Security processor mirroring
First Claim
Patent Images
1. A method of mirroring security processors comprising the steps of:
- generating information for a first security processor;
repeatedly sending the information to a second security processor in accordance with the first security processor processing at least one packet.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and associated systems are disclosed for providing secured data transmission over a data network. A mirrored security processing system may include two or more security processors may be configured so that one of the security processors may handle the packet traffic of another security processor in the event of a failure associated with the other security processor.
139 Citations
44 Claims
-
1. A method of mirroring security processors comprising the steps of:
-
generating information for a first security processor;
repeatedly sending the information to a second security processor in accordance with the first security processor processing at least one packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of mirroring security processors comprising the steps of:
-
generating security association information for a first security processor; and
repeatedly sending the security association information to a second security processor in accordance with the first security processor processing at least one packet. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of providing redundancy in a security processing system comprising the steps of:
-
establishing secure packet flow through a first security processor;
modifying security association information associated with the secure packet flow;
sending the modified security association information to a second security processor; and
rerouting the secure packet flow to flow through the second security processor instead of the first security processor. - View Dependent Claims (19)
-
-
20. A method of mirroring security association information comprising the steps of:
-
receiving, by a first security processor, at least one packet;
modifying security association information associated with the at least one packet;
storing the modified security association information in a first data memory;
sending the modified security association information to a second security processor; and
storing, by the second security processor, the modified security association information in a second data memory. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A security processing system, comprising:
-
a first security processor for processing packets and for updating security association information associated with the packets, the first security processor comprising at least one MAC for sending updated security association information over a packet network; and
a second security processor for receiving the updated security association information over the packet network. - View Dependent Claims (36, 37)
-
-
38. A security processing system, comprising:
-
a first security processor for processing a first packet flow, updating security association information in response to the first packet flow and sending the updated security association information to a second security processor;
a second security processor for processing a second packet flow, updating security association information in response to the second packet flow and sending the updated security association information to the first security processor; and
at least one switch for routing the first packet flow and the second packet flow to the first security processor and the second security processor. - View Dependent Claims (39, 40, 41)
-
-
42. A security processing system, comprising:
-
at least one host processor for establishing a first packet flow to a first security processor and a second packet flow to a second security processor;
a first security processor for updating a first set of security association information associated with the first packet flow and sending the updated first set of security association information to a second security processor; and
a second security processor for updating a second set of security association information associated with the second packet flow and sending the updated second set of security association information to the first security processor. - View Dependent Claims (43, 44)
-
Specification