×

Secure networking using a resource-constrained device

  • US 7,509,487 B2
  • Filed: 05/19/2004
  • Issued: 03/24/2009
  • Est. Priority Date: 09/29/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of secure communication between a smart card and remote network nodes over a network wherein the smart card acts as a standalone network node and the remote network nodes communicate with the smart card using un-modified network clients and servers and wherein the smart card has a central processing unit, a random access memory, a non-volatile memory, a read-only memory, and an input and output component, comprising:

  • using a physical link selected from one of several physical link methods;

    assigning a unique network address to the smart card thereby enabling the smart card to act as a standalone network node;

    executing on the smart card a communications module implementing networking protocols and one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes using the networking protocols and operable to implement network security protocols thereby setting a security boundary inside the smart card;

    implementing an execution model, wherein the communication module is driven by input events and by the applications and wherein the smart card optimized memory usage by sharing data buffers between one or more communications protocol layers or security protocol layers;

    executing on the host computer one or more communication and networking protocols operable to communicate with the smart card and operable to communicate with the remote network nodes; and

    executing one or more secure network applications on the smart card wherein the network applications call upon the communication module of the smart card to communicate with the host computer or the remote network node using the networking protocols and network security protocols and wherein the secure network applications are securely accessible by the remote network nodes using un-modified network clients and servers.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×