the second application to the IPv6 protocol. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system for the secure transmission of information between IPv4 and IPv6, comprising:
-
a processor; a non-transitory memory; and an application stored in a trusted security zone, wherein the trusted security zone comprises a communications channel to establish an end-to-end trusted communication link configured to; receive a request from a first application, wherein the request is to engage in an exchange of communication with a second application via a network; determine if the second application is associated with an IPv6 protocol; in response to a determination that the second application is not associated with the IPv6 protocol, determine whether the second application is associated with an IPv4 protocol and has IPsec activated; in response to a determination that the second application either is not associated with an IPv4 protocol or does not have IPsec activated, determine whether the second application is at least one of a trusted application or is stored in a secure environment; and in response to at least one of a determination that the second application is associated with IPv4 protocol and comprises activated IPsec and a determination that the second application is at least one of a trusted application or is stored in the secure environment, sends an IPv6 packet to the second application via the end-to-end trusted communication link. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification