VALIDATING PACKETS IN NETWORK COMMUNICATIONS
First Claim
1. A method for validating packets in network communications, comprising the steps of:
- (a) receiving, at networking hardware of a device, a packet communicated from another device over a network;
(b) intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware;
(c) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the device; and
(d) determining, by the VDR software, using a virtual machine for a network connection that virtualizes network capabilities of the device, that the packet belongs to a valid application running on the device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for validating packets in network communications includes receiving, at networking hardware of a device, a packet communicated from another device over a network; intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware; determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the device; and determining, by the VDR software, using a virtual machine for a network connection that virtualizes network capabilities of the device, that the packet belongs to a valid application running on the device.
47 Citations
20 Claims
-
1. A method for validating packets in network communications, comprising the steps of:
-
(a) receiving, at networking hardware of a device, a packet communicated from another device over a network; (b) intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware; (c) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the device; and (d) determining, by the VDR software, using a virtual machine for a network connection that virtualizes network capabilities of the device, that the packet belongs to a valid application running on the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of utilizing information from one layer of a protocol stack to inform decisions at another layer of the protocol stack, comprising:
-
(a) spawning a virtual machine for a network connection that virtualizes network capabilities of a device; (b) loading a spider configured to thread together an upper application layer and a lower layer of a protocol stack; (c) receiving, using the virtualized network capabilities of the virtual machine, a packet at the lower layer; and (c) determining whether a value from the packet corresponds to a value associated with the application layer.
-
-
19. A method of utilizing information from one layer of a protocol stack to inform decisions at another layer of the protocol stack, comprising:
-
(a) loading, at a device, a spider configured to thread together an upper application layer and a lower layer of a protocol stack; (b) receiving a network packet at the lower layer; (c) determining whether a value derived from information in the network packet corresponds to a value associated with the application layer. - View Dependent Claims (20)
-
Specification