Validating packets in network communications
First Claim
Patent Images
1. A method for validating packets in network communications, comprising the steps of:
- (a) spawning at a device, by virtual dispersive routing (VDR) software loaded on the device in response to a request for a network connection from a particular application running on the device, a virtual machine that virtualizes networking capabilities of the device such that a virtual network connection is provided;
(b) receiving, at networking hardware of a device, a packet communicated from another device over a network;
(c) intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware;
(d) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the virtual network connection; and
(e) determining, by the VDR software, that the packet belongs to a valid application running on the device by(i) running a hash function utilizing data from the packet as input to generate as output a hash value,(ii) comparing the generated hash value to an identification code associated with the particular application and determining that there is a match.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for validating packets in network communications includes receiving, at networking hardware of a device, a packet communicated from another device over a network; intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware; determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the device; and determining, by the VDR software, using a virtual machine for a network connection that virtualizes network capabilities of the device, that the packet belongs to a valid application running on the device.
152 Citations
18 Claims
-
1. A method for validating packets in network communications, comprising the steps of:
-
(a) spawning at a device, by virtual dispersive routing (VDR) software loaded on the device in response to a request for a network connection from a particular application running on the device, a virtual machine that virtualizes networking capabilities of the device such that a virtual network connection is provided; (b) receiving, at networking hardware of a device, a packet communicated from another device over a network; (c) intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware; (d) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the virtual network connection; and (e) determining, by the VDR software, that the packet belongs to a valid application running on the device by (i) running a hash function utilizing data from the packet as input to generate as output a hash value, (ii) comparing the generated hash value to an identification code associated with the particular application and determining that there is a match. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for validating packets in network communications, comprising the steps of:
-
(a) spawning at a device, by virtual dispersive routing (VDR) software loaded on the device in response to a request for a network connection from a particular application running on the device, a virtual machine that virtualizes networking capabilities of the device such that a virtual network connection is provided; (b) receiving, at networking hardware of a device, a packet communicated from another device over a network; (c) intercepting, by the VDR software loaded on the device, the packet as it is passed from the networking hardware; (d) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the virtual network connection; and (e) determining, by the VDR software, that the packet does not belong to a valid application running on the device, such determination comprising (i) running a hash function utilizing data from the packet as input to generate as output a hash value, (ii) comparing the generated hash value to an identification code associated with the particular application and determining that there is not a match; (f) in response to determining that the generated hash value does not match the identification code associated with the particular application, quarantining the packet. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for validating packets in network communications, comprising the steps of:
-
(a) spawning at a device, by virtual dispersive routing (VDR) software loaded on the device in response to a request for a network connection from a particular application running on the device, a virtual machine that virtualizes networking capabilities of the device such that a virtual network connection is provided; (b) loading a spider configured to thread together an upper application layer and a lower layer of a protocol stack; (c) receiving, at networking hardware of a device, a packet communicated from another device over a network; (d) intercepting, by virtual dispersive routing (VDR) software loaded on the device, the packet as it is passed from the networking hardware; (e) determining, by the VDR software, that a destination address of the packet corresponds to an address associated with the virtual network connection; and (f) accessing, by the VDR software at the lower layer of the protocol stack via the spider, an identification code associated with the particular application; (g) determining, by the VDR software, that the packet belongs to a valid application running on the device by (i) running a hash function utilizing data from the packet as input to generate as output a hash value, (ii) comparing the generated hash value to the accessed identification code and determining that there is a match. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification