System for signatureless transmission and reception of data packets ...

3 downloads 168 Views 2MB Size Report
Aug 19, 1998 - between sites on the Internet or other networks of computer networks. ..... This approach has certain adv
USO0RE39360E

(19) United States (12) Reissued Patent

(10) Patent Number:

Aziz et a]. (54)

US RE39,360 E

(45) Date of Reissued Patent:

SYSTEM FOR SIGNATURELESS

Oct. 17, 2006

FOREIGN PATENT DOCUMENTS

TRANSMISSION AND RECEPTION OF DATA

JP

PACKETS BETWEEN COMPUTER NETWORKS

W0

04 154,33

9, 02095

5/1992

*

6/1992

OTHER PUBLICATIONS (75)

Inventors: Ashar Aziz, Fremont, CA (US);

_

_

_

_

Geo?rey Mulligan, Fremont’ CA (Us);

Chuck Semeria, Understandrng IP Addressing: Everything

Martin Patterson Grenoble (FR).

You Ever Wanted to Know. 1996. 3Com CorOporation.*

Glenn Scott sunliyvale CA (Us),

Forne et al., “Hardware Implementation of a Secure Bridge

3

s

in Ethernet Environments,” Nov. 29, 1993, IEEE.

(73) AssigneeZ sun Micmsystems, Inc" Santa Clara’ CA (Us)

O’Higgins, et al, “Securing Information in X.25 Networks,” Dec. 25, 1990, Globecom ’90 IEEE Global Telecommuni cations Conference & Exhibition.

Sharp et al., “Network Security in a Heterogeneous Envi

(21) Appl' NO': 09/136’954 (22) Filed; Aug, 19, 1998

ronment,” Sep. 1994, AT&T Technical Journal. Yamaguchi et al., “A design for LAN cipher communica tions,” Jan. 21, 1994, Technical Report of IEICE, vol. 93,

Related US. Patent Documents

NO- 436

Reissue of:

Japanese O?ice Action dated Mar. 15, 2005, from corre

(64) Patent No.1

5,548,646

sponding Japanese Application No. 262037/95.

Aug. 20, 1996

* Cited b examiner

Appl. No.: Filed: (51) Int_ CL

08/306,337 seP' 15’ 1994

y Primary ExamineriHosuk Song (74) Attorney, Agent, or FirmiBeyer Weaver & Thomas,

H04L 9/00

(2006.01)

Issued:

LLP

(57) (52)

(58)

ABSTRACT

US. Cl. ......................... .. 713/150; 380/21; 380/49;

380/277; 713/151; 713/153; 713/154; 713/160;

A System for automatically encrypting and decrypting data

713/162

packet sent from a source host to a destination host across a

Field of Classi?cation Search ................. .. 380/49

Public meme/‘Work A tunnelling bridge is Positioned 2“

380/21 277, 713/151 153*15 4 160*163’

each network, and intercepts all packets transmitted to or

’ 715/150 20bi201_ 70’9/200 217’ ’ ’ See application ?le for complete search history.’

from its associated network. The tunnelling bridge includes tables indicated pairs of hosts or pairs of networks between

References Cited

which packets should be encrypted. When a packet is transmitted from a ?rst host, the tunnelling bridge of that host’s network intercepts the packet, and determines from its

US. PATENT DOCUMENTS

header information whether packets from that host that are directed to the speci?ed destination host should be

(56)

encrypted; or, alternatively, whether packets from the source

>1
HOST B PACKETS TO BE ENCRYPTED?

ENCRYPT PACKET

/ 250

{ ADD ENCAPSULATION HEADER

r'\ 260

T J~

TRANSMIT PACKET TO DESTINATION NETWORK

V 270

T INTERCEPT PACKET AT TB2

A 280

T HEAD ENCAPSULATION HEADER

\- 290

WAS PACKET ENCRYPTED?

DETERMINE ENCRYPTION MECHANISM

r- 320

T

>

DECRYPT PACKET

330

V

340

TRANSMIT PACKET TO HOST B

/FIG 6

U.S. Patent

0a. 17, 2006

420

Sheet 6 0f 7

US RE39,360 E

410

/

/ DATA

f

400

FIG. 7 450

(440) (420)

/

\W

(410)

/

:

\

(DATA)

1 402

A

Y

Y

430

(400)

FIG. 8 470

460 (440)

/ . ‘

‘ w"

(420)

(410)

/|

/

1

I: 8 33;)?

I

K

(DATA)

J\

1 404 J

Y

T

432

(409)

FIG. 9 450

460 (440)

x v 7%

&



'

\

(420)

(410)

/I

.

/

I

l

(

DATA

A

)

Suggest Documents