Methods for internet communication security

ABSTRACT

The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.

CROSS REFERENCE TO RELATED APPLICATION

This application is related to U.S. Provisional Application No.62/569,300, filed Oct. 6, 2017, and U.S. Provisional Application No.62/609,152, filed Dec. 21, 2017. All of the foregoing applications, intheir entirety, are incorporated herein by reference.

FIELD OF THE INVENTION

The present disclosure relates to systems, methods, and apparatuses tosecure computing devices against network-borne security threats.

BACKGROUND OF THE INVENTION

Cyber-attacks pose an escalating threat to security and the economy dueto a proliferation of sophisticated malware toolkits and a rapidlyexpanding reliance on Internet Protocol (IP)-based communication.According to Gartner, Inc., the number of connected devices will exceed8 billion in 2017, and will grow to more than 20 billion by 2020. Manyof these devices reside in machine-to-machine (M2M) “Internet of Things”(IoT) networks managing critical infrastructure, sensitive data, andhazardous industrial processes. Each device is a potential target orattack platform for malware, compromising traditional trust assumptionsbetween communicating devices. Even networks that have been walled offfrom the public Internet may be vulnerable due to non-Ethernetinterfaces such as USB ports.

Given the large number of legacy devices and the need for flexibility,it is impractical to rewrite every end application to secure M2Mcommunications. In addition, current technologies are not effective andpractical against all cyber-attacks. A compromised device, for instance,may spread malware to additional devices through a virtual privatenetwork. Moreover, conventional device-level protection, inclusive ofanti-malware software and intrusion detection technology, tends toconsume significant computing resources, and may degradeQuality-of-Service (QoS) to an unacceptable level in certain devicenetworks. For instance, it may not be practical to install conventionaldevice-level protection on lightweight edge appliances in IoT networksconfigured to provide line speed or near line speed performance. In anyevent, it may not be cost-effective or practical to upgrade largenumbers of devices to host conventional node protection tools,particularly since these tools continue to experience rapid year-on-yearincreases in processing and memory requirements. The conventional tools,beyond costly, do not provide complete protection from intrusion.

The present disclosure relates, in certain embodiments, to methods,systems, products, software, middleware, computing infrastructure and/orapparatus applicable to device networks with QoS requirements forsecure, trusted Ethernet-based communications in the presence of malwareattack vectors.

BRIEF SUMMARY OF THE INVENTION

Certain embodiments may provide, for example, a product for securingcommunications of a plurality of networked computing devices (forexample network packet-based communications among the network computingdevices over a network), the product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable by afirst computing device to perform communication management operations.In certain embodiments, for example, the communication managementoperations may comprise sending a nonpublic first identification code(for example sending an encrypted nonpublic first identification code)for the first computing device (for example the nonpublic firstidentification code may be assigned to the first computing device) to asoftware port on a second computing device via a pre-establishedcommunication pathway. In certain embodiments, for example, thecommunication management operations may comprise receiving, in responseto the sending (or in response to receipt of the nonpublic firstidentification code by the second computing device), a nonpublic secondidentification code for the second computing device (for example thenonpublic second identification code may be assigned to the secondcomputing device). In certain embodiments, for example, thecommunication management operations may comprise comparing the nonpublicsecond identification code with a pre-established (or preconfigured,predefined, or preprovisioned) value for the second computing device(for example the pre-established value may be assigned to the secondcomputing device).

In certain embodiments, for example, the nonpublic second identificationcode may be obtained from a network packet. In certain embodiments, forexample, the nonpublic second identification code may be obtained from ahigher-than-Open Systems Interconnection (OSI) layer three portion (forexample one or more of an OSI layer four portion, an OSI layer fiveportion, an OSI layer six portion, an OSI layer seven portion, or alayer between one or more of an OSI layer three portion, an OSI layerfour portion, an OSI layer five portion, an OSI layer six portion, or anOSI layer seven portion) of the network packet. In certain embodiments,for example, the comparing may be initiated in a kernel space of thefirst computing device. In certain embodiments, for example, thecomparing may be partially performed in an application space of thefirst computing device.

In certain embodiments, for example, the pre-established value may bepreprovisioned on nonvolatile storage media of the first computingdevice. In certain embodiments, for example, the communicationmanagement operations may further comprise: decrypting the nonpublicsecond identification code with a single-use cryptographic key. Incertain embodiments, for example, the single-use cryptographic key maybe rotated to obtain a further cryptographic key for use in furtherdecrypting.

In certain embodiments, for example, the nonpublic first identificationcode and nonpublic second identification code may be shared secretsbetween the first computing device and the second computing device.

In certain embodiments, for example, the communication managementoperations may further comprise sending a first application identifierfor a first user-application (for example the first applicationidentifier may be assigned to the first user-application) to the secondcomputing device via the pre-established communication pathway. Incertain embodiments, for example, the communication managementoperations may further comprise receiving, in response to the sending, asecond application identifier for a second user-application (for examplethe second application identifier may be assigned to the seconduser-application). In certain embodiments, for example, thecommunication management operations may further comprise comparing thesecond application identifier with a pre-established value for thesecond user-application. In certain embodiments, for example, thecommunication management operations may further comprise sending a datatype identifier for the pre-established communication pathway via thepre-established communication pathway. In certain embodiments, forexample, the communication management operations may further comprisereceiving, in response to the sending, the data type identifier from thesecond computing device. In certain embodiments, for example, thecommunication management operations may further comprise comparing thereceived data type identifier with a pre-established value for thepre-established communication pathway. In certain embodiments, forexample, the first application identifier and the data type identifiermay be sent to the second computing device in a single network packet.In certain embodiments, for example, the comparing the nonpublic secondidentification code, the comparing the second application identifier,and the comparing the received data type identifier may be performedprior to any communication of application data between the firstuser-application and the second user-application. In certainembodiments, for example, the communication management operations mayfurther comprise receiving a data packet from a first port assigned tothe first user-application, the first port hosted on the first computingdevice, the data packet comprising a payload and a second port number.In certain embodiments, for example, the communication managementoperations may further comprise assembling a packet segment for thereceived data packet, the packet segment comprising the payload, thefirst application identifier, and the data type identifier. In certainembodiments, for example, the pre-established communication pathway mayhave a one-to-one correspondence to an n-tuple comprising the firstapplication identifier, the second application identifier, the secondport number, and the data type identifier. In certain embodiments, forexample, each of a series of network packet communications ofuser-application data between the first port and the second port maycomprise: transmission of a network packet to a third port, the thirdport assigned to network security software resident on the secondcomputing device, the third port having a one-to-one correspondence withthe second port number, the second port number assigned to the secondport, the second port assigned to the second user-application, thenetwork packet comprising the first application identifier and the datatype identifier. In certain embodiments, for example, the firstapplication identifier and the data type identifier in the each of theseries of network packet communications may be encrypted by one of aseries of single-use encryption keys. In certain embodiments, forexample, all communications of user-application data between the firstport and the second port may comprise the series of network packetcommunications. In certain embodiments, for example, the communicationmanagement operations may further comprise intercepting a networkconnection request from a first port assigned to the firstuser-application, the first port hosted by the first computing device,the request comprising a second port number. In certain embodiments, forexample, the communication management operations may further compriseverifying that the first user-application is specifically authorized tocommunicate with a second port, the second port number assigned to thesecond port. In certain embodiments, for example, the verifying may beperformed prior to forming the pre-established communication pathway. Incertain embodiments, for example, the communication managementoperations may further comprise intercepting a network connectionrequest from a second port, the second port hosted by the secondcomputing device, the request comprising a first port number. In certainembodiments, for example, the communication management operations mayfurther comprise verifying that a first port is specifically authorizedto receive packet data from the second port, the first port numberassigned to the first port. In certain embodiments, for example, thecommunication management operations may further comprise confirming thatthe second computing device has consulted a pre-specified local policyto specifically authorize network packet communication between the firstport and the second port. In certain embodiments, for example, thecommunication management operations may further comprise: receiving anencrypted identifier for the pre-specified local policy from the secondcomputing device. In certain embodiments, for example, the pre-specifiedlocal policy may comprise a record, the record comprising the firstapplication identifier, the second application identifier, the data typeidentifier, and the first port number. In certain embodiments, forexample, the pre-specified local policy may further comprises a flag,the flag specifying whether the communication pathway is unidirectionalor bidirectional. In certain embodiments, for example, the interceptingmay be initiated in a kernel space of the first computing device. Incertain embodiments, for example, the communication managementoperations may further comprise receiving a network packet via thecommunication pathway, the network packet comprising the first portnumber, data from the second user-application, the second applicationidentifier, and the data type identifier. In certain embodiments, forexample, the communication management operations may further comprisecomparing the second application identifier and the data type identifierwith pre-established values, the pre-established values identified basedon the first port number. In certain embodiments, for example, thesecond application identifier and the data type identifier may belocated in higher-than-OSI layer three portions (for example one or moreof OSI layer four portions, OSI layer five portions, OSI layer sixportions, OSI layer seven portions, or layers between one or more of theOSI layer three portions, OSI layer four portions, OSI layer fiveportions, OSI layer six portions, or OSI layer seven portions) of thenetwork packet. In certain embodiments, for example, the comparing maybe initiated in a kernel of the first computing device. In certainembodiments, for example, the communication management operations mayfurther comprise: translating the data from the second user-applicationto a format expected by the first user-application. In certainembodiments, for example, the data from the second user-application maybe translated from a pre-established format, the pre-established formatdetermined from the data type identifier.

In certain embodiments, for example, a portion of the communicationmanagement operations may be configured for execution in a kernel spaceof the first computing device, and a further portion of thecommunication management operations may be configured for execution inan application space of the first computing device.

Certain embodiments may provide, for example, a product for securingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable by a first computing device toperform communication management operations, the communicationmanagement operations comprising: i) sending a nonpublic firstidentification code for the first computing device to a software port ona second computing device via a pre-established communication pathway;ii) receiving, in response to the sending, a nonpublic secondidentification code for the second computing device; and iii) comparingthe nonpublic second identification code with a pre-established valuefor the second computing device.

In certain embodiments, for example, the nonpublic second identificationcode may be obtained from a network packet. In certain embodiments, forexample, the nonpublic second identification code may be obtained from ahigher-than-OSI layer three portion (for example one or more of an OSIlayer four portion, an OSI layer five portion, an OSI layer six portion,an OSI layer seven portion, or a layer between one or more of an OSIlayer three portion, an OSI layer four portion, an OSI layer fiveportion, an OSI layer six portion, or an OSI layer seven portion) of thenetwork packet. In certain embodiments, for example, the comparing maybe initiated in a kernel space of the first computing device. In certainembodiments, for example, the comparing may be partially performed in anapplication space of the first computing device.

In certain embodiments, for example, the pre-established value may bepreprovisioned on nonvolatile storage media of the first computingdevice. In certain embodiments, for example, the communicationmanagement operations may further comprise: decrypting the nonpublicsecond identification code with a single-use cryptographic key. Incertain embodiments, for example, the single-use cryptographic key maybe rotated to obtain a further cryptographic key for use in furtherdecrypting.

In certain embodiments, for example, the nonpublic first identificationcode and nonpublic second identification code may be shared secretsbetween the first computing device and the second computing device.

In certain embodiments, for example, the communication managementoperations may further comprise: i) sending a first applicationidentifier for a first user-application to the second computing devicevia the pre-established communication pathway; ii) receiving, inresponse to the sending, a second application identifier for a seconduser-application; and iii) comparing the second application identifierwith a pre-established value for the second user-application. In certainembodiments, for example, the communication management operations mayfurther comprise: i) sending a data type identifier for thepre-established communication pathway via the pre-establishedcommunication pathway; ii) receiving, in response to the sending, thedata type identifier from the second computing device; and iii)comparing the received data type identifier with a pre-established valuefor the pre-established communication pathway. In certain embodiments,for example, the first application identifier and the data typeidentifier may be sent to the second computing device in a singlenetwork packet. In certain embodiments, for example, the comparing thenonpublic second identification code, the comparing the secondapplication identifier, and the comparing the received data typeidentifier may be performed prior to any communication of applicationdata between the first user-application and the second user-application.In certain embodiments, for example, the communication managementoperations may further comprise: i) receiving a data packet from a firstport assigned to the first user-application, the first port hosted onthe first computing device, the data packet comprising a payload and asecond port number; and ii) assembling a packet segment for the receiveddata packet, the packet segment comprising the payload, the firstapplication identifier, and the data type identifier. In certainembodiments, for example, the pre-established communication pathway mayhave a one-to-one correspondence to an n-tuple comprising the firstapplication identifier, the second application identifier, the secondport number, and the data type identifier. In certain embodiments, forexample, each of a series of network packet communications ofuser-application data between the first port and a second port maycomprise: the first application identifier and the data type identifier,the second port assigned to the second user-application, the second portnumber assigned to the second port. In certain embodiments, for example,the first application identifier and the data type identifier in theeach of the series of network packet communications may be encrypted byone of a series of single-use encryption keys. In certain embodiments,for example, the series of network packet communications may compriseall network packet communications of user-application data between thefirst port and the second port. In certain embodiments, for example, thecommunication management operations may further comprise: i)intercepting a network connection request from a first port assigned tothe first user-application, the first port hosted by the first computingdevice, the request comprising a second port number; and ii) verifyingthat the first user-application is specifically authorized tocommunicate with a second port, the second port number assigned to thesecond port. In certain embodiments, for example, the verifying may beperformed prior to forming the pre-established communication pathway. Incertain embodiments, for example, the communication managementoperations may further comprise: i) intercepting a network connectionrequest from a second port, the second port hosted by the secondcomputing device, the request comprising a first port number; and ii)verifying that a first port is specifically authorized to receive packetdata from the second port, the first port number assigned to the firstport. In certain embodiments, for example, the communication managementoperations may further comprise confirming that the second computingdevice has consulted a pre-specified local policy to specificallyauthorize network packet communication between the first port and thesecond port. In certain embodiments, for example, the communicationmanagement operations may further comprise: receiving an encryptedidentifier for the pre-specified local policy from the second computingdevice. In certain embodiments, for example, the pre-specified localpolicy may comprise a record, the record comprising the firstapplication identifier, the second application identifier, the data typeidentifier, and the first port number. In certain embodiments, forexample, the pre-specified local policy may further comprises a flag,the flag specifying whether the communication pathway is unidirectionalor bidirectional. In certain embodiments, for example, the interceptingmay be initiated in a kernel space of the first computing device. Incertain embodiments, for example, the communication managementoperations may further comprise: i) receiving a network packet via thecommunication pathway, the network packet comprising the first portnumber, data from the second user-application, the second applicationidentifier, and the data type identifier; and ii) comparing the secondapplication identifier and the data type identifier with pre-establishedvalues, the pre-established values identified based on the first portnumber. In certain embodiments, for example, the second applicationidentifier and the data type identifier may be located inhigher-than-OSI layer three portions (for example one or more of OSIlayer four portions, OSI layer five portions, OSI layer six portions,OSI layer seven portions, or layers between one or more of the OSI layerthree portions, OSI layer four portions, OSI layer five portions, OSIlayer six portions, or OSI layer seven portions) of the network packet.In certain embodiments, for example, the comparing may be initiated in akernel of the first computing device. In certain embodiments, forexample, the communication management operations may further comprise:translating the data from the second user-application to a formatexpected by the first user-application. In certain embodiments, forexample, the data from the second user-application may be translatedfrom a pre-established format, the pre-established format determinedfrom the data type identifier.

In certain embodiments, for example, a portion of the communicationmanagement operations may be configured for execution in a kernel spaceof the first computing device, and a further portion of thecommunication management operations may be configured for execution inan application space of the first computing device.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized networktunnels (for example network tunnels based on protocol which involveencrypting a network packet and inserting the encrypted network packetinside a packet for transport (such as IPsec protocol), or networktunnels based on Socket Secured Layer protocol, or network tunnels whichrequire encryption of part of all of a packet payload but do not involveadditional headers (for example do not involve packaging an IP packetinside another IP packet) for network communication on all port-to-portnetwork communications (for example unencrypted or encrypted payloadcommunications) among the plurality of networked computing devices(inclusive, for example, of port-to-port communications according toUser Datagram Protocol (UDP) or Transmission Control Protocol (TCP)between end-user application processes over a network)). In certainembodiments, for example, the port-to-port communications may be betweenuser-application processes (inclusive of application processes having aprocess owner (or user)). In certain embodiments, for example, one ormore of the user-application processes may reside in kernel and/orapplication space. In certain embodiments, for example, the establishingmay comprise intercepting network connection requests (for example bynetwork application programming interfaces) having associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned tunnel port numbers (for examplepredefined tunnel port numbers associated with servers), comprisingidentifying at least one (for example, one) preconfigured, predefined,pre-established and/or preprovisioned tunnel port number for eachassociated destination port number of the associated destination portnumbers. In certain embodiments, for example, the establishing maycomprise requesting the negotiation of network tunnels, the requestingcomprising sending connection request packets comprising the tunnel portnumbers (and also, for example, cipher suite parameters), each one ofthe network tunnels having a one-to-one correspondence with one of thetunnel port numbers. In certain embodiments, for example, theestablishing may comprise authorizing the network tunnels, comprisingcomparing computing device identifiers, user-application identifiers(for example user-application identifiers derived from applicationprocess identifiers and/or application process owners, together or inparts), and payload data-type identifiers received from the networktunnels with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes. In certain further embodiments, forexample, the computing device identifiers, user-application identifiers,and/or payload data-type identifiers may be encrypted and requiredecryption before the comparing.

In certain embodiments, for example, the intercepting, identifying,requesting, and authorizing may be transparent to all user-applicationprocesses (for example all processes (except optionally for processesexecuting portions of the program code) executing in (non-kernel)application space and having process owners) on the plurality ofnetworked computing devices. In certain embodiments, for example, theintercepting may be performed by a network application programminginterface having standard syntax (for example using modified networkapplication programming interface functions that retain standard syntax,for example: bind( ), connect( ), listen( ), UDP sendto( ), UDP bindto(), and close( ) functions).

In certain embodiments, for example, the intercepting, identifying,requesting, and authorizing may be self-executing. In certain furtherembodiments, for example, the intercepting, identifying, requesting, andauthorizing may be automatic. In certain further embodiments, forexample, the identifying, requesting, and authorizing may beautomatically invoked following the intercepting. In certainembodiments, for example, the intercepting, identifying, and authorizingmay occur in the kernel spaces of the plurality of networked computingdevices. In certain embodiments, for example, one or more of theintercepting, identifying, and authorizing may occur in applicationspaces of the plurality of networked computing devices. In certainfurther embodiments, for example, at least a portion (for example all)of the non-transitory computer-readable storage medium may be residenton a deployment server.

In certain further embodiments, for example, at least a portion (forexample, all) of the non-transitory computer-readable storage medium maybe resident on flash drive. In certain embodiments, for example, thecommunication management operations may further comprise: preventing alluser-application process ports from binding to a portion or all physicalinterfaces of the plurality of networked computing devices.

In certain embodiments, for example, user-application process ports maytransmit packets to network security software process ports by loopbackinterfaces. In certain embodiments, for example, user-applicationprocess ports may transmit packets to network security software processports by TUN/TAP interfaces.

In certain embodiments, for example, the network tunnels may beencrypted. In certain embodiments, for example, the network tunnels maybe interposed between network security processes (for examplemiddleware) running on separate computing devices. In certainembodiments, for example, the network security processes may manage asegment of the data pathway that is interposed between user-applicationprocesses on separate computing devices of the plurality of networkedcomputing devices. In certain embodiments, for example, the networksecurity processes may be conducted on the plural computing devices withuser-application processes, wherein the user-application processes mayengage in port-to-port communications. In certain embodiments, forexample, the network security processes may be resident on differentcomputing devices from the user-application processes. In certainembodiments, for example, the product may be used to configure asoftware-defined perimeter.

In certain embodiments, for example, the tunnel port numbers, computingdevice identifiers, user-application identifiers, and/or payloaddata-type identifiers may be obtained from a plurality of configurationfiles. In certain embodiments, for example, the configuration files maycontain private keys for negotiating encryption keys for the networktunnels. In certain embodiments, for example, the configuration filesmay be binary files. In certain embodiments, for example, theconfiguration files may be encrypted files. In certain embodiments, forexample, the configuration files may be variable length files. Incertain embodiments, for example, the configuration files may beread-only files.

In certain embodiments, for example, the communication managementoperations may further comprise: executing operating system commands toidentify user-application processes making the connection requests, andverifying that the identified user-application processes are authorizedto transmit data to the associated destination port numbers. In certainembodiments, for example, the communication management operations mayfurther comprise thwarting attempts by malware to form networkconnections, the thwarting comprising: rejecting network connectionrequests in which identified user-application processes are notauthorized to transmit data, for example by reference to a configurationfile of authorized port-to-port connections. In certain embodiments, forexample, the product may further comprise a configuration file, theconfiguration file comprising at least two of the following: tunnel portnumbers, computing device identifiers, user-application identifiers, andpayload data-type identifiers. In certain embodiments, for example, thecommunication management operations may comprise updating a connectionstate indicator based on the comparing computing device identifiers, thecomparing user-application process identifiers, and/or the comparingpayload data-type identifiers. In certain embodiments, for example, theupdated connection state indicated may be a field in a list ofport-to-port connections. In certain embodiments, for example, theconnection state indicator may be changed from a value indicating thatno connection has been established to a value indicating that an openconnection state exists for a particular port-to-port connection. Incertain embodiments, for example, the connection state indicator may bechanged from a value indicating that no connection has been establishedto a value indicating that a connection is in the process of beingformed and that one or more of the computing device identifiers, theuser-application process identifiers, and/or the payload data-typeidentifiers has been successfully exchanged, authenticated and/orauthorized. In certain embodiments, for example, the connection stateindicator may be changed from a value indicating that an open connectionexists, that no connection exists, or that a connection is in theprocess of being formed to a value indicating that the connection isbeing declined due to failure to successfully exchange, authenticateand/or authorize one or more of the computing device identifiers, theuser-application process identifiers, and/or the payload data-typeidentifiers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device executing anoperating system (for example a Linux operating system, a Linux-basedoperating system, a real time operating system, a mini-operating system,an edge device operating system, and/or an open source operating system)to enable and/or cause the computing device to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for all (orsubstantially all, or most or greater than 80% or greater than 90% ofthe connected or operational physical ports across all the deviceswithin the software defined network) port-to-port network communicationsamong the plurality of networked computing devices, comprising: i)intercepting network connection requests having associated destinationport numbers; ii) identifying preconfigured, predefined, pre-establishedand/or preprovisioned tunnel port numbers, comprising identifying atleast one tunnel port number for each associated destination port numberof the associated destination port numbers; iii) requesting thenegotiation of network tunnels, the requesting comprising sendingconnection request packets comprising the tunnel port numbers, each oneof the network tunnels having a one-to-one correspondence with one ofthe tunnel port numbers; and iv) authorizing the network tunnels,comprising comparing computing device identifiers, user-applicationidentifiers, and payload data-type identifiers received from the networktunnels with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized networktunnels for all port-to-port network communications among the pluralityof networked computing devices. In certain embodiments, for example, theestablishing may comprise intercepting a network connection requesthaving an associated destination port number. In certain embodiments,for example, the establishing may comprise identifying a preconfigured,predefined, pre-established and/or preprovisioned tunnel port numberassociated with the destination port number. In certain embodiments, forexample, the establishing may comprise requesting the forming of anetwork tunnel, the forming comprising sending a connection requestpacket comprising the tunnel port number. In certain embodiments, forexample, the establishing may comprise authorizing the network tunnel,comprising comparing a computing device identifier, a user-applicationidentifier, and a payload data-type identifier received from the networktunnel with a preconfigured, predefined, pre-established and/orpreprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized network tunnels for all port-to-port networkcommunications among the plurality of networked computing devices,comprising: i) intercepting a network connection request having anassociated destination port number; ii) identifying a preconfigured,predefined, pre-established and/or preprovisioned tunnel port numberassociated with the destination port number; iii) requesting the formingof a network tunnel, the forming comprising sending a connection requestpacket comprising the tunnel port number; and iv) authorizing thenetwork tunnel, comprising comparing a computing device identifier, auser-application identifier, and a payload data-type identifier receivedfrom the network tunnel with a preconfigured, predefined,pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized networktunnels for at least one port-to-port network communication (including,for example, all port-to-port network communications (for exampleunencrypted or encrypted payload communications) among the plurality ofnetworked computing devices (inclusive, for example, of port-to-portcommunications according to User Datagram Protocol (UDP) or TransmissionControl Protocol (TCP) between end-user application processes over anetwork)). In certain embodiments, for example, the port-to-portcommunications may be between user-application processes (inclusive ofapplication processes having a process owner (or user)). In certainembodiments, for example, one or more of the user-application processesmay reside in kernel and/or application space. In certain embodiments,for example, the establishing may comprise intercepting networkconnection requests from source ports (for example the source ports maycomprise ports associated with user-application processes), the requestshaving associated destination port numbers. In certain embodiments, forexample, the establishing may comprise verifying that the source portsare authorized to communicate with ports having the associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of network tunnels,comprising sending connection request packets comprising the associateddestination port numbers, each one of the network tunnels having aone-to-one correspondence with one of the associated destination portnumbers. In certain embodiments, for example, the establishing maycomprise authorizing the network tunnels, comprising comparing computingdevice identifiers, user-application identifiers, and/or payloaddata-type identifiers received from the network tunnels withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes. In certain further embodiments, for example, thecomputing device identifiers, user-application identifiers, and/orpayload data-type identifiers may be encrypted and require decryptionbefore the comparing.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized network tunnels for all port-to-port networkcommunications among the plurality of networked computing devices,comprising: i) intercepting network connection requests from sourceports, the requests having associated destination port numbers; ii)verifying that the source ports are authorized to communicate with portshaving the associated destination port numbers; iii) requesting thenegotiation of network tunnels, comprising sending connection requestpackets comprising the associated destination port numbers, each one ofthe network tunnels having a one-to-one correspondence with one of theassociated destination port numbers; and iv) authorizing the networktunnels, comprising comparing computing device identifiers,user-application identifiers, and payload data-type identifiers receivedfrom the network tunnels with preconfigured, predefined, pre-establishedand/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized encryptedcommunication pathways for at least one port-to-port networkcommunication (for example all port-to-port communications) among theplurality of networked computing devices. In certain embodiments, forexample, the establishing may comprise intercepting network connectionrequests having associated destination port numbers. In certainembodiments, for example, the establishing may comprise identifyingpreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port numbers, comprising identifying at leastone preconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number for each associated destination portnumber of the associated destination port numbers. In certainembodiments, for example, the establishing may comprise requesting thenegotiation of encrypted communication pathways, the requestingcomprising sending connection request packets comprising the encryptedcommunication port numbers, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the encryptedcommunication port numbers. In certain embodiments, for example, theestablishing may comprise authorizing the encrypted communicationpathways, comprising comparing computing device identifiers,user-application identifiers, and/or payload data-type identifiersreceived from the encrypted communication pathways with preconfigured,predefined, pre-established and/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized encrypted communication pathways for allport-to-port network communications among the plurality of networkedcomputing devices, comprising: i) intercepting network connectionrequests having associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port numbers, comprising identifying at leastone preconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number for each associated destination portnumber of the associated destination port numbers; iii) requesting thenegotiation of encrypted communication pathways, the requestingcomprising sending connection request packets comprising the encryptedcommunication port numbers, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the encryptedcommunication port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing computing deviceidentifiers, user-application identifiers, and payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized encryptedcommunication pathways for at least one port-to-port networkcommunication (including, for example, all port-to-port networkcommunications) among the plurality of networked computing devices. Incertain embodiments, for example, the establishing may compriseintercepting network connection requests from source ports (for examplesource ports that have been opened by and have a predeterminedrelationship with authorized applications), the requests havingassociated destination port numbers. In certain embodiments, forexample, the establishing may comprise verifying that the source portsare authorized to communicate with ports having the associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of encryptedcommunication pathways, the requesting comprising sending connectionrequest packets comprising the associated destination port numbers. Incertain embodiments, for example, the establishing may compriseauthorizing the encrypted communication pathways, comprising comparingcomputing device identifiers, user-application identifiers, and/orpayload data-type identifiers received from the encrypted communicationpathways with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized encrypted communication pathways for allport-to-port network communications among the plurality of networkedcomputing devices, comprising: i) intercepting network connectionrequests from source ports, the requests having associated destinationport numbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) requesting the negotiation of encrypted communication pathways, therequesting comprising sending connection request packets comprising theassociated destination port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing computing deviceidentifiers, user-application identifiers, and payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized networktunnels for all port-to-port network communications among the pluralityof networked computing devices. In certain embodiments, for example, theestablishing may comprise intercepting a network connection request froma source port, the request having an associated destination port number.In certain embodiments, for example, the establishing may compriseverifying that the source port is authorized to communicate with a porthaving the associated destination port number. In certain embodiments,for example, the establishing may comprise requesting the negotiation ofa network tunnel, comprising sending a connection request packetcomprising the associated destination port number. In certainembodiments, for example, the establishing may comprise authorizing thenetwork tunnel, comprising comparing a computing device identifiers, auser-application identifier, and a payload data-type identifier receivedfrom the network tunnel with a preconfigured, predefined,pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized network tunnels for all port-to-port networkcommunications among the plurality of networked computing devices,comprising: i) intercepting a network connection request from a sourceport, the request having an associated destination port number; ii)verifying that the source port is authorized to communicate with a porthaving the associated destination port number; iii) requesting thenegotiation of a network tunnel, comprising sending a connection requestpacket comprising the associated destination port number; and iv)authorizing the network tunnel, comprising comparing a computing deviceidentifiers, a user-application identifier, and a payload data-typeidentifier received from the network tunnel with a preconfigured,predefined, pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized encryptedcommunication pathways for all port-to-port network communications amongthe plurality of networked computing devices. In certain embodiments,for example, the establishing may comprise intercepting a networkconnection request having an associated destination port number. Incertain embodiments, for example, the establishing may compriseidentifying a preconfigured, predefined, pre-established and/orpreprovisioned encrypted communication port number associated with thedestination port number. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of an encryptedcommunication pathway, the requesting comprising sending a connectionrequest packet comprising the encrypted communication port number. Incertain embodiments, for example, the establishing may compriseauthorizing the encrypted communication pathway, comprising comparing acomputing device identifier, a user-application identifier, and apayload data-type identifier received from the encrypted communicationpathway with a preconfigured, predefined, pre-established and/orpreprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized encrypted communication pathways for allport-to-port network communications among the plurality of networkedcomputing devices, comprising: i) intercepting a network connectionrequest having an associated destination port number; ii) identifying apreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number associated with the destination portnumber; iii) requesting the negotiation of an encrypted communicationpathway, the requesting comprising sending a connection request packetcomprising the encrypted communication port number; and iv) authorizingthe encrypted communication pathway, comprising comparing a computingdevice identifier, a user-application identifier, and a payloaddata-type identifier received from the encrypted communication pathwaywith a preconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized encryptedcommunication pathways for all port-to-port network communications amongthe plurality of networked computing devices. In certain embodiments,for example, the establishing may comprise intercepting a networkconnection request from a source port, the request having an associateddestination port number. In certain embodiments, for example, theestablishing may comprise verifying that the source port is authorizedto communicate with a port having the associated destination portnumber. In certain embodiments, for example, the establishing maycomprise requesting the negotiation of an encrypted communicationpathway, the requesting comprising sending a connection request packetcomprising the associated destination port number. In certainembodiments, for example, the establishing may comprise authorizing theencrypted communication pathway, comprising comparing a computing deviceidentifier, a user-application identifier, and a payload data-typeidentifier received from the encrypted communication pathway with apreconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:establishing authorized encrypted communication pathways for allport-to-port network communications among the plurality of networkedcomputing devices, comprising: i) intercepting a network connectionrequest from a source port, the request having an associated destinationport number; ii) verifying that the source port is authorized tocommunicate with a port having the associated destination port number;iii) requesting the negotiation of an encrypted communication pathway,the requesting comprising sending a connection request packet comprisingthe associated destination port number; and iv) authorizing theencrypted communication pathway, comprising comparing a computing deviceidentifier, a user-application identifier, and a payload data-typeidentifier received from the encrypted communication pathway with apreconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: performing communication processingfunctions on at least a portion of port-to-network communications(including, for example, on all port-to-network communications) of theplurality of computing devices. In certain embodiments, for example, theperforming communication processing functions may comprise: receivingdata packets (for example from a user-application process via a loopbackinterface) having payloads and associated destination port numbers (theassociated destination port numbers may include, for example, adestination port number associated with a destination port of a networksecurity process). In certain embodiments, for example, the performingcommunication processing functions may comprise: identifyingpreconfigured, predefined, pre-established and/or preprovisioned tunnelport numbers, each one of the tunnel port numbers having a one-to-onecorrespondence with one of the associated destination port numbers. Incertain embodiments, for example, the performing communicationprocessing functions may comprise: assembling packet segments, each oneof the packet segments comprising one of the payloads, an associateduser-application process identifier, and a payload data type descriptor.In certain embodiments, for example, the associated user-applicationprocess identifier may comprise a process identifier and/or a processowner. In certain embodiments, for example, the associateduser-application process identifier, and a payload data type descriptormay be combined (or concatenated) in a metadata portion of the packetsegment. In certain embodiments, for example, the metadata may beencrypted, for example by a single-use cryptographic key. In certainembodiments, for example, the performing communication processingfunctions may comprise: requesting transmission of network packetsthrough network tunnels (for example at least a different network tunnelfor each application-to-application communication of a specified dataprotocol type), each one of the network packets comprising a tunnel portnumber of one of the tunnel port numbers and one of the assembled packetsegments, each one of the network tunnels having a one-to-onecorrespondence with one of the tunnel port numbers.

In certain embodiments, for example, the receiving, identifying,assembling, and requesting may be transparent to all user-applicationprocesses on the plurality of networked computing devices. In certainembodiments, for example, the data packets may be received by loopbackinterfaces. In certain embodiments, for example, the data packets may bereceived by kernel read and/or write calls. In certain embodiments, forexample, the data packets may be received by TAP/TUN interfaces. Incertain embodiments, for example, the receiving may occur in kernelspaces of the plural computing devices. In certain embodiments, forexample, the receiving may occur in application spaces of the pluralcomputing devices. In certain embodiments, for example, the receiveddata packet may be received from user-application processes executing inapplication spaces of the plural computing devices. In certainembodiments, for example, the user-application process identifiers maycomprise process commands and process owners (for example processcommands and process owners comparable to the output of operating systemcommands). In certain embodiments, for example, the communicationprocessing functions may further comprise: setting connection statusindicators to a non-operative state if more than a fixed number (forexample a fixed number such as 10 or 20) of requests to transmit networkpackets are rejected. In certain embodiments, for example, thecommunication processing functions may further comprise: settingconnection status indicators to a non-operative state if the differencebetween rejected and successful requests to transmit network packetsexceeds a fixed number (for example a fixed number such as 10 or 20).

In certain embodiments, for example, the communication processingfunctions may further comprise: checking a connection status of thenetwork tunnels (for example by checking lists maintained in kernelmemory of the plural networked computing devices). In certainembodiments, for example, the communication processing functions mayfurther comprise dropping network packets that are received via one ormore network tunnels whose connection status indicators are set to anon-operative state.

In certain embodiments, for example, the payloads may be translated intoa common format prior to the assembling.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetshaving payloads and associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisioned tunnelport numbers, each one of the tunnel port numbers having a one-to-onecorrespondence with one of the associated destination port numbers; iii)assembling packet segments, each one of the packet segments comprisingone of the payloads, an associated user-application process identifier,and a payload data type descriptor; and iv) requesting transmission ofnetwork packets through network tunnels, each one of the network packetscomprising a tunnel port number of one of the tunnel port numbers andone of the assembled packet segments, each one of the network tunnelshaving a one-to-one correspondence with one of the tunnel port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving a data packethaving a payload and an associated destination port number. In certainembodiments, for example, the performing communication processingfunctions may comprise identifying a preconfigured, predefined,pre-established and/or preprovisioned tunnel port number associated withthe destination port number. In certain embodiments, for example, theperforming communication processing functions may comprise assembling apacket segment, the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the performing communicationprocessing functions may comprise requesting transmission of a networkpacket through a network tunnel, the network packet comprising thetunnel port number and the assembled packet segment, the network tunnelhaving a one-to-one correspondence with the tunnel port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving a datapacket having a payload and an associated destination port number; ii)identifying a preconfigured, predefined, pre-established and/orpreprovisioned tunnel port number associated with the destination portnumber; iii) assembling a packet segment, the packet segment comprisingthe payload, an associated user-application identifier, and a payloaddata type descriptor; and iv) requesting transmission of a networkpacket through a network tunnel, the network packet comprising thetunnel port number and the assembled packet segment, the network tunnelhaving a one-to-one correspondence with the tunnel port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: performing communication processingfunctions on at least a portion of port-to-network communications(including, for example, on all port-to-network communications) of theplurality of computing devices. In certain embodiments, for example, theperforming communication processing functions may comprise receivingdata packets from source ports, the data packets having payloads andassociated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseverifying that the source ports are authorized to communicate with portshaving the associated destination port numbers. In certain embodiments,for example, the performing communication processing functions maycomprise assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor. In certain embodiments,for example, the performing communication processing functions maycomprise requesting transmission of network packets through networktunnels, each one of the network packets comprising a port number of oneof the associated destination port numbers and one of the assembledpacket segments, each one of the network tunnels having a one-to-onecorrespondence with one of the associated destination port numbers.

In certain embodiments, for example, the transmitted network packets maybe exclusive of the destination port numbers associated with thereceived data packets. In certain embodiments, for example, the payloadsin the transmitted network packets may be re-associated with thedestination port numbers only after the transmitted network packets arereceived at one or more second computing devices of the plurality ofnetworked computing devices, the second computing device different fromthe computing device. In certain embodiments, for example, theassociated destination port numbers may not be transmitted from thecomputing device to one or more second computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedacross a network coupled to one or more computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedfrom the computing device via the network tunnels.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers; ii) verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers; iii) assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving data packetshaving payloads and associated destination port numbers. In certainembodiments, for example, the performing communication processingfunctions may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof network packets through encrypted communication pathways, each one ofthe network packets comprising a port number of one of the port numbersand one of the assembled packet segments, each one of the encryptedcommunication pathways having a one-to-one correspondence with one ofthe port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetshaving payloads and associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisioned portnumbers, each one of the port numbers having a one-to-one correspondencewith one of the associated destination port numbers; iii) assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor; and iv) requesting transmission of network packetsthrough encrypted communication pathways, each one of the networkpackets comprising a port number of one of the port numbers and one ofthe assembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving data packets,the data packets comprising messages and associated destination portnumbers. In certain embodiments, for example, the performingcommunication processing functions may comprise identifyingpreconfigured, predefined, pre-established and/or preprovisioned portnumbers, each one of the port numbers having a one-to-one correspondencewith one of the associated destination port numbers. In certainembodiments, for example, the performing communication processingfunctions may comprise assembling packet segments, each one of thepacket segments comprising at least a portion of one of the messages, anassociated user-application identifier, and a payload data typedescriptor. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof network packets through encrypted communication pathways, each one ofthe network packets comprising a port number of one of the port numbersand one of the assembled packet segments, each one of the encryptedcommunication pathways having a one-to-one correspondence with one ofthe port numbers.

In certain embodiments, for example, one or more of the messages mayhave a size exceeding a maximum transfer unit.

In certain embodiments, for example, one of the packet segments maycomprise a portion of one of the messages, the one of the messageshaving a size exceeding a maximum transfer unit and the one of thepacket segments having a total payload, the total payload having a sizenot exceeding the maximum transfer unit or another maximum transferunit.

Certain embodiments may provide, for example product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving datapackets, the data packets comprising messages and associated destinationport numbers; ii) identifying preconfigured, predefined, pre-establishedand/or preprovisioned port numbers, each one of the port numbers havinga one-to-one correspondence with one of the associated destination portnumbers; iii) assembling packet segments, each one of the packetsegments comprising at least a portion of one of the messages, anassociated user-application identifier, and a payload data typedescriptor; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to enable and/or cause the computing device to performcommunication management operations. In certain embodiments, forexample, the communication management operations may comprise performingcommunication processing functions on all port-to-network communicationsof the plurality of computing devices. In certain embodiments, forexample, the performing communication processing functions may comprisereceiving data packets, the data packets comprising messages andassociated destination port numbers, the messages comprisinguser-application identifiers and payload data type descriptors. Incertain embodiments, for example, the performing communicationprocessing functions may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise assemblingpacket segments, each one of the packet segments comprising at least aportion of one of the messages, the at least a portion of one of themessages comprising one of the user-application identifiers and one ofthe payload data type descriptors. In certain embodiments, for example,the performing communication processing functions may compriserequesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising aport number of one of the port numbers and one of the assembled packetsegments, each one of the encrypted communication pathways having aone-to-one correspondence with one of the port numbers.

In certain embodiments, for example, the user-application identifiersmay be spaced apart from one another and the payload data typedescriptors are spaced apart from one another.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving datapackets, the data packets comprising messages and associated destinationport numbers, the messages comprising user-application identifiers andpayload data type descriptors; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned port numbers, each oneof the port numbers having a one-to-one correspondence with one of theassociated destination port numbers; iii) assembling packet segments,each one of the packet segments comprising at least a portion of one ofthe messages, the at least a portion of one of the messages comprisingone of the user-application identifiers and one of the payload data typedescriptors; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

In certain embodiments, for example, any given message to be sent acrossa network may having a size exceeding a maximum transfer unit (forexample a maximum transfer unit of 1500 bytes), requiring the message tobe split into plural payloads for transport across the network, each ofthe plural payloads having a size of no greater than the maximumtransfer unit, for insertion into plural network packets. In certainfurther embodiments, for example, the computing processing functions maycomprise inserting plural metadata into the message, whereby each one ofthe plural payloads contains one of the plural metadata. In certainembodiments, for example, the plural metadata may be positioned atpredetermined locations in the plural payloads. In certain embodiments,for example, two or more of the plural metadata may be spaced apre-determined distance in the any given message. In certainembodiments, for example, each one of the plural meta data comprises oneof the user-application identifiers and one of the payload data typedescriptors.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on at least a portion of port-to-network communications(including, for example, on all port-to-network communications) of theplurality of computing devices. In certain embodiments, for example, theperforming communication processing functions may comprise receivingdata packets from source ports, the data packets having payloads andassociated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseverifying that the source ports are authorized to communicate with portshaving the associated destination port numbers. In certain embodiments,for example, the performing communication processing functions maycomprise assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor. In certain embodiments,for example, the performing communication processing functions maycomprise requesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising aport number of one of the associated destination port numbers and one ofthe assembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the associateddestination port numbers.

In certain embodiments, for example, the transmitted network packets maybe exclusive of the destination port numbers associated with thereceived data packets. In certain embodiments, for example, the payloadsin the transmitted network packets may be re-associated with thedestination port numbers only after the transmitted network packets arereceived at one or more second computing devices of the plurality ofnetworked computing devices, the second computing device different fromthe computing device. In certain embodiments, for example, theassociated destination port numbers may not be transmitted from thecomputing device to one or more second computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedacross a network coupled to one or more computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedfrom the computing device via the encrypted communication pathways.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers; ii) verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers; iii) assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices, the performing communication processing functionscomprising. In certain embodiments, for example, the communicationprocessing functions may comprise receiving data packets from sourceports, the data packets having payloads and associated destination portnumbers. In certain embodiments, for example, the communicationprocessing functions may comprise verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers. In certain embodiments, for example, the communicationprocessing functions may comprise assembling packet segments, each oneof the packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the communication processing functionsmay comprise requesting transmission of network packets through networktunnels, each one of the network packets comprising a port number of oneof the associated destination port numbers and one of the assembledpacket segments, each one of the network tunnels having a one-to-onecorrespondence with one of the associated destination port numbers.

In certain embodiments, for example, the transmitted network packets maybe exclusive of the destination port numbers associated with thereceived data packets. In certain embodiments, for example, the payloadsin the transmitted network packets may be re-associated with thedestination port numbers only after the transmitted network packets arereceived at one or more second computing devices of the plurality ofnetworked computing devices, the second computing device different fromthe computing device. In certain embodiments, for example, theassociated destination port numbers may not be transmitted from thecomputing device to one or more second computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedacross a network coupled to one or more computing devices of theplurality of networked computing devices. In certain embodiments, forexample, the associated destination port numbers may not be transmittedfrom the computing device via the network tunnels.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers; ii) verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers; iii) assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices. In certainembodiments, for example, the performing communication processingfunctions may comprise receiving a data packet from a source port, thedata packet having a payload and an associated destination port number.In certain embodiments, for example, the performing communicationprocessing functions may comprise verifying that the source port isauthorized to communicate with a port having the associated destinationport number. In certain embodiments, for example, the performingcommunication processing functions may comprise assembling a packetsegment, the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the performing communicationprocessing functions may comprise requesting transmission of a networkpacket through a network tunnel, the network packet comprising theassociated destination port numbers and the assembled packet segment,the network tunnels having a one-to-one correspondence with theassociated destination port number.

In certain embodiments, for example, the transmitted network packet maybe exclusive of the destination port number associated with the receiveddata packet. In certain embodiments, for example, the payload in thetransmitted network packet may be re-associated with the destinationport number only after the transmitted network packet is received at asecond computing devices of the plurality of networked computingdevices, the second computing device different from the computingdevice. In certain embodiments, for example, the associated destinationport number may not be transmitted from the computing device to thesecond computing device of the plurality of networked computing devices.In certain embodiments, for example, the associated destination portnumber may not be transmitted across a network coupled to one or morecomputing devices of the plurality of networked computing devices. Incertain embodiments, for example, the associated destination port numbermay not be transmitted from the computing device via the network tunnel.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving a datapacket from a source port, the data packet having a payload and anassociated destination port number; ii) verifying that the source portis authorized to communicate with a port having the associateddestination port number; iii) assembling a packet segment, the packetsegment comprising the payload, an associated user-applicationidentifier, and a payload data type descriptor, and iv) requestingtransmission of a network packet through a network tunnel, the networkpacket comprising the associated destination port numbers and theassembled packet segment, the network tunnels having a one-to-onecorrespondence with the associated destination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving data packetshaving payloads and associated destination port numbers. In certainembodiments, for example, the performing communication processingfunctions may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof network packets through encrypted communication pathways, each one ofthe network packets comprising a port number of one of the port numbersand one of the assembled packet segments, each one of the encryptedcommunication pathways having a one-to-one correspondence with one ofthe port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetshaving payloads and associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisioned portnumbers, each one of the port numbers having a one-to-one correspondencewith one of the associated destination port numbers; iii) assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor; and iv) requesting transmission of network packetsthrough encrypted communication pathways, each one of the networkpackets comprising a port number of one of the port numbers and one ofthe assembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving a data packethaving a payload and an associated destination port number. In certainembodiments, for example, the performing communication processingfunctions may comprise identifying a preconfigured, predefined,pre-established and/or preprovisioned port number, the port numberhaving a one-to-one correspondence with the associated destination portnumber. In certain embodiments, for example, the performingcommunication processing functions may comprise assembling a packetsegment, the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the performing communicationprocessing functions may comprise requesting encrypted communicationover an encrypted communication pathway of a network packet, the networkpackets comprising the port number and the assembled packet segment, theencrypted communication pathway having a one-to-one correspondence withthe port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving a datapacket having a payload and an associated destination port number; ii)identifying a preconfigured, predefined, pre-established and/orpreprovisioned port number, the port number having a one-to-onecorrespondence with the associated destination port number; iii)assembling a packet segment, the packet segment comprising the payload,an associated user-application identifier, and a payload data typedescriptor; and iv) requesting encrypted communication over an encryptedcommunication pathway of a network packet, the network packetscomprising the port number and the assembled packet segment, theencrypted communication pathway having a one-to-one correspondence withthe port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise verifyingthat the source ports are authorized to communicate with ports havingthe associated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseassembling packet segments, each one of the packet segments comprisingone of the payloads, an associated user-application identifier, and apayload data type descriptor. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers; ii) verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers; iii) assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all port-to-network communications of the plurality ofcomputing devices. In certain embodiments, for example, the performingcommunication processing functions may comprise receiving a data packetfrom a source port, the data packet having a payload and an associateddestination port number. In certain embodiments, for example, theperforming communication processing functions may comprise verifyingthat the source port is authorized to communicate with a port having theassociated destination port number. In certain embodiments, for example,the performing communication processing functions may compriseassembling a packet segment, the packet segments comprising the payload,an associated user-application identifier, and a payload data typedescriptor. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof a network packet through an encrypted communication pathway, thenetwork packets comprising the associated destination port number andthe assembled packet segment, the encrypted communication pathway havinga one-to-one correspondence with the associated destination port number.

In certain embodiments, for example, the transmitted network packet maybe exclusive of the destination port number associated with the receiveddata packet. In certain embodiments, for example, the payload in thetransmitted network packet may be re-associated with the destinationport number only after the transmitted network packet is received at asecond computing devices of the plurality of networked computingdevices, the second computing device different from the computingdevice. In certain embodiments, for example, the associated destinationport number may not be transmitted from the computing device to thesecond computing device of the plurality of networked computing devices.In certain embodiments, for example, the associated destination portnumber may not be transmitted across a network coupled to one or morecomputing devices of the plurality of networked computing devices. Incertain embodiments, for example, the associated destination port numbermay not be transmitted from the computing device via the network tunnel.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all port-to-networkcommunications of the plurality of computing devices, the performingcommunication processing functions comprising: i) receiving a datapacket from a source port, the data packet having a payload and anassociated destination port number; ii) verifying that the source portis authorized to communicate with a port having the associateddestination port number; iii) assembling a packet segment, the packetsegments comprising the payload, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of a network packet through an encrypted communicationpathway, the network packets comprising the associated destination portnumber and the assembled packet segment, the encrypted communicationpathway having a one-to-one correspondence with the associateddestination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: performing communication processingfunctions on at least a portion of network-to-port communications(including, for example, on all network-to-port communications) receivedby the plurality of computing devices. In certain embodiments, forexample, the performing communication processing functions may compriseobtaining tunnel port numbers, metadata (for example metadata encryptedusing a single-use cryptographic key), and payloads associated withnetwork packets. In certain embodiments, for example, the performingcommunication processing functions may comprise identifyingpreconfigured, predefined, pre-established and/or preprovisioneddestination port numbers and preconfigured, predefined, pre-establishedand/or preprovisioned authorization codes associated with the tunnelport numbers, each one of the authorization codes comprising apreconfigured, predefined, pre-established and/or preprovisioneduser-application process identifier and a preconfigured, predefined,pre-established and/or preprovisioned payload data-type identifierassociated with one of the obtained tunnel port numbers. In certainembodiments, for example, the performing communication processingfunctions may comprise authorizing the network packets, comprising:comparing (for example comparing in application spaces or kernel spacesof the plurality of computing devices) metadata with the authorizationcodes. In certain embodiments, for example, the performing communicationprocessing functions may comprise requesting transmission (for exampleacross loopback interfaces, by TUN/TAP interfaces, or by kernel readand/or write calls) of payloads from the authorized network packets todestinations referenced by the destination port numbers. In certainembodiments, for example, the payloads may be passed to the destinationport numbers by one or more loopback interfaces.

In certain embodiments, for example, the obtaining, identifying,authorizing, and requesting may be transparent to all user-applicationprocesses on the plurality of networked computing devices (for exampleby employing modified network application programming interfacefunctions (for example in a modified operating system) while maintainingstandard syntax). In certain embodiments, for example, the obtaining,identifying, authorizing, and requesting may be self-executing and/orautomatic (for example requiring no human intervention, no interruptionin computer execution other than ordinary, temporary processscheduling).

In certain embodiments, for example, the communication processingfunctions may be performed at 95% of wire speed or greater and less than10% of the processor load may be committed to network communications. Incertain embodiments, for example, the destinations may compriseuser-application processes. In certain embodiments, for example, theprogram code may be middleware positioned between the network and thedestinations referenced by the destination port number. In certainembodiments, for example, the communication processing functions mayfurther comprise: dropping network packets if they are not authorizedfollowing the comparing (for example dropping network packets for whichthe metadata does not match expected values based on the authorizationcodes).

In certain embodiments, for example, the communication processingfunctions may further comprise: setting connection status indicators toa non-operative state if more than a fixed number of network packets arenot authorized following the comparing. In certain embodiments, forexample, the communication processing functions may further comprise:checking, the checking at least partially performed in kernels of theplural networked computing devices, a connection status of the network.In certain embodiments, for example, the communication processingfunctions may further comprise: dropping network packets that arereceived via one or more network tunnels whose connection statusindicators are set to a non-operative state.

Certain embodiments may comprise, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all network-to-portcommunications received by the plurality of computing devices, theperforming communication processing functions comprising: i) obtainingtunnel port numbers, metadata, and payloads associated with networkpackets; ii) identifying preconfigured, predefined, pre-establishedand/or preprovisioned destination port numbers and preconfigured,predefined, pre-established and/or preprovisioned authorization codesassociated with the tunnel port numbers, each one of the authorizationcodes comprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the obtained tunnel port numbers; iii)authorizing the network packets, comprising: comparing at least aportion of the metadata with the authorization codes; and iv) requestingtransmission of payloads from the authorized network packets todestinations referenced by the destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all network-to-port communications received by theplurality of computing devices. In certain embodiments, for example, theperforming communication processing functions may comprise obtaining aport number, metadata, and a payload associated with a network packetreceived by the networked computing device. In certain embodiments, forexample, the performing communication processing functions may compriseidentifying a preconfigured, predefined, pre-established and/orpreprovisioned destination port number and a preconfigured, predefined,pre-established and/or preprovisioned authorization code associated withthe obtained port number, the authorization code comprising apreconfigured, predefined, pre-established and/or preprovisioneduser-application identifier and a preconfigured, predefined,pre-established and/or preprovisioned payload data-type identifierassociated with the obtained port number. In certain embodiments, forexample, the performing communication processing functions may compriseauthorizing the network packet, comprising: comparing the metadata withthe authorization code. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of the payload to a destination referenced by thedestination port number.

Certain embodiments may comprise, for example, a computer programproduct for managing communications of a plurality of networkedcomputing devices, the product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to enable and/or cause the computing device to performcommunication management operations, the communication managementoperations comprising: performing communication processing functions onall network-to-port communications received by the plurality ofcomputing devices, the performing communication processing functionscomprising: i) obtaining a port number, metadata, and a payloadassociated with a network packet received by the networked computingdevice; ii) identifying a preconfigured, predefined, pre-establishedand/or preprovisioned destination port number and a preconfigured,predefined, pre-established and/or preprovisioned authorization codeassociated with the obtained port number, the authorization codecomprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with the obtained port number; iii) authorizingthe network packet, comprising: comparing the metadata with theauthorization code; and iv) requesting transmission of the payload to adestination referenced by the destination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: performing communication processingfunctions on at least a portion of network-to-port communications(including, for example, on all network-to-port communications) receivedby the plurality of computing devices. In certain embodiments, forexample, the performing communication processing functions may compriseobtaining destination port numbers, metadata, and payloads associatedwith network packets. In certain embodiments, for example, theperforming communication processing functions may comprise identifyingpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes associated with the destination port numbers, eachone of the authorization codes comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with one of the destination portnumbers. In certain embodiments, for example, the performingcommunication processing functions may comprise authorizing the networkpackets, comprising: comparing at least a portion of the metadata withthe authorization codes. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of payloads from the authorized network packets todestinations referenced by the destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable by a computing device toenable and/or cause the computing device to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allnetwork-to-port communications received by the plurality of computingdevices, the performing communication processing functions comprising:i) obtaining destination port numbers, metadata, and payloads associatedwith network packets; ii) identifying preconfigured, predefined,pre-established and/or preprovisioned authorization codes associatedwith the destination port numbers, each one of the authorization codescomprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the destination port numbers; iii)authorizing the network packets, comprising: comparing at least aportion of the metadata with the authorization codes; and iv) requestingtransmission of payloads from the authorized network packets todestinations referenced by the destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise performing communication processingfunctions on all network-to-port communications received by theplurality of computing devices. In certain embodiments, for example, theperforming communication processing functions may comprise obtaining aport number, metadata, and a payload associated with a network packetreceived by the networked computing device. In certain embodiments, forexample, the performing communication processing functions may compriseidentifying a preconfigured, predefined, pre-established and/orpreprovisioned destination port number and a preconfigured, predefined,pre-established and/or preprovisioned authorization code associated withthe obtained port number, the authorization code comprising apreconfigured, predefined, pre-established and/or preprovisioneduser-application identifier and a preconfigured, predefined,pre-established and/or preprovisioned payload data-type identifierassociated with the obtained port number. In certain embodiments, forexample, the performing communication processing functions may compriseauthorizing the network packet, comprising: comparing the metadata withthe authorization code. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of the payload to a destination referenced by thepreconfigured, predefined, pre-established and/or preprovisioneddestination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to enable and/orcause the computing device to perform communication managementoperations, the communication management operations comprising:performing communication processing functions on all network-to-portcommunications received by the plurality of computing devices, theperforming communication processing functions comprising: i) obtaining aport number, metadata, and a payload associated with a network packetreceived by the networked computing device; ii) identifying apreconfigured, predefined, pre-established and/or preprovisioneddestination port number and a preconfigured, predefined, pre-establishedand/or preprovisioned authorization code associated with the obtainedport number, the authorization code comprising a preconfigured,predefined, pre-established and/or preprovisioned user-applicationidentifier and a preconfigured, predefined, pre-established and/orpreprovisioned payload data-type identifier associated with the obtainedport number; iii) authorizing the network packet, comprising: comparingthe metadata with the authorization code; and iv) requestingtransmission of the payload to a destination referenced by thepreconfigured, predefined, pre-established and/or preprovisioneddestination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having a plurality of computer-readableprogram code embodied therein, the plurality of computer-readableprogram code for distributed execution across the plurality of networkedcomputing devices to cooperatively enable and/or cause the plurality ofnetworked computing devices to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise negotiating, on a first computingdevice, a first data pathway between a first user-application and afirst network security program code of the plurality ofcomputer-readable program code. In certain embodiments, for example, thecommunication management operations may comprise negotiating, on asecond computing device, a second data pathway between a second networksecurity program of the plurality of computer-readable program code anda second user-application. In certain embodiments, for example, thecommunication management operations may comprise negotiating a thirddata pathway between the first network security program and the secondnetwork security program, the third data pathway comprising an encryptednetwork tunnel, each of the first data pathway, second data pathway, andthird data pathway participate to form at least a part of a dedicateddata pathway for exclusively communicating data from a first port of thefirst user-application to a second port of the second user-application.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving a plurality of computer-readable program code embodied therein,the plurality of computer-readable program code for distributedexecution across the plurality of networked computing devices tocooperatively enable and/or cause the plurality of networked computingdevices to perform communication management operations, thecommunication management operations comprising: i) negotiating, on afirst computing device, a first data pathway between a firstuser-application and a first network security program code of theplurality of computer-readable program code; ii) negotiating, on asecond computing device, a second data pathway between a second networksecurity program of the plurality of computer-readable program code anda second user-application; and iii) negotiating a third data pathwaybetween the first network security program and the second networksecurity program, the third data pathway comprising an encrypted networktunnel, each of the first data pathway, second data pathway, and thirddata pathway participate to form at least a part of a dedicated datapathway for exclusively communicating data from a first port of thefirst user-application to a second port of the second user-application.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having a plurality of computer-readableprogram code embodied therein, the plurality of computer-readableprogram code for distributed execution across the plurality of networkedcomputing devices to cooperatively enable and/or cause the plurality ofnetworked computing devices to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise negotiating, on a first computingdevice, a first data pathway between a first user-application and afirst network security program of the plural security programs. Incertain embodiments, for example, the communication managementoperations may comprise negotiating, on a second computing device, asecond data pathway between a second network security program of theplural security programs and a second user-application. In certainembodiments, for example, the communication management operations maycomprise negotiating a third data pathway between the first networksecurity program and the second network security program, the third datapathway comprising an encrypted communication pathway, each of the firstdata pathway, second data pathway, and third data pathway exclusive to adedicated data pathway for communicating data from a first port of thefirst user-application to a second port of the second user-application.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving a plurality of computer-readable program code embodied therein,the plurality of computer-readable program code for distributedexecution across the plurality of networked computing devices tocooperatively enable and/or cause the plurality of networked computingdevices to perform communication management operations, thecommunication management operations comprising: i) negotiating, on afirst computing device, a first data pathway between a firstuser-application and a first network security program of the pluralsecurity programs; ii) negotiating, on a second computing device, asecond data pathway between a second network security program of theplural security programs and a second user-application; iii) negotiatinga third data pathway between the first network security program and thesecond network security program, the third data pathway comprising anencrypted communication pathway, each of the first data pathway, seconddata pathway, and third data pathway exclusive to a dedicated datapathway for communicating data from a first port of the firstuser-application to a second port of the second user-application.

Certain embodiments may provide, for example, a secured system,comprising: i) a first node networked with a second node, the first nodehosting a first application program, the second node hosting a secondapplication program; and ii) plural network security programscooperatively configured according to plural configuration files tonegotiate one or plural dedicated data pathways for all communicationsbetween the first application program and the second applicationprogram, each of the one or plural data pathways comprising: anencrypted network tunnel extending from a first network security programof the plural network security programs to a second network securityprogram of the plural network security programs, the first networksecurity program and the second network security program interposedbetween the first application program and the second applicationprogram; each of the plural configuration files comprising: a) one orplural destination port numbers associated with the second applicationprogram; b) one or plural destination port numbers associated with thesecond network security program, comprising at least one port number foreach one of the one or plural destination port numbers associated withthe second application program; c) one or plural first user-applicationidentifiers associated with the first application program; d) one orplural second user-application identifiers associated with the secondapplication program; e) one or plural data type identifiers; and f) nodeidentification codes for the first node and the second node, processor,or computing device.

Certain embodiments may provide, for example, a secured system,comprising: i) a first node networked with a second node, the first nodehosting a first application program, the second node hosting a secondapplication program; and ii) plural network security programscooperatively configured according to plural configuration files tonegotiate one or plural dedicated data pathways for all communicationsbetween the first application program and the second applicationprogram, each of the one or plural data pathways comprising: anencrypted communication pathway extending from a first network securityprogram of the plural network security programs to a second networksecurity program of the plural network security programs, the firstnetwork security program and the second network security programinterposed between the first application program and the secondapplication program; each of the plural configuration files comprising:a) one or plural destination port numbers associated with the secondapplication program; b) one or plural first user-application identifiersassociated with the first application program; c) one or plural seconduser-application identifiers associated with the second applicationprogram; d) one or plural data type identifiers; and e) nodeidentification codes for the first node and the second node, processor,or computing device.

Certain embodiments may provide, for example, a secured system,comprising: i) a first node networked with a second node, a) the firstnode hosting a first application program, a first configuration file anda first network security program associated with the first configurationfile; and b) the second node hosting a second application program, asecond configuration file, and a second network security programassociated with the second configuration file; and ii) the first andsecond network security programs cooperatively configured to negotiateone or plural dedicated data pathways for all communications between thefirst application program and the second application program, a) each ofthe one or plural data pathways comprising the first network securityprogram and the second network security program interposed between thefirst application program and the second application program; and b)each of the one or plural data pathways comprising: an encrypted networktunnel between the first network security program and the second networksecurity program, each of the plural configuration files comprising atleast one of the following: a) one or plural destination port numbersassociated with the second application program; b) one or pluraldestination port numbers associated with the second network securityprogram, comprising at least one port number for each one of the one orplural destination port numbers associated with the second applicationprogram; c) one or plural first user-application identifiers associatedwith the first application program; d) one or plural seconduser-application identifiers associated with the second applicationprogram; e) one or plural data type identifiers; and f) nodeidentification codes for the first node and the second node, processor,or computing device.

Certain embodiments may provide, for example, a secured system,comprising: i) a first node networked with a second node, a) the firstnode hosting a first application program, a first configuration file anda first network security program associated with the first configurationfile; and b) the second node hosting a second application program, asecond configuration file, and a second network security programassociated with the second configuration file; and ii) the first andsecond network security programs cooperatively configured to negotiateone or plural dedicated data pathways for all communications between thefirst application program and the second application program, a) each ofthe one or plural data pathways comprising the first network securityprogram and the second network security program interposed between thefirst application program and the second application program; and b)each of the one or plural data pathways comprising: an encrypted datapathway between the first network security program and the secondnetwork security program, each of the plural configuration filescomprising at least one of the following: a) one or plural destinationport numbers associated with the second application program; b) one orplural first user-application identifiers associated with the firstapplication program; c) one or plural second user-applicationidentifiers associated with the second application program; d) one orplural data type identifiers; and e) node identification codes for thefirst node and the second node, processor, or computing device.

Certain embodiments may provide, for example, a product for managingcommunications in a cloud, the product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to enable and/or cause the computing device to performcommunication management operations. In certain embodiments, forexample, the communication management operations may comprise performingcommunication processing functions on all network-to-port communicationsreceived by a virtual machine. In certain embodiments, for example, theperforming communication processing functions may comprise obtainingport numbers, metadata, and payloads associated with network packets. Incertain embodiments, for example, the performing communicationprocessing functions may comprise identifying predefined destinationport numbers and predefined authorization codes associated with theobtained port numbers, each one of the predefined authorization codescomprising a predefined user-application identifier and a predefinedpayload data-type identifier associated with one of the obtained portnumbers. In certain embodiments, for example, the performingcommunication processing functions may comprise authorizing the networkpackets, comprising: comparing at least a portion of the metadata withthe predefined authorization codes. In certain embodiments, for example,the performing communication processing functions may compriserequesting transmission of payloads from the authorized network packetsto cloud resources referenced by the predefined destination portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications in a cloud, the product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to enable and/or cause the computing device to performcommunication management operations, the communication managementoperations comprising: performing communication processing functions onall network-to-port communications received by a virtual machine, theperforming communication processing functions comprising: i) obtainingport numbers, metadata, and payloads associated with network packets;ii) identifying predefined destination port numbers and predefinedauthorization codes associated with the obtained port numbers, each oneof the predefined authorization codes comprising a predefineduser-application identifier and a predefined payload data-typeidentifier associated with one of the obtained port numbers; iii)authorizing the network packets, comprising: comparing at least aportion of the metadata with the predefined authorization codes; and iv)requesting transmission of payloads from the authorized network packetsto cloud resources referenced by the predefined destination portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting network connection requests (for example bynetwork application programming interfaces) having associateddestination port numbers. In certain embodiments, for example, themethod may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned tunnel port numbers (for examplepredefined tunnel port numbers associated with servers), comprisingidentifying at least one (for example, one) preconfigured, predefined,pre-established and/or preprovisioned tunnel port number for eachassociated destination port number of the associated destination portnumbers. In certain embodiments, for example, the method may compriserequesting the negotiation of network tunnels, the requesting comprisingsending connection request packets comprising the tunnel port numbers(and also, for example, cipher suite parameters), each one of thenetwork tunnels having a one-to-one correspondence with one of thetunnel port numbers. In certain embodiments, for example, the method maycomprise authorizing the network tunnels, comprising comparing computingdevice identifiers, user-application identifiers (for exampleuser-application identifiers derived from application processidentifiers and/or application process owners, together or in parts),and payload data-type identifiers received from the network tunnels withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes. In certain further embodiments, for example, thecomputing device identifiers, user-application identifiers, and/orpayload data-type identifiers may be encrypted and require decryptionbefore the comparing.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting network connection requestshaving associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisioned tunnelport numbers, comprising identifying at least one tunnel port number foreach associated destination port number of the associated destinationport numbers; iii) requesting the negotiation of network tunnels, therequesting comprising sending connection request packets comprising thetunnel port numbers, each one of the network tunnels having a one-to-onecorrespondence with one of the tunnel port numbers; and iv) authorizingthe network tunnels, comprising comparing computing device identifiers,user-application identifiers, and payload data-type identifiers receivedfrom the network tunnels with preconfigured, predefined, pre-establishedand/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting a network connection request having an associateddestination port number. In certain embodiments, for example, the methodmay comprise identifying a preconfigured, predefined, pre-establishedand/or preprovisioned tunnel port number associated with the destinationport number. In certain embodiments, for example, the method maycomprise requesting the forming of a network tunnel, the formingcomprising sending a connection request packet comprising the tunnelport number. In certain embodiments, for example, the method maycomprise authorizing the network tunnel, comprising comparing acomputing device identifier, a user-application identifier, and apayload data-type identifier received from the network tunnel with apreconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting a network connection requesthaving an associated destination port number; ii) identifying apreconfigured, predefined, pre-established and/or preprovisioned tunnelport number associated with the destination port number; iii) requestingthe forming of a network tunnel, the forming comprising sending aconnection request packet comprising the tunnel port number; and iv)authorizing the network tunnel, comprising comparing a computing deviceidentifier, a user-application identifier, and a payload data-typeidentifier received from the network tunnel with a preconfigured,predefined, pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting network connection requests from source ports (forexample the source ports may comprise ports associated withuser-application processes), the requests having associated destinationport numbers. In certain embodiments, for example, the method maycomprise verifying that the source ports are authorized to communicatewith ports having the associated destination port numbers. In certainembodiments, for example, the method may comprise requesting thenegotiation of network tunnels, comprising sending connection requestpackets comprising the associated destination port numbers, each one ofthe network tunnels having a one-to-one correspondence with one of theassociated destination port numbers. In certain embodiments, forexample, the method may comprise authorizing the network tunnels,comprising comparing computing device identifiers, user-applicationidentifiers, and/or payload data-type identifiers received from thenetwork tunnels with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes. In certain further embodiments, forexample, the computing device identifiers, user-application identifiers,and/or payload data-type identifiers may be encrypted and requiredecryption before the comparing.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting network connection requestsfrom source ports, the requests having associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) requesting the negotiation of network tunnels, comprising sendingconnection request packets comprising the associated destination portnumbers, each one of the network tunnels having a one-to-onecorrespondence with one of the associated destination port numbers; andiv) authorizing the network tunnels, comprising comparing computingdevice identifiers, user-application identifiers, and payload data-typeidentifiers received from the network tunnels with preconfigured,predefined, pre-established and/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting network connection requests having associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned encrypted communication portnumbers, comprising identifying at least one preconfigured, predefined,pre-established and/or preprovisioned encrypted communication portnumber for each associated destination port number of the associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of encryptedcommunication pathways, the requesting comprising sending connectionrequest packets comprising the encrypted communication port numbers,each one of the encrypted communication pathways having a one-to-onecorrespondence with one of the encrypted communication port numbers. Incertain embodiments, for example, the establishing may compriseauthorizing the encrypted communication pathways, comprising comparingcomputing device identifiers, user-application identifiers, and/orpayload data-type identifiers received from the encrypted communicationpathways with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting network connection requestshaving associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port numbers, comprising identifying at leastone preconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number for each associated destination portnumber of the associated destination port numbers; iii) requesting thenegotiation of encrypted communication pathways, the requestingcomprising sending connection request packets comprising the encryptedcommunication port numbers, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the encryptedcommunication port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing computing deviceidentifiers, user-application identifiers, and payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise establishing authorized encryptedcommunication pathways for at least one port-to-port networkcommunication (including, for example, all port-to-port networkcommunications) among the plurality of networked computing devices. Incertain embodiments, for example, the establishing may compriseintercepting network connection requests from source ports (for examplesource ports that have been opened by and have a predeterminedrelationship with authorized applications), the requests havingassociated destination port numbers. In certain embodiments, forexample, the method may comprise verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers. In certain embodiments, for example, the method maycomprise requesting the negotiation of encrypted communication pathways,the requesting comprising sending connection request packets comprisingthe associated destination port numbers. In certain embodiments, forexample, the method may comprise authorizing the encrypted communicationpathways, comprising comparing computing device identifiers,user-application identifiers, and/or payload data-type identifiersreceived from the encrypted communication pathways with preconfigured,predefined, pre-established and/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting network connection requestsfrom source ports, the requests having associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) requesting the negotiation of encrypted communication pathways, therequesting comprising sending connection request packets comprising theassociated destination port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing computing deviceidentifiers, user-application identifiers, and payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting a network connection request from a source port,the request having an associated destination port number. In certainembodiments, for example, the method may comprise verifying that thesource port is authorized to communicate with a port having theassociated destination port number. In certain embodiments, for example,the method may comprise may comprise requesting the negotiation of anetwork tunnel, comprising sending a connection request packetcomprising the associated destination port number. In certainembodiments, for example, the method may comprise authorizing thenetwork tunnel, comprising comparing a computing device identifiers, auser-application identifier, and a payload data-type identifier receivedfrom the network tunnel with a preconfigured, predefined,pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting a network connection requestfrom a source port, the request having an associated destination portnumber; ii) verifying that the source port is authorized to communicatewith a port having the associated destination port number; iii)requesting the negotiation of a network tunnel, comprising sending aconnection request packet comprising the associated destination portnumber; and iv) authorizing the network tunnel, comprising comparing acomputing device identifiers, a user-application identifier, and apayload data-type identifier received from the network tunnel with apreconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting a network connection request having an associateddestination port number. In certain embodiments, for example, the methodmay comprise identifying a preconfigured, predefined, pre-establishedand/or preprovisioned encrypted communication port number associatedwith the destination port number. In certain embodiments, for example,the method may comprise requesting the negotiation of an encryptedcommunication pathway, the requesting comprising sending a connectionrequest packet comprising the encrypted communication port number. Incertain embodiments, for example, the method may comprise authorizingthe encrypted communication pathway, comprising comparing a computingdevice identifier, a user-application identifier, and a payloaddata-type identifier received from the encrypted communication pathwaywith a preconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting a network connection requesthaving an associated destination port number; ii) identifying apreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number associated with the destination portnumber; iii) requesting the negotiation of an encrypted communicationpathway, the requesting comprising sending a connection request packetcomprising the encrypted communication port number; and iv) authorizingthe encrypted communication pathway, comprising comparing a computingdevice identifier, a user-application identifier, and a payloaddata-type identifier received from the encrypted communication pathwaywith a preconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise intercepting a network connection request from a source port,the request having an associated destination port number. In certainembodiments, for example, the method may comprise verifying that thesource port is authorized to communicate with a port having theassociated destination port number. In certain embodiments, for example,the method may comprise requesting the negotiation of an encryptedcommunication pathway, the requesting comprising sending a connectionrequest packet comprising the associated destination port number. Incertain embodiments, for example, the method may comprise authorizingthe encrypted communication pathway, comprising comparing a computingdevice identifier, a user-application identifier, and a payloaddata-type identifier received from the encrypted communication pathwaywith a preconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) intercepting a network connection requestfrom a source port, the request having an associated destination portnumber; ii) verifying that the source port is authorized to communicatewith a port having the associated destination port number; iii)requesting the negotiation of an encrypted communication pathway, therequesting comprising sending a connection request packet comprising theassociated destination port number; and iv) authorizing the encryptedcommunication pathway, comprising comparing a computing deviceidentifier, a user-application identifier, and a payload data-typeidentifier received from the encrypted communication pathway with apreconfigured, predefined, pre-established and/or preprovisionedauthorization code.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise receiving data packets(for example from a user-application process via a loopback interface)having payloads and associated destination port numbers (the associateddestination port numbers may include, for example, a destination portnumber associated with a destination port of a network securityprocess). In certain embodiments, for example, the method may compriseidentifying preconfigured, predefined, pre-established and/orpreprovisioned tunnel port numbers, each one of the tunnel port numbershaving a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, themethod may comprise assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationprocess identifier, and a payload data type descriptor. In certainembodiments, for example, the associated user-application processidentifier may comprise a process identifier and/or a process owner. Incertain embodiments, for example, the associated user-applicationprocess identifier, and a payload data type descriptor may be combined(or concatenated) in a metadata portion of the packet segment. Incertain embodiments, for example, the metadata may be encrypted, forexample by a single-use cryptographic key. In certain embodiments, forexample, the method may comprise requesting transmission of networkpackets through network tunnels (for example at least a differentnetwork tunnel for each application-to-application communication of aspecified data protocol type), each one of the network packetscomprising a tunnel port number of one of the tunnel port numbers andone of the assembled packet segments, each one of the network tunnelshaving a one-to-one correspondence with one of the tunnel port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets having payloadsand associated destination port numbers; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned tunnel port numbers,each one of the tunnel port numbers having a one-to-one correspondencewith one of the associated destination port numbers; iii) assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application process identifier, and apayload data type descriptor; and iv) requesting transmission of networkpackets through network tunnels, each one of the network packetscomprising a tunnel port number of one of the tunnel port numbers andone of the assembled packet segments, each one of the network tunnelshaving a one-to-one correspondence with one of the tunnel port numbers.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise receiving a datapacket having a payload and an associated destination port number. Incertain embodiments, for example, the method may comprise identifying apreconfigured, predefined, pre-established and/or preprovisioned tunnelport number associated with the destination port number. In certainembodiments, for example, the method may comprise assembling a packetsegment, the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the method may comprise requestingtransmission of a network packet through a network tunnel, the networkpacket comprising the tunnel port number and the assembled packetsegment, the network tunnel having a one-to-one correspondence with thetunnel port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving a data packet having a payloadand an associated destination port number; ii) identifying apreconfigured, predefined, pre-established and/or preprovisioned tunnelport number associated with the destination port number; iii) assemblinga packet segment, the packet segment comprising the payload, anassociated user-application identifier, and a payload data typedescriptor; and iv) requesting transmission of a network packet througha network tunnel, the network packet comprising the tunnel port numberand the assembled packet segment, the network tunnel having a one-to-onecorrespondence with the tunnel port number.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets from source ports, the data packetshaving payloads and associated destination port numbers. In certainembodiments, for example, the method may comprise verifying that thesource ports are authorized to communicate with ports having theassociated destination port numbers. In certain embodiments, forexample, the method may comprise assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the method may comprise requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets from source ports,the data packets having payloads and associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets having payloads and associateddestination port numbers. In certain embodiments, for example, themethod may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, themethod may comprise assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor. In certain embodiments,for example, the method may comprise requesting transmission of networkpackets through encrypted communication pathways, each one of thenetwork packets comprising a port number of one of the port numbers andone of the assembled packet segments, each one of the encryptedcommunication pathways having a one-to-one correspondence with one ofthe port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets having payloadsand associated destination port numbers; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned port numbers, each oneof the port numbers having a one-to-one correspondence with one of theassociated destination port numbers; iii) assembling packet segments,each one of the packet segments comprising one of the payloads, anassociated user-application identifier, and a payload data typedescriptor; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets, the data packets comprising messagesand associated destination port numbers. In certain embodiments, forexample, the method may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, themethod may comprise may comprise assembling packet segments, each one ofthe packet segments comprising at least a portion of one of themessages, an associated user-application identifier, and a payload datatype descriptor. In certain embodiments, for example, the method maycomprise requesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising aport number of one of the port numbers and one of the assembled packetsegments, each one of the encrypted communication pathways having aone-to-one correspondence with one of the port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets, the data packetscomprising messages and associated destination port numbers; ii)identifying preconfigured, predefined, pre-established and/orpreprovisioned port numbers, each one of the port numbers having aone-to-one correspondence with one of the associated destination portnumbers; iii) assembling packet segments, each one of the packetsegments comprising at least a portion of one of the messages, anassociated user-application identifier, and a payload data typedescriptor; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets, the data packets comprising messagesand associated destination port numbers, the messages comprisinguser-application identifiers and payload data type descriptors. Incertain embodiments, for example, the method may comprise identifyingpreconfigured, predefined, pre-established and/or preprovisioned portnumbers, each one of the port numbers having a one-to-one correspondencewith one of the associated destination port numbers. In certainembodiments, for example, the method may comprise assembling packetsegments, each one of the packet segments comprising at least a portionof one of the messages, the at least a portion of one of the messagescomprising one of the user-application identifiers and one of thepayload data type descriptors. In certain embodiments, for example, themethod may comprise requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets, the data packetscomprising messages and associated destination port numbers, themessages comprising user-application identifiers and payload data typedescriptors; ii) identifying preconfigured, predefined, pre-establishedand/or preprovisioned port numbers, each one of the port numbers havinga one-to-one correspondence with one of the associated destination portnumbers; iii) assembling packet segments, each one of the packetsegments comprising at least a portion of one of the messages, the atleast a portion of one of the messages comprising one of theuser-application identifiers and one of the payload data typedescriptors; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets from source ports, the data packetshaving payloads and associated destination port numbers. In certainembodiments, for example, the method may comprise verifying that thesource ports are authorized to communicate with ports having theassociated destination port numbers. In certain embodiments, forexample, the method may comprise assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the method may comprise requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets from source ports,the data packets having payloads and associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets from source ports, the data packetshaving payloads and associated destination port numbers. In certainembodiments, for example, the method may comprise verifying that thesource ports are authorized to communicate with ports having theassociated destination port numbers. In certain embodiments, forexample, the method may comprise assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor. Incertain embodiments, for example, the method may comprise requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets from source ports,the data packets having payloads and associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving a data packet from a source port, the data packethaving a payload and an associated destination port number. In certainembodiments, for example, the method may comprise verifying that thesource port is authorized to communicate with a port having theassociated destination port number. In certain embodiments, for example,the method may comprise assembling a packet segment, the packet segmentcomprising the payload, an associated user-application identifier, and apayload data type descriptor. In certain embodiments, for example, themethod may comprise requesting transmission of a network packet througha network tunnel, the network packet comprising the associateddestination port numbers and the assembled packet segment, the networktunnels having a one-to-one correspondence with the associateddestination port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving a data packet from a sourceport, the data packet having a payload and an associated destinationport number; ii) verifying that the source port is authorized tocommunicate with a port having the associated destination port number;iii) assembling a packet segment, the packet segment comprising thepayload, an associated user-application identifier, and a payload datatype descriptor, and iv) requesting transmission of a network packetthrough a network tunnel, the network packet comprising the associateddestination port numbers and the assembled packet segment, the networktunnels having a one-to-one correspondence with the associateddestination port number.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise receiving data packets having payloads and associateddestination port numbers. In certain embodiments, for example, themethod may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned port numbers, each one of the portnumbers having a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, themethod may comprise assembling packet segments, each one of the packetsegments comprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor. In certain embodiments,for example, the method may comprise requesting transmission of networkpackets through encrypted communication pathways, each one of thenetwork packets comprising a port number of one of the port numbers andone of the assembled packet segments, each one of the encryptedcommunication pathways having a one-to-one correspondence with one ofthe port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets having payloadsand associated destination port numbers; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned port numbers, each oneof the port numbers having a one-to-one correspondence with one of theassociated destination port numbers; iii) assembling packet segments,each one of the packet segments comprising one of the payloads, anassociated user-application identifier, and a payload data typedescriptor; and iv) requesting transmission of network packets throughencrypted communication pathways, each one of the network packetscomprising a port number of one of the port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise receiving a datapacket having a payload and an associated destination port number. Incertain embodiments, for example, the method may comprise identifying apreconfigured, predefined, pre-established and/or preprovisioned portnumber, the port number having a one-to-one correspondence with theassociated destination port number. In certain embodiments, for example,the method may comprise assembling a packet segment, the packet segmentcomprising the payload, an associated user-application identifier, and apayload data type descriptor. In certain embodiments, for example, themethod may comprise requesting encrypted communication over an encryptedcommunication pathway of a network packet, the network packetscomprising the port number and the assembled packet segment, theencrypted communication pathway having a one-to-one correspondence withthe port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving a data packet having a payloadand an associated destination port number; ii) identifying apreconfigured, predefined, pre-established and/or preprovisioned portnumber, the port number having a one-to-one correspondence with theassociated destination port number; iii) assembling a packet segment,the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting encrypted communication over an encrypted communicationpathway of a network packet, the network packets comprising the portnumber and the assembled packet segment, the encrypted communicationpathway having a one-to-one correspondence with the port number.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise receiving data packetsfrom source ports, the data packets having payloads and associateddestination port numbers. In certain embodiments, for example, themethod may comprise verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers.In certain embodiments, for example, the method may comprise assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor. In certain embodiments, for example, the method maycomprise requesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising aport number of one of the associated destination port numbers and one ofthe assembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the associateddestination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving data packets from source ports,the data packets having payloads and associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) assembling packet segments, each one of the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise receiving a datapacket from a source port, the data packet having a payload and anassociated destination port number. In certain embodiments, for example,the method may comprise verifying that the source port is authorized tocommunicate with a port having the associated destination port number.In certain embodiments, for example, the method may comprise assemblinga packet segment, the packet segments comprising the payload, anassociated user-application identifier, and a payload data typedescriptor. In certain embodiments, for example, the method may compriserequesting transmission of a network packet through an encryptedcommunication pathway, the network packets comprising the associateddestination port number and the assembled packet segment, the encryptedcommunication pathway having a one-to-one correspondence with theassociated destination port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) receiving a data packet from a sourceport, the data packet having a payload and an associated destinationport number; ii) verifying that the source port is authorized tocommunicate with a port having the associated destination port number;iii) assembling a packet segment, the packet segments comprising thepayload, an associated user-application identifier, and a payload datatype descriptor; and iv) requesting transmission of a network packetthrough an encrypted communication pathway, the network packetscomprising the associated destination port number and the assembledpacket segment, the encrypted communication pathway having a one-to-onecorrespondence with the associated destination port number.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise obtaining port numbers, metadata (for example metadataencrypted using a single-use cryptographic key), and payloads associatedwith network packets. In certain embodiments, for example, the methodmay comprise identifying preconfigured, predefined, pre-establishedand/or preprovisioned destination port numbers and preconfigured,predefined, pre-established and/or preprovisioned authorization codesassociated with the obtained port numbers, each one of the authorizationcodes comprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application process identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the obtained port numbers. In certainembodiments, for example, the method may comprise authorizing thenetwork packets, comprising: comparing (for example comparing inapplication spaces or kernel spaces of the plurality of computingdevices) metadata with the authorization codes. In certain embodiments,for example, the method may comprise requesting transmission (forexample across loopback interfaces, by TUN/TAP interfaces, or by kernelread and/or write calls) of payloads from the authorized network packetsto destinations referenced by the destination port numbers. In certainembodiments, for example, the payloads may be passed to the destinationport numbers by one or more loopback interfaces.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: performing communication processingfunctions on all network-to-port communications received by theplurality of computing devices, the performing communication processingfunctions comprising: i) obtaining port numbers, metadata, and payloadsassociated with network packets; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned destination portnumbers and preconfigured, predefined, pre-established and/orpreprovisioned authorization codes associated with the obtained portnumbers, each one of the authorization codes comprising a preconfigured,predefined, pre-established and/or preprovisioned user-applicationidentifier and a preconfigured, predefined, pre-established and/orpreprovisioned payload data-type identifier associated with one of theobtained port numbers; iii) authorizing the network packets, comprising:comparing at least a portion of the metadata with the authorizationcodes; and iv) requesting transmission of payloads from the authorizednetwork packets to destinations referenced by the destination portnumbers.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise obtaining a port number, metadata, and a payload associatedwith a network packet received by the networked computing device. Incertain embodiments, for example, the method may comprise identifying apreconfigured, predefined, pre-established and/or preprovisioneddestination port number and a preconfigured, predefined, pre-establishedand/or preprovisioned authorization code associated with the obtainedport number, the authorization code comprising a preconfigured,predefined, pre-established and/or preprovisioned user-applicationidentifier and a preconfigured, predefined, pre-established and/orpreprovisioned payload data-type identifier associated with the obtainedport number. In certain embodiments, for example, the method maycomprise authorizing the network packet, comprising: comparing themetadata with the authorization code. In certain embodiments, forexample, the method may comprise requesting transmission of the payloadto a destination referenced by the destination port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) obtaining a port number, metadata, and apayload associated with a network packet received by the networkedcomputing device; ii) identifying a preconfigured, predefined,pre-established and/or preprovisioned destination port number and apreconfigured, predefined, pre-established and/or preprovisionedauthorization code associated with the obtained port number, theauthorization code comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with the obtained port number; iii)authorizing the network packet, comprising: comparing the metadata withthe authorization code; and iv) requesting transmission of the payloadto a destination referenced by the destination port number.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise obtaining destination port numbers, metadata, and payloadsassociated with network packets. In certain embodiments, for example,the method may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned authorization codes associatedwith the destination port numbers, each one of the authorization codescomprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the destination port numbers. Incertain embodiments, for example, the method may comprise authorizingthe network packets, comprising: comparing at least a portion of themetadata with the authorization codes. In certain embodiments, forexample, the method may comprise requesting transmission of payloadsfrom the authorized network packets to destinations referenced by thedestination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) obtaining destination port numbers,metadata, and payloads associated with network packets; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes associated with the destination port numbers, eachone of the authorization codes comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with one of the destination portnumbers; iii) authorizing the network packets, comprising: comparing atleast a portion of the metadata with the authorization codes; and iv)requesting transmission of payloads from the authorized network packetsto destinations referenced by the destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the method may comprise obtaining a portnumber, metadata, and a payload associated with a network packetreceived by the networked computing device. In certain embodiments, forexample, the method may comprise identifying a preconfigured,predefined, pre-established and/or preprovisioned destination portnumber and a preconfigured, predefined, pre-established and/orpreprovisioned authorization code associated with the obtained portnumber, the authorization code comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with the obtained port number. Incertain embodiments, for example, the method may comprise authorizingthe network packet, comprising: comparing the metadata with theauthorization code. In certain embodiments, for example, the method maycomprise requesting transmission of the payload to a destinationreferenced by the preconfigured, predefined, pre-established and/orpreprovisioned destination port number.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) obtaining a port number, metadata, and apayload associated with a network packet received by the networkedcomputing device; ii) identifying a preconfigured, predefined,pre-established and/or preprovisioned destination port number and apreconfigured, predefined, pre-established and/or preprovisionedauthorization code associated with the obtained port number, theauthorization code comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with the obtained port number; iii)authorizing the network packet, comprising: comparing the metadata withthe authorization code; and iv) requesting transmission of the payloadto a destination referenced by the preconfigured, predefined,pre-established and/or preprovisioned destination port number.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise negotiating, on a first computing device, a first data pathwaybetween a first user-application and a first network security programcode of a plurality of computer-readable program code. In certainembodiments, for example, the method may comprise negotiating, on asecond computing device, a second data pathway between a second networksecurity program of the plurality of computer-readable program code anda second user-application. In certain embodiments, for example, themethod may comprise negotiating a third data pathway between the firstnetwork security program and the second network security program, thethird data pathway comprising an encrypted network tunnel, each of thefirst data pathway, second data pathway, and third data pathwayparticipate to form at least a part of a dedicated data pathway forexclusively communicating data from a first port of the firstuser-application to a second port of the second user-application.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) negotiating, on a first computing device,a first data pathway between a first user-application and a firstnetwork security program code of a plurality of computer-readableprogram code; ii) negotiating, on a second computing device, a seconddata pathway between a second network security program of the pluralityof computer-readable program code and a second user-application; andiii) negotiating a third data pathway between the first network securityprogram and the second network security program, the third data pathwaycomprising an encrypted network tunnel, each of the first data pathway,second data pathway, and third data pathway participate to form at leasta part of a dedicated data pathway for exclusively communicating datafrom a first port of the first user-application to a second port of thesecond user-application.

Certain embodiments may provide, for example, a method for managingcommunications. In certain embodiments, for example, the method maycomprise negotiating, on a first computing device, a first data pathwaybetween a first user-application and a first network security program ofplural security programs. In certain embodiments, for example, themethod may comprise negotiating, on a second computing device, a seconddata pathway between a second network security program of the pluralsecurity programs and a second user-application. In certain embodiments,for example, the method may comprise negotiating a third data pathwaybetween the first network security program and the second networksecurity program, the third data pathway comprising an encryptedcommunication pathway, each of the first data pathway, second datapathway, and third data pathway exclusive to a dedicated data pathwayfor communicating data from a first port of the first user-applicationto a second port of the second user-application.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) negotiating, on a first computing device,a first data pathway between a first user-application and a firstnetwork security program of plural security programs; ii) negotiating,on a second computing device, a second data pathway between a secondnetwork security program of the plural security programs and a seconduser-application; iii) negotiating a third data pathway between thefirst network security program and the second network security program,the third data pathway comprising an encrypted communication pathway,each of the first data pathway, second data pathway, and third datapathway exclusive to a dedicated data pathway for communicating datafrom a first port of the first user-application to a second port of thesecond user-application.

Certain embodiments may provide, for example, a method for managingcommunications in a cloud. In certain embodiments, for example, themethod may comprise obtaining port numbers, metadata, and payloadsassociated with network packets. In certain embodiments, for example,the method may comprise identifying predefined destination port numbersand predefined authorization codes associated with the obtained portnumbers, each one of the predefined authorization codes comprising apredefined user-application identifier and a predefined payloaddata-type identifier associated with one of the obtained port numbers.In certain embodiments, for example, the method may comprise authorizingthe network packets, comprising: comparing at least a portion of themetadata with the predefined authorization codes. In certainembodiments, for example, the method may comprise requestingtransmission of payloads from the authorized network packets to cloudresources referenced by the predefined destination port numbers.

Certain embodiments may provide, for example, a method for managingcommunications, comprising: i) obtaining port numbers, metadata, andpayloads associated with network packets; ii) identifying predefineddestination port numbers and predefined authorization codes associatedwith the obtained port numbers, each one of the predefined authorizationcodes comprising a predefined user-application identifier and apredefined payload data-type identifier associated with one of theobtained port numbers; iii) authorizing the network packets, comprising:comparing at least a portion of the metadata with the predefinedauthorization codes; and iv) requesting transmission of payloads fromthe authorized network packets to cloud resources referenced by thepredefined destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes. In certainembodiments, for example, the product may comprise a computer-readablestorage medium (for example a non-transitory computer-readable storagemedium) having computer-readable program code embodied therein, thecomputer-readable program code executable by a processor to performcommunication management operations. In certain embodiments, forexample, the communication management operations may compriseestablishing authorized network tunnels (for example network tunnelsbased on protocol which involve encrypting a network packet andinserting the encrypted network packet inside a packet for transport(such as IPsec protocol), or network tunnels based on Socket SecuredLayer protocol, or network tunnels which require encryption of part ofall of a packet payload but do not involve additional headers (forexample do not involve packaging an IP packet inside another IP packet)for network communication) on all port-to-port network communications(for example unencrypted or encrypted payload communications) among theplurality of networked processor nodes (inclusive, for example, ofport-to-port communications according to User Datagram Protocol (UDP) orTransmission Control Protocol (TCP) between end-user applicationprocesses over a network)). In certain embodiments, for example, theport-to-port communications may be between user-application processes(inclusive of application processes having a process owner (or user)).In certain embodiments, for example, one or more of the user-applicationprocesses may reside in kernel and/or application space. In certainembodiments, for example, the establishing may comprise interceptingnetwork connection requests (for example by network applicationprogramming interfaces) having associated destination port numbers. Incertain embodiments, for example, the establishing may compriseidentifying preconfigured, predefined, pre-established and/orpreprovisioned tunnel port numbers (for example predefined tunnel portnumbers associated with servers), comprising identifying at least one(for example, one) preconfigured, predefined, pre-established and/orpreprovisioned tunnel port number for each associated destination portnumber of the associated destination port numbers. In certainembodiments, for example, the establishing may comprise requesting thenegotiation of network tunnels, the requesting comprising sendingconnection request packets comprising the tunnel port numbers (and also,for example, cipher suite parameters), each one of the network tunnelshaving a one-to-one correspondence with one of the tunnel port numbers.In certain embodiments, for example, the establishing may compriseauthorizing the network tunnels, comprising comparing node identifiers,user-application identifiers (for example user-application identifiersderived from application process identifiers and/or application processowners, together or in parts), and payload data-type identifiersreceived from the network tunnels with preconfigured, predefined,pre-established and/or preprovisioned authorization codes. In certainfurther embodiments, for example, the node identifiers, user-applicationidentifiers, and/or payload data-type identifiers may be encrypted andrequire decryption before the comparing.

In certain embodiments, for example, the intercepting, identifying,requesting, and authorizing may be transparent to all user-applicationprocesses (for example all processes (except optionally for processesexecuting portions of the program code) executing in (non-kernel)application space and having process owners) on the plurality ofnetworked nodes. In certain embodiments, for example, the interceptingmay be performed by a network application programming interface havingstandard syntax (for example using modified network applicationprogramming interface functions that retain standard syntax, forexample: bind( ), connect( ), listen( ), UDP sendto( ), UDP bindto( ),and close( ) functions).

In certain embodiments, for example, the intercepting, identifying,requesting, and authorizing may be self-executing. In certain furtherembodiments, for example, the intercepting, identifying, requesting, andauthorizing may be automatic. In certain further embodiments, forexample, the identifying, requesting, and authorizing may beautomatically invoked following the intercepting. In certainembodiments, for example, the intercepting, identifying, and authorizingmay occur in the kernel spaces of the plurality of networked nodes. Incertain embodiments, for example, one or more of the intercepting,identifying, and authorizing occur in application spaces of theplurality of networked nodes. In certain further embodiments, forexample, at least a portion (for example all) of the non-transitorycomputer-readable storage medium may be resident on a deployment server.

In certain further embodiments, for example, at least a portion (forexample all) of the non-transitory computer-readable storage medium maybe resident on flash drive. In certain embodiments, for example, thecommunication management operations may further comprise: preventing alluser-application process ports from binding to a portion or all physicalinterfaces of the plurality of networked nodes.

In certain embodiments, for example, user-application process ports maytransmit packets to network security software process ports by loopbackinterfaces. In certain embodiments, for example, user-applicationprocess ports may transmit packets to network security software processports by TUN/TAP interfaces.

In certain embodiments, for example, the network tunnels may beencrypted. In certain embodiments, for example, the network tunnels maybe interposed between network security processes (for examplemiddleware) running on separate nodes. In certain embodiments, forexample, the network security processes may manage a segment of the datapathway that is interposed between user-application processes onseparate nodes of the plurality of networked processor nodes. In certainembodiments, for example, the network security processes may beconducted on the plural nodes with user-application processes, whereinthe user-application processes may engage in port-to-portcommunications. In certain embodiments, for example, the networksecurity processes may be resident on different nodes from theuser-application processes. In certain embodiments, for example, theproduct may be used to configure a software-defined perimeter.

In certain embodiments, for example, the tunnel port numbers, nodeidentifiers, user-application identifiers, and/or payload data-typeidentifiers may be obtained from a plurality of configuration files. Incertain embodiments, for example, the configuration files may containprivate keys for negotiating encryption keys for the network tunnels. Incertain embodiments, for example, the configuration files may be binaryfiles. In certain embodiments, for example, the configuration files maybe encrypted files. In certain embodiments, for example, theconfiguration files may be variable length files. In certainembodiments, for example, the configuration files may be read-onlyfiles.

In certain embodiments, for example, the communication managementoperations may further comprise: executing operating system commands toidentify user-application processes making the connection requests, andverifying that the identified user-application processes are authorizedto transmit data to the associated destination port numbers. In certainembodiments, for example, the communication management operations mayfurther comprise thwarting attempts by malware to form networkconnections, the thwarting comprising: rejecting network connectionrequests in which identified user-application processes are notauthorized to transmit data, for example by reference to a configurationfile of authorized port-to-port connections. In certain embodiments, forexample, the product may further comprise a configuration file, theconfiguration file comprising at least two of the following: tunnel portnumbers, node identifiers, user-application identifiers, and payloaddata-type identifiers. In certain embodiments, for example, thecommunication management operations may comprise updating a connectionstate indicator based on the comparing node identifiers, the comparinguser-application process identifiers, and/or the comparing payloaddata-type identifiers. In certain embodiments, for example, the updatedconnection state indicated may be a field in a list of port-to-portconnections. In certain embodiments, for example, the connection stateindicator may be changed from a value indicating that no connection hasbeen established to a value indicating that an open connection stateexists for a particular port-to-port connection. In certain embodiments,for example, the connection state indicator may be changed from a valueindicating that no connection has been established to a value indicatingthat a connection is in the process of being formed and that one or moreof the node identifiers, the user-application process identifiers,and/or the payload data-type identifiers has been successfullyexchanged, authenticated and/or authorized. In certain embodiments, forexample, the connection state indicator may be changed from a valueindicating that an open connection exists, that no connection exists, orthat a connection is in the process of being formed to a valueindicating that the connection is being declined due to failure tosuccessfully exchange, authenticate and/or authorize one or more of thenode identifiers, the user-application process identifiers, and/or thepayload data-type identifiers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for at least oneport-to-port network communication (inclusive, for example, of allport-to-port network communications) among the plurality of networkedprocessor nodes, comprising: i) intercepting network connection requestshaving associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisioned tunnelport numbers, comprising identifying at least one tunnel port number foreach associated destination port number of the associated destinationport numbers; iii) requesting the negotiation of network tunnels, therequesting comprising sending connection request packets comprising thetunnel port numbers, each one of the network tunnels having a one-to-onecorrespondence with one of the tunnel port numbers; and iv) authorizingthe network tunnels, comprising comparing node identifiers,user-application identifiers, and payload data-type identifiers receivedfrom the network tunnels with preconfigured, predefined, pre-establishedand/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a computer program productfor managing communications of a networked node comprising a processor,the computer program product comprising a computer-readable storagemedium (for example a non-transitory computer-readable storage medium)having computer-readable program code embodied therein, thecomputer-readable program code executable by the processor to performcommunication management operations, the communication managementoperations comprising: establishing authorized network tunnels for allport-to-port network communications for the networked node, comprising:i) intercepting a network connection request having an associateddestination port number; ii) identifying a preconfigured, predefined,pre-established and/or preprovisioned tunnel port number associated withthe destination port number; iii) requesting the forming of a networktunnel, the forming comprising sending a connection request packetcomprising the tunnel port number; and iv) authorizing the networktunnel, comprising comparing a node identifier, a user-applicationidentifier, and a payload data-type identifier received from the networktunnel with a preconfigured, predefined, pre-established and/orpreprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes. In certainembodiments, for example, the product may comprise a computer-readablestorage medium (for example a non-transitory computer-readable storagemedium) having computer-readable program code embodied therein, thecomputer-readable program code executable by a processor to performcommunication management operations. In certain embodiments, forexample, the communication management operations may compriseestablishing authorized network tunnels for at least one port-to-portnetwork communication (including, for example, all port-to-port networkcommunications (for example unencrypted or encrypted payloadcommunications) among the plurality of networked processor nodes(inclusive, for example, of port-to-port communications according toUser Datagram Protocol (UDP) or Transmission Control Protocol (TCP)between end-user application processes over a network)). In certainembodiments, for example, the port-to-port communications may be betweenuser-application processes (inclusive of application processes having aprocess owner (or user)). In certain embodiments, for example, one ormore of the user-application processes may reside in kernel and/orapplication space. In certain embodiments, for example, the establishingmay comprise intercepting network connection requests from source ports(for example the source ports may comprise ports associated withuser-application processes), the requests having associated destinationport numbers. In certain embodiments, for example, the establishing maycomprise verifying that the source ports are authorized to communicatewith ports having the associated destination port numbers. In certainembodiments, for example, the establishing may comprise requesting thenegotiation of network tunnels, comprising sending connection requestpackets comprising the associated destination port numbers, each one ofthe network tunnels having a one-to-one correspondence with one of theassociated destination port numbers. In certain embodiments, forexample, the establishing may comprise authorizing the network tunnels,comprising comparing node identifiers, user-application identifiers,and/or payload data-type identifiers received from the network tunnelswith preconfigured, predefined, pre-established and/or preprovisionedauthorization codes. In certain further embodiments, for example, thenode identifiers, user-application identifiers, and/or payload data-typeidentifiers may be encrypted and require decryption before thecomparing.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for all port-to-portnetwork communications among the plurality of networked processor nodes,comprising: i) intercepting network connection requests from sourceports, the requests having associated destination port numbers; ii)verifying that the source ports are authorized to communicate with portshaving the associated destination port numbers; iii) requesting thenegotiation of network tunnels, comprising sending connection requestpackets comprising the associated destination port numbers, each one ofthe network tunnels having a one-to-one correspondence with one of theassociated destination port numbers; and iv) authorizing the networktunnels, comprising comparing node identifiers, user-applicationidentifiers, and payload data-type identifiers received from the networktunnels with preconfigured, predefined, pre-established and/orpreprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable by aprocessor to perform communication management operations. In certainembodiments, for example, the communication management operations maycomprise establishing authorized encrypted communication pathways for atleast one port-to-port network communication (for example allport-to-port communications) among the plurality of networked processornodes. In certain embodiments, for example, the establishing maycomprise intercepting network connection requests having associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned encrypted communication portnumbers, comprising identifying at least one preconfigured, predefined,pre-established and/or preprovisioned encrypted communication portnumber for each associated destination port number of the associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of encryptedcommunication pathways, the requesting comprising sending connectionrequest packets comprising the encrypted communication port numbers,each one of the encrypted communication pathways having a one-to-onecorrespondence with one of the encrypted communication port numbers. Incertain embodiments, for example, the establishing may compriseauthorizing the encrypted communication pathways, comprising comparingnode identifiers, user-application identifiers, and/or payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized encrypted communication pathways forall port-to-port network communications among the plurality of networkedprocessor nodes, comprising: i) intercepting network connection requestshaving associated destination port numbers; ii) identifyingpreconfigured, predefined, pre-established and/or preprovisionedencrypted communication port numbers, comprising identifying at leastone preconfigured, predefined, pre-established and/or preprovisionedencrypted communication port number for each associated destination portnumber of the associated destination port numbers; iii) requesting thenegotiation of encrypted communication pathways, the requestingcomprising sending connection request packets comprising the encryptedcommunication port numbers, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the encryptedcommunication port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing node identifiers,user-application identifiers, and payload data-type identifiers receivedfrom the encrypted communication pathways with preconfigured,predefined, pre-established and/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable by aprocessor to perform communication management operations. In certainembodiments, for example, the communication management operations maycomprise establishing authorized encrypted communication pathways for atleast one port-to-port network communication (including, for example,all port-to-port network communications) among the plurality ofnetworked processor nodes. In certain embodiments, for example, theestablishing may comprise intercepting network connection requests fromsource ports (for example source ports that have been opened by and havea predetermined relationship with authorized applications), the requestshaving associated destination port numbers. In certain embodiments, forexample, the establishing may comprise verifying that the source portsare authorized to communicate with ports having the associateddestination port numbers. In certain embodiments, for example, theestablishing may comprise requesting the negotiation of encryptedcommunication pathways, the requesting comprising sending connectionrequest packets comprising the associated destination port numbers. Incertain embodiments, for example, the establishing may compriseauthorizing the encrypted communication pathways, comprising comparingnode identifiers, user-application identifiers, and/or payload data-typeidentifiers received from the encrypted communication pathways withpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized encrypted communication pathways forall port-to-port network communications among the plurality of networkedprocessor nodes, comprising: i) intercepting network connection requestsfrom source ports, the requests having associated destination portnumbers; ii) verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers;iii) requesting the negotiation of encrypted communication pathways, therequesting comprising sending connection request packets comprising theassociated destination port numbers; and iv) authorizing the encryptedcommunication pathways, comprising comparing node identifiers,user-application identifiers, and payload data-type identifiers receivedfrom the encrypted communication pathways with preconfigured,predefined, pre-established and/or preprovisioned authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for all port-to-portnetwork communications among the plurality of networked processor nodes,comprising: i) intercepting a network connection request from a sourceport, the request having an associated destination port number; ii)verifying that the source port is authorized to communicate with a porthaving the associated destination port number; iii) requesting thenegotiation of a network tunnel, comprising sending a connection requestpacket comprising the associated destination port number; and iv)authorizing the network tunnel, comprising comparing a node identifiers,a user-application identifier, and a payload data-type identifierreceived from the network tunnel with a preconfigured, predefined,pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for all port-to-portnetwork communications among the plurality of networked processor nodes,comprising: i) intercepting a network connection request having anassociated destination port number; ii) identifying a preconfigured,predefined, pre-established and/or preprovisioned encryptedcommunication port number associated with the destination port number;iii) requesting the negotiation of an encrypted communication pathway,the requesting comprising sending a connection request packet comprisingthe encrypted communication port number; and iv) authorizing theencrypted communication pathway, comprising comparing a node identifier,a user-application identifier, and a payload data-type identifierreceived from the encrypted communication pathway with a preconfigured,predefined, pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: establishing authorized network tunnels for all port-to-portnetwork communications among the plurality of networked processor nodes,comprising: i) intercepting a network connection request from a sourceport, the request having an associated destination port number; ii)verifying that the source port is authorized to communicate with a porthaving the associated destination port number; iii) requesting thenegotiation of an encrypted communication pathway, the requestingcomprising sending a connection request packet comprising the associateddestination port number; and iv) authorizing the encrypted communicationpathway, comprising comparing a node identifier, a user-applicationidentifier, and a payload data-type identifier received from theencrypted communication pathway with a preconfigured, predefined,pre-established and/or preprovisioned authorization code.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of port-to-network communications (including, for example, onall port-to-network communications) of the plurality of processor nodes.In certain embodiments, for example, the performing communicationprocessing functions may comprise: receiving data packets (for examplefrom a user-application process via a loopback interface) havingpayloads and associated destination port numbers (the associateddestination port numbers may include, for example, a destination portnumber associated with a destination port of a network securityprocess). In certain embodiments, for example, the performingcommunication processing functions may comprise: identifyingpreconfigured, predefined, pre-established and/or preprovisioned tunnelport numbers, each one of the tunnel port numbers having a one-to-onecorrespondence with one of the associated destination port numbers. Incertain embodiments, for example, the performing communicationprocessing functions may comprise: assembling packet segments, each oneof the packet segments comprising one of the payloads, an associateduser-application process identifier, and a payload data type descriptor.In certain embodiments, for example, the associated user-applicationprocess identifier may comprise a process identifier and/or a processowner. In certain embodiments, for example, the associateduser-application process identifier, and a payload data type descriptormay be combined (or concatenated) in a metadata portion of the packetsegment. In certain embodiments, for example, the metadata may beencrypted, for example by a single-use cryptographic key. In certainembodiments, for example, the performing communication processingfunctions may comprise: requesting transmission of network packetsthrough network tunnels (for example at least a different network tunnelfor each application-to-application communication of a specified dataprotocol type), each one of the network packets comprising a tunnel portnumber of one of the tunnel port numbers and one of the assembled packetsegments, each one of the network tunnels having a one-to-onecorrespondence with one of the tunnel port numbers.

In certain embodiments, for example, the receiving, identifying,assembling, and requesting may be transparent to all user-applicationprocesses on the plurality of networked nodes. In certain embodiments,for example, the data packets may be received by loopback interfaces. Incertain embodiments, for example, the data packets may be received bykernel read and/or write calls. In certain embodiments, for example, thedata packets may be received by TAP/TUN interfaces. In certainembodiments, for example, the receiving may occur in kernel spaces ofthe plural nodes. In certain embodiments, for example, the receiving mayoccur in application spaces of the plural nodes. In certain embodiments,for example, the received data packet may be received fromuser-application processes executing in application spaces of the pluralnodes. In certain embodiments, for example, the user-application processidentifiers may comprise process commands and process owners (forexample process commands and process owners comparable to the output ofoperating system commands). In certain embodiments, for example, thecommunication processing functions may further comprise: settingconnection status indicators to a non-operative state if more than afixed number (for example a fixed number such as 10 or 20) of requeststo transmit network packets are rejected. In certain embodiments, forexample, the communication processing functions may further comprise:setting connection status indicators to a non-operative state if thedifference between rejected and successful requests to transmit networkpackets exceeds a fixed number (for example a fixed number such as 10 or20).

In certain embodiments, for example, the communication processingfunctions may further comprise: checking a connection status of thenetwork tunnels (for example by checking lists maintained in kernelmemory of the plural networked nodes). In certain embodiments, forexample, the communication processing functions may further comprisedropping network packets that are received via one or more networktunnels whose connection status indicators are set to a non-operativestate.

In certain embodiments, for example, the payloads may be translated intoa common format prior to the assembling.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of port-to-network communications (including, for example, onall port-to-network communications) of the plurality of processor nodes,the performing communication processing functions comprising: i)receiving data packets having payloads and associated destination portnumbers; ii) identifying preconfigured, predefined, pre-establishedand/or preprovisioned tunnel port numbers, each one of the tunnel portnumbers having a one-to-one correspondence with one of the associateddestination port numbers; iii) assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application process identifier, and a payload data type descriptor;and iv) requesting transmission of network packets through networktunnels, each one of the network packets comprising a tunnel port numberof one of the tunnel port numbers and one of the assembled packetsegments, each one of the network tunnels having a one-to-onecorrespondence with one of the tunnel port numbers.

Certain embodiments may provide, for example, a computer program productfor managing communications of a networked node comprising a processor,the computer program product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable by theprocessor to perform communication management operations, thecommunication management operations comprising: performing communicationprocessing functions on all port-to-network communications of thenetworked node, the performing communication processing functionscomprising: i) receiving a data packet having a payload and anassociated destination port number; ii) identifying a preconfigured,predefined, pre-established and/or preprovisioned tunnel port numberassociated with the destination port number; iii) assembling a packetsegment, the packet segment comprising the payload, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting transmission of a network packet through a network tunnel,the network packet comprising the tunnel port number and the assembledpacket segment, the network tunnel having a one-to-one correspondencewith the tunnel port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of port-to-network communications (including, for example, onall port-to-network communications) of the plurality of processor nodes.In certain embodiments, for example, the performing communicationprocessing functions may comprise receiving data packets from sourceports, the data packets having payloads and associated destination portnumbers. In certain embodiments, for example, the performingcommunication processing functions may comprise verifying that thesource ports are authorized to communicate with ports having theassociated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseassembling packet segments, each one of the packet segments comprisingone of the payloads, an associated user-application identifier, and apayload data type descriptor. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of network packets through network tunnels, each one of thenetwork packets comprising a port number of one of the associateddestination port numbers and one of the assembled packet segments, eachone of the network tunnels having a one-to-one correspondence with oneof the associated destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes. Incertain embodiments, for example, the performing communicationprocessing functions may comprise receiving data packets having payloadsand associated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseidentifying preconfigured, predefined, pre-established and/orpreprovisioned tunnel port numbers, each one of the tunnel port numbershaving a one-to-one correspondence with one of the associateddestination port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise assemblingpacket segments, each one of the packet segments comprising one of thepayloads, an associated user-application identifier, and a payload datatype descriptor. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof network packets through encrypted communication pathways, each one ofthe network packets comprising a tunnel port number of one of the tunnelport numbers and one of the assembled packet segments, each one of theencrypted communication pathways having a one-to-one correspondence withone of the tunnel port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of port-to-network communications (including, for example, onall port-to-network communications) of the plurality of processor nodes.In certain embodiments, for example, the performing communicationprocessing functions may comprise receiving data packets from sourceports, the data packets having payloads and associated destination portnumbers. In certain embodiments, for example, the performingcommunication processing functions may comprise verifying that thesource ports are authorized to communicate with ports having theassociated destination port numbers. In certain embodiments, forexample, the performing communication processing functions may compriseassembling packet segments, each one of the packet segments comprisingone of the payloads, an associated user-application identifier, and apayload data type descriptor. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission of network packets through encrypted communicationpathways, each one of the network packets comprising a port number ofone of the associated destination port numbers and one of the assembledpacket segments, each one of the encrypted communication pathways havinga one-to-one correspondence with one of the associated destination portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receivingdata packets from source ports, the data packets having payloads andassociated destination port numbers; ii) verifying that the source portsare authorized to communicate with ports having the associateddestination port numbers; iii) assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting transmission of network packets through network tunnels, eachone of the network packets comprising a port number of one of theassociated destination port numbers and one of the assembled packetsegments, each one of the network tunnels having a one-to-onecorrespondence with one of the associated destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receiving adata packet from a source port, the data packet having a payload and anassociated destination port number; ii) verifying that the source portis authorized to communicate with a port having the associateddestination port number; iii) assembling a packet segment, the packetsegment comprising the payload, an associated user-applicationidentifier, and a payload data type descriptor, and iv) requestingtransmission of a network packet through a network tunnel, the networkpacket comprising the associated destination port numbers and theassembled packet segment, the network tunnels having a one-to-onecorrespondence with the associated destination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receivingdata packets having payloads and associated destination port numbers;ii) identifying preconfigured, predefined, pre-established and/orpreprovisioned tunnel port numbers, each one of the tunnel port numbershaving a one-to-one correspondence with one of the associateddestination port numbers; iii) assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising atunnel port number of one of the tunnel port numbers and one of theassembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the tunnel portnumbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receiving adata packet having a payload and an associated destination port number;ii) identifying a preconfigured, predefined, pre-established and/orpreprovisioned tunnel port number, the tunnel port number having aone-to-one correspondence with the associated destination port number;iii) assembling a packet segment, the packet segment comprising thepayload, an associated user-application identifier, and a payload datatype descriptor; and iv) requesting encrypted communication over anencrypted communication pathway of a network packet, the network packetscomprising the tunnel port number and the assembled packet segment, theencrypted communication pathway having a one-to-one correspondence withthe tunnel port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receivingdata packets from source ports, the data packets having payloads andassociated destination port numbers; ii) verifying that the source portsare authorized to communicate with ports having the associateddestination port numbers; iii) assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting transmission of network packets through encryptedcommunication pathways, each one of the network packets comprising aport number of one of the associated destination port numbers and one ofthe assembled packet segments, each one of the encrypted communicationpathways having a one-to-one correspondence with one of the associateddestination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allport-to-network communications of the plurality of processor nodes, theperforming communication processing functions comprising: i) receiving adata packet from a source port, the data packet having a payload and anassociated destination port number; ii) verifying that the source portis authorized to communicate with a port having the associateddestination port number; iii) assembling a packet segment, the packetsegments comprising the payload, an associated user-applicationidentifier, and a payload data type descriptor; and iv) requestingtransmission of a network packet through an encrypted communicationpathway, the network packets comprising the associated destination portnumber and the assembled packet segment, the encrypted communicationpathway having a one-to-one correspondence with the associateddestination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a computer-readable storage medium (for example anon-transitory computer-readable storage medium) havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of network-to-port communications (including, for example, onall network-to-port communications) received by the plurality ofprocessor nodes. In certain embodiments, for example, the performingcommunication processing functions may comprise obtaining tunnel portnumbers, metadata (for example metadata encrypted using a single-usecryptographic key), and payloads associated with network packets. Incertain embodiments, for example, the performing communicationprocessing functions may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned destination port numbers andpreconfigured, predefined, pre-established and/or preprovisionedauthorization codes associated with the tunnel port numbers, each one ofthe authorization codes comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application processidentifier and a preconfigured, predefined, pre-established and/orpreprovisioned payload data-type identifier associated with one of theobtained tunnel port numbers. In certain embodiments, for example, theperforming communication processing functions may comprise authorizingthe network packets, comprising: comparing (for example comparing inapplication spaces or kernel spaces of the plurality of nodes) metadatawith the authorization codes. In certain embodiments, for example, theperforming communication processing functions may comprise requestingtransmission (for example across loopback interfaces, by TUN/TAPinterfaces, or by kernel read and/or write calls) of payloads from theauthorized network packets to destinations referenced by the destinationport numbers. In certain embodiments, for example, the payloads may bepassed to the destination port numbers by one or more loopbackinterfaces.

In certain embodiments, for example, the obtaining, identifying,authorizing, and requesting may be transparent to all user-applicationprocesses on the plurality of networked nodes (for example by employingmodified network application programming interface functions (forexample in a modified operating system) while maintaining standardsyntax). In certain embodiments, for example, the obtaining,identifying, authorizing, and requesting may be self-executing and/orautomatic (for example requiring no human intervention, no interruptionin computer execution other than ordinary, temporary processscheduling).

In certain embodiments, for example, the communication processingfunctions may be performed at 95% of wire speed or greater and less than10% of the processor load may be committed to network communications. Incertain embodiments, for example, the destinations may compriseuser-application processes. In certain embodiments, for example, theprogram code may be middleware positioned between the network and thedestinations referenced by the destination port number. In certainembodiments, for example, the communication processing functions mayfurther comprise: dropping network packets if they are not authorizedfollowing the comparing (for example dropping network packets for whichthe metadata does not match expected values based on the authorizationcodes).

In certain embodiments, for example, the communication processingfunctions may further comprise: setting connection status indicators toa non-operative state if more than a fixed number of network packets arenot authorized following the comparing. In certain embodiments, forexample, the communication processing functions may further comprise:checking, the checking at least partially performed in kernels of theplural networked nodes, a connection status of the network. In certainembodiments, for example, the communication processing functions mayfurther comprise: dropping network packets that are received via one ormore network tunnels whose connection status indicators are set to anon-operative state.

Certain embodiments may comprise, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of network-to-port communications (including, for example, onall network-to-port communications) received by the plurality ofprocessor nodes, the performing communication processing functionscomprising: i) obtaining tunnel port numbers, metadata, and payloadsassociated with network packets; ii) identifying preconfigured,predefined, pre-established and/or preprovisioned destination portnumbers and preconfigured, predefined, pre-established and/orpreprovisioned authorization codes associated with the tunnel portnumbers, each one of the authorization codes comprising a preconfigured,predefined, pre-established and/or preprovisioned user-applicationidentifier and a preconfigured, predefined, pre-established and/orpreprovisioned payload data-type identifier associated with one of theobtained tunnel port numbers; iii) authorizing the network packets,comprising: comparing at least a portion of the metadata with theauthorization codes; and iv) requesting transmission of payloads fromthe authorized network packets to destinations referenced by thedestination port numbers.

Certain embodiments may comprise, for example, a computer programproduct for managing communications of a networked nodes comprising aprocessor, the computer program product comprising a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein, the computer-readable program code executable by theprocessor to perform communication management operations, thecommunication management operations comprising: performing communicationprocessing functions on all network-to-port communications received bythe networked node, the performing communication processing functionscomprising: i) obtaining a tunnel port number, metadata, and a payloadassociated with a network packet received by the networked node; ii)identifying a preconfigured, predefined, pre-established and/orpreprovisioned destination port number and a preconfigured, predefined,pre-established and/or preprovisioned authorization code associated withthe tunnel port number, the authorization code comprising apreconfigured, predefined, pre-established and/or preprovisioneduser-application identifier and a preconfigured, predefined,pre-established and/or preprovisioned payload data-type identifierassociated with the obtained tunnel port number; iii) authorizing thenetwork packet, comprising: comparing the metadata with theauthorization code; and iv) requesting transmission of the payload to adestination referenced by the destination port number.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a computer-readable storage medium (for example anon-transitory computer-readable storage medium) havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on at least aportion of network-to-port communications (including, for example, onall network-to-port communications) received by the plurality ofprocessor nodes. In certain embodiments, for example, the performingcommunication processing functions may comprise obtaining destinationport numbers, metadata, and payloads associated with network packets. Incertain embodiments, for example, the performing communicationprocessing functions may comprise identifying preconfigured, predefined,pre-established and/or preprovisioned authorization codes associatedwith the destination port numbers, each one of the authorization codescomprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the destination port numbers. Incertain embodiments, for example, the performing communicationprocessing functions may comprise authorizing the network packets,comprising: comparing at least a portion of the metadata with theauthorization codes. In certain embodiments, for example, the performingcommunication processing functions may comprise requesting transmissionof payloads from the authorized network packets to destinationsreferenced by the destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allnetwork-to-port communications received by the plurality of processornodes, the performing communication processing functions comprising: i)obtaining destination port numbers, metadata, and payloads associatedwith network packets; ii) identifying preconfigured, predefined,pre-established and/or preprovisioned authorization codes associatedwith the destination port numbers, each one of the authorization codescomprising a preconfigured, predefined, pre-established and/orpreprovisioned user-application identifier and a preconfigured,predefined, pre-established and/or preprovisioned payload data-typeidentifier associated with one of the destination port numbers; iii)authorizing the network packets, comprising: comparing at least aportion of the metadata with the authorization codes; and iv) requestingtransmission of payloads from the authorized network packets todestinations referenced by the destination port numbers.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked processor nodes, the productcomprising a non-transitory computer-readable storage medium havingcomputer-readable program code embodied therein, the computer-readableprogram code executable by a processor to perform communicationmanagement operations, the communication management operationscomprising: performing communication processing functions on allnetwork-to-port communications received by the plurality of processornodes, the performing communication processing functions comprising: i)obtaining a tunnel port number, metadata, and a payload associated witha network packet received by the networked node; ii) identifying apreconfigured, predefined, pre-established and/or preprovisioneddestination port number and a preconfigured, predefined, pre-establishedand/or preprovisioned authorization code associated with the tunnel portnumber, the authorization code comprising a preconfigured, predefined,pre-established and/or preprovisioned user-application identifier and apreconfigured, predefined, pre-established and/or preprovisioned payloaddata-type identifier associated with the obtained tunnel port number;iii) authorizing the network packet, comprising: comparing the metadatawith the authorization code; and iv) requesting transmission of thepayload to a destination referenced by the preconfigured, predefined,pre-established and/or preprovisioned destination port number.

Certain embodiments may provide, for example, a method for authorizednetwork communication, comprising: detecting a request by a firstapplication present on a first node to transmit data to a destinationport associated with a second application present on a second node,validating the authority of the first application to transmit the datato the destination port at least by checking a preconfigured listpresent on the first node, passing the data from the first applicationto a first middleware on the first node, and mutual authorization andauthentication of the first node and the second node, the firstapplication and the second application, and a data protocol of the data.In certain further embodiments, for example, the method may furthercomprise transmitting a network packet containing the data through anetwork tunnel (for example a network tunnel configured according toUser Datagram Protocol (UDP), a “mid-weight” UDP comprising UDP plusadditional connection acknowledgments devised to increase reliability ofa UDP connection, or Transmission Control Protocol (TCP)), the networktunnel extending from the first middleware to a second middlewarepresent on the second node, the network tunnel initialized based on thedetected request, the initialization based at least on the mutualauthentication and authorization.

In certain embodiments, for example, the first node may be a firstcomputing device. In certain embodiments, for example, the first nodemay comprise a first processor, a first kernel, a first network stack, afirst loopback interface, a first network application programminginterface of the first network stack, and a first non-transitorycomputer-readable storage medium. In certain embodiments, for example,the second node may comprise a second processor, a second kernel, asecond network stack, and a second non-transitory computer-readablestorage medium. In certain embodiments, for example, the detecting maybe performed by a first execution thread being executed by the firstprocessor, and at least a portion of the validating may be performed bya second execution thread being executed by the first processor. Incertain embodiments, for example, the detecting and the validating maybe performed by a first execution thread being executed by the firstprocessor, and at least a portion of the mutual authorization andauthentication may be performed by a second execution thread beingexecuted by the first processor. In certain embodiments, for example,the validating may be performed by the first middleware. In certainembodiments, for example, execution of the first middleware may bedistributed at least between a first execution thread and a secondexecution thread being executed by the first processor. In certainembodiments, for example, the request from the first application may bepassed through the first loopback interface to the first middleware. Incertain embodiments, for example, the request from the first applicationmay not be passed through the first loopback interface to the firstmiddleware. In certain embodiments, for example, the request from thefirst application may be passed through a shim in the first networkstack to the first middleware. In certain embodiments, for example, therequest from the first application may be passed from the first networkapplication programming interface directly to the first middleware. Incertain embodiments, for example, the data may be passed through theloopback interface to the first middleware. In certain embodiments, forexample, the data may not be passed through the first loopback interfaceto the first middleware. In certain embodiments, for example, the datamay be passed through a shim in the first network stack to the firstmiddleware. In certain embodiments, for example, the data may be passedfrom the first network application programming interface directly to thefirst middleware. In certain embodiments, for example, the detecting maycomprise receiving (or intercepting), by the first middleware, therequest. In certain embodiments, for example, the detecting may occur inthe first network stack. In certain embodiments, for example, thedetecting may occur in the first network application programminginterface.

In certain embodiments, for example, at least a portion of the firstmiddleware may comprise a kernel driver. In certain embodiments, forexample, at least a portion of the first middleware may comprise akernel module process.

In certain embodiments, for example, the method may further comprise:preventing the first application and the second application fromassociating with any socket comprising a physical interface. In certainembodiments, for example, the method may further comprise: preventingany port associated with the first application from binding with aphysical interface. In certain embodiments, for example, the method mayfurther comprise: preventing any port associated with the secondapplication from binding with a physical interface. In certainembodiments, for example, the method may further comprise: preventingany port associated with the first application from binding with aphysical interface, preventing any port associated with the secondapplication from binding with a physical interface.

In certain embodiments, for example, the network tunnel may beencrypted. In certain further embodiments, for example, at least aportion of the network packet (for example the payload, a portion of thepayload, or a metadata portion of the payload) may be encrypted using asymmetric key algorithm (for example a symmetric key algorithm such asan Advanced Encryption Standard (AES) algorithm (for example 256-bitAES). In certain further embodiments, for example, the symmetric key maybe obtained by executing a key exchange algorithm (for exampleElliptic-Curve Diffie-Hellman (ECDH) key exchange). In certain furtherembodiments, for example, the symmetric key may be a single-use key. Incertain further embodiments, for example, the symmetric key may beobtained by rotating a key derived from ECDH key exchange.

In certain embodiments, for example, the data protocol may be obtainedfrom metadata present in the network packet. In certain furtherembodiments, for example, the metadata may be encrypted.

In certain embodiments, for example, the metadata may comprise aconnection state indicator for the network tunnel. In certainembodiments, for example, a connection state indicator for the networktunnel may be inserted into the metadata by the first middleware. Incertain embodiments, for example, a second middleware present on thesecond node may determine a connection state of the network tunnel byinspecting the metadata (for example by decrypting encrypted metadatafollowed by parsing the metadata).

In certain embodiments, for example, at least a portion of thevalidating (for example all of the validating) may be performed by thefirst middleware. In certain further embodiments, for example,validating may comprise the first middleware inspecting a connectionstate of the network tunnel (for example checking a port state of anendpoint of the network tunnel such as a network tunnel endpoint presenton the first node). In certain embodiments, for example, validating maycomprise matching a 2-tuple comprising a destination port number of thedestination port and a unique first application identifier of the firstapplication with record present in the preconfigured list.

In certain embodiments, for example, the network tunnel may be encryptedbased on executing an encryption algorithm (for example encrypted basedon executing a key exchange algorithm) and the mutual authentication andauthorization of the first node and the second node may be performedseparately from the executing the encryption algorithm (for example maybe performed after the executing the encryption algorithm). In certainembodiments, for example, the mutual authentication and authorization ofthe first node and the second node may comprise encrypting a first nodeidentification code using a cryptographic key derived from the executingthe key exchange algorithm. In certain further embodiments, for example,the cryptographic key may be nonpublic (for example the cryptographickey may be a shared secret between the first middleware and a secondmiddleware executing on the second node). In certain embodiments, forexample, the mutual authentication and authorization of the first nodeand the second node may comprise: (a) encrypting a first nodeidentification code using a first cryptographic key derived from theexecuting the key exchange algorithm, and (b) encrypting a second nodeidentification code using a second cryptographic key (for example asecond cryptographic key that is different from the first cryptographickey) derived from the executing the key exchange algorithm. In certainfurther embodiments, for example, the cryptographic key may be nonpublic(for example the first cryptographic key and the second cryptographickey may each be a shared secret between the first middleware and asecond middleware executing on the second node).

In certain embodiments, for example, the mutual authentication andauthorization of the first node and the second node may be independentof mutual authentication and authorization of the first application andthe second application and/or mutual authentication and authorization ofthe data protocol. In certain embodiments, for example, the mutualauthentication and authorization of the first node and the second nodemay be independent of initializing the network tunnel. In certainembodiments, for example, the mutual authentication and authorization ofthe first node and the second node may occur after the network tunnel isinitialized. In certain embodiments, for example, the exchange of thedata protocol identifier between the first node and the second node mayoccur during initialization of the network tunnel to at least partiallyauthorize the network tunnel.

In certain embodiments, for example, mutual authorization andauthentication of the first application and the second application maycomprise key exchange (for example by execution of a key exchangealgorithm such as ECDH) during initialization of the network tunnel. Incertain embodiments, for example, a first private key associated withthe first application and a second private key associated with thesecond application may be used during the key exchange. In certainembodiments, for example, the first private key may be uniquelyassociated with the first application and the second private key may beuniquely associated with the second application. In certain embodiments,for example, the first private key may be uniquely associated with thefirst application and a user (for example a single-user) of the firstapplication and the second private key may be uniquely associated withthe second application and a user (for example a single-user) of thesecond application.

In certain embodiments, for example, mutual authorization andauthentication of the first application and the second application maycomprise encrypting a unique first application identifier and sendingthe encrypted unique first application identifier from the first node tothe second node, followed by decrypting the unique first applicationidentifier and comparing the unique first application identifier to apredetermined first identifier value that is specific to the networktunnel. In certain further embodiments, for example, mutualauthorization and authentication of the first application and the secondapplication may comprise encrypting a unique second applicationidentifier and sending the encrypted unique second applicationidentifier from the second node to the first node, followed bydecrypting the unique second application identifier and comparing theunique second application identifier to a predetermined secondidentifier value that is specific to the network tunnel. In certainembodiments, for example, the unique first application identifier maycomprise a first application identifier and an associated first useridentifier. In certain embodiments, for example, the unique secondapplication identifier may comprise a second application identifier andan associated second user identifier. In certain embodiments, forexample, the unique first application identifier and the unique secondapplication identifier may be exchanged during initialization of thenetwork tunnel to at least partially authorize the network tunnel. Incertain embodiments, for example, the network packet may contain theunique first application identifier. In certain embodiments, forexample, mutual authentication and authorization of the data protocolmay further comprise encrypting a data protocol identifier and sendingthe encrypted data protocol identifier from the first node to the secondnode, followed by decrypting the data protocol identifier and comparingthe data protocol identifier to a predetermined data protocol identifiervalue that is specific to the network tunnel. In certain furtherembodiments, for example, mutual authorization and authentication ofdata protocol may comprise encrypting a data protocol identifier andsending the encrypted data protocol identifier from the second node tothe first node, followed by decrypting the data protocol identifier andcomparing the data protocol identifier to a predetermined data protocolidentifier value that is specific to the network tunnel. In certainembodiments, for example, the above-described exchange of the dataprotocol identifier between the first node and the second may beperformed during initialization of the network tunnel to at leastpartially authorize the network tunnel. In certain embodiments, forexample, the network packet may contain the unique first applicationidentifier. In certain embodiments, for example, mutual authenticationand authorization of the first application and second application andmutual authentication and authorization of the data protocol may becombined. In certain further embodiments, for example, a first combinedidentifier comprising the unique first application identifier and thedata protocol identifier may be encrypted and sent from the from thefirst node to the second node, followed by decrypting the first combinedidentifier and comparing the first combined identifier to apredetermined first combined identifier value that is specific to thenetwork tunnel. In certain further embodiments, for example, a secondcombined identifier comprising the unique second application identifierand the data protocol identifier may be encrypted and sent from the fromthe second node to the first node, followed by decrypting the secondcombined identifier and comparing the second combined identifier to apredetermined second combined identifier value that is specific to thenetwork tunnel. In certain embodiments, for example, the first combinedidentifier and the second combined identifier may be exchanged duringinitialization of the network tunnel to at least partially authorize thenetwork tunnel. In certain embodiments, for example, the network packetmay contain the unique first application identifier. In certainembodiments, for example, the first application identifier and the firstuser identifier may be obtained from a process status request (forexample a “ps” command in Linux).

In certain embodiments, for example, the method may comprise detecting arequest by the second application to open a port. In certainembodiments, for example, the method may comprise validating theauthority of the second application to open the port at least bychecking a further preconfigured list present on the second node,processor, or computing device. In certain embodiments, for example, thechecking the further preconfigured list may comprise matching at least aportion of a member of the further preconfigured list with a 2-tuplecomprising (a) a unique identifier for the second application and theuser of the second application and (b) a port number associated with theport. In certain further embodiments, for example, the port may be thedestination port.

In certain embodiments, for example, the method may further comprise:communicating the data from a second middleware present on the secondnode to the second application.

Certain embodiments may provide, for example, a method for authorizednetwork communication. In certain embodiments, for example, the methodmay comprise: detecting (for example receiving or intercepting) arequest by a first application present on a first node (for example acomputing device such as an edge device in an Internet-of-Things) totransmit data to a second application present on a second node,validating the authority of the first application to transmit the data,passing the data from the first application to a first middleware on thefirst node, transmitting a network packet (for example an InternetProtocol (IP) packet) containing the data through a network tunnel (forexample an encrypted network tunnel), and testing the authority of thesecond application to receive the data.

In certain further embodiments, for example, the validating may be basedat least on a first port number (for example a transport layer portnumber according to the OSI model). In certain further embodiments, forexample, the first application may comprise a computer program executingon the first node and the first port number may be associated with thefirst application. In certain embodiments, for example, the firstmiddleware may comprise a computer program executing on the first nodeand the first port number may be associated with the first middleware(for example the port number may be associated with the secondmiddleware and may be an endpoint of the network tunnel). In certainembodiments, for example, the first port number may be predeterminedprior to the initialization of the network tunnel. In certainembodiments, for example, the first port number may be assigneddynamically during initialization of the network tunnel.

In certain embodiments, for example, the network tunnel may extend fromthe first middleware to a second middleware present on the second node(for example the network tunnel may extend from a port associated withthe first middleware to a different port associated with the secondmiddleware. In certain further embodiments, for example, the networktunnel may be initialized based on the detected request (for example,the initialization may be triggered by the detected request). In certainfurther embodiments, for example, the initialization may be based atleast on mutual authentication and authorization of the first node andthe second node (for example by exchange of encrypted nodeidentification codes).

In certain embodiments, for example, the testing may be based at leaston a second port number and a data protocol of the data. In certainfurther embodiments, for example, the second port number may beassociated with a computer program executing on the second node,processor, or computing device. In certain further embodiments, forexample, the second port number may be associated with the secondapplication. In certain embodiments, for example, the second port numbermay be associated with a second middleware (for example the port numbermay be associated with the second middleware and may be an endpoint ofthe network tunnel). In certain embodiments, for example, the secondport number may be predetermined prior to the initialization of thenetwork tunnel. In certain embodiments, for example, the second portnumber may be assigned dynamically during initialization of the networktunnel.

In certain embodiments, for example, the first node may be a firstcomputing device. In certain embodiments, for example, the first nodemay comprise a first processor, a first kernel, a first network stack, afirst loopback interface, a first network application programminginterface of the first network stack, and a first non-transitorycomputer-readable storage medium. In certain embodiments, for example,the second node may comprise a second processor, a second kernel, asecond network stack, and a second non-transitory computer-readablestorage medium. In certain embodiments, for example, the detecting maybe performed by a first execution thread being executed by the firstprocessor and at least a portion of the testing may be performed by asecond execution thread being executed by the first processor. Incertain embodiments, for example, the validating may be performed by thefirst middleware. In certain further embodiments, for example, thevalidating may be performed by the first execution thread. In certainfurther embodiments, for example, the validating may be performed by thesecond execution thread. In certain embodiments, for example, executionof the first middleware may be distributed at least between the firstexecution thread and the second execution thread. In certainembodiments, for example, the request from the first application may bepassed through the first loopback interface to the first middleware. Incertain embodiments, for example, the request from the first applicationmay not be passed through the first loopback interface to the firstmiddleware. In certain embodiments, for example, the request from thefirst application may be passed through a shim in the first networkstack to the first middleware. In certain embodiments, for example, therequest from the first application may be passed from the first networkapplication programming interface directly to the first middleware. Incertain embodiments, for example, the data may be passed through theloopback interface to the first middleware. In certain embodiments, forexample, the data may not be passed through the first loopback interfaceto the first middleware. In certain embodiments, for example, the datamay be passed through a shim in the first network stack to the firstmiddleware. In certain embodiments, for example, the data may be passedfrom the first network application programming interface directly to thefirst middleware. In certain embodiments, for example, the detecting maycomprise receiving or intercepting, by the first middleware, therequest. In certain embodiments, for example, the detecting may occur inthe first network stack. In certain embodiments, for example, thedetecting may occur in the first network application programminginterface.

In certain embodiments, for example, at least a portion of the firstmiddleware may comprise a kernel driver. In certain embodiments, forexample, at least a portion of the first middleware may comprise akernel module process.

In certain embodiments, for example, the method may further comprise:preventing the first application and the second application fromassociating with any socket comprising a physical interface. In certainembodiments, for example, the method may further comprise: preventingany port associated with the first application from binding with aphysical interface. In certain embodiments, for example, the method mayfurther comprise: preventing any port associated with the secondapplication from binding with a physical interface. In certainembodiments, for example, the method may further comprise: preventingany port associated with the first application from binding with aphysical interface, preventing any port associated with the secondapplication from binding with a physical interface.

In certain embodiments, for example, the network tunnel may beencrypted. In certain further embodiments, for example, at least aportion of the network packet (for example the payload, a portion of thepayload, or a metadata portion of the payload) may be encrypted using asymmetric key algorithm (for example a symmetric key algorithm such asan Advanced Encryption Standard (AES) algorithm (for example 256-bitAES). In certain further embodiments, for example, the symmetric key maybe obtained by Diffie-Hellman key exchange (for example Elliptic-CurveDiffie-Hellman (ECDH) key exchange). In certain further embodiments, forexample, the symmetric key may be a single-use key. In certain furtherembodiments, for example, the symmetric key may be obtained by rotatinga key derived from ECDH key exchange.

In certain embodiments, for example, the data protocol may be obtainedfrom metadata present in the network packet. In certain furtherembodiments, for example, the metadata may be encrypted.

In certain embodiments, for example, the metadata may comprise aconnection state indicator for the network tunnel. In certainembodiments, for example, a connection state indicator for the networktunnel may be inserted into the metadata by the first middleware. Incertain embodiments, for example, a second middleware present on thesecond node may determine a connection state of the network tunnel byinspecting the metadata (for example by decrypting encrypted metadatafollowed by parsing the metadata).

In certain embodiments, for example, at least a portion of thevalidating (for example all of the validating) may be performed by thefirst middleware. In certain further embodiments, for example,validating may comprise the first middleware inspecting a connectionstate of the network tunnel (for example checking a port state of anendpoint of the network tunnel such as a network tunnel endpoint presenton the first node). In certain embodiments, for example, validating maycomprise matching a 2-tuple comprising the first port number and anapplication identifier with a predetermined, pre-authorized 2-tuple. Incertain further embodiments, for example, the application identifier maycomprise an application code and an application user code. In certainembodiments, for example, the application identifier and the applicationuser code may be constructed based on a process status command (forexample the “ps” command in Linux). In certain embodiments, for example,validating may comprise matching a 3-tuple comprising the first portnumber, an application identifier, and an application user with apredetermined, pre-authorized 3-tuple. In certain embodiments, forexample, at least a portion of the validating (for example all of thevalidating) may be performed by a second middleware present on thesecond node, processor, or computing device. In certain embodiments, forexample, a first portion of the validating may be performed by the firstmiddleware and a second portion of the validating may be performed bythe second middleware.

In certain embodiments, for example, validating may comprise the secondmiddleware inspecting the metadata. In certain embodiments, for example,validating may comprise the second middleware inspecting the metadata todetermine a connection state of the network tunnel. In certainembodiments, for example, validating may comprise the second middlewareinspecting the metadata to verify the first application is authorized.In certain embodiments, for example, validating may comprise the secondmiddleware inspecting the metadata to verify a user of the firstapplication is an authorized user of the first application. In certainembodiments, for example, validating may comprise the second middlewareinspecting the metadata to verify a data protocol of the data is anauthorized data protocol. In certain embodiments, for example,validating may comprise the second middleware inspecting the metadata toverify a descriptor comprising at least a portion of the user of thefirst application, at least a portion of the first application, and atleast a portion of the data protocol matches a pre-stored,pre-authorized value for the descriptor.

In certain further embodiments, for example, the pre-stored,pre-authorized value may be selected based on (for example thepre-stored, pre-authorized value may be indexed by) at least one portnumber associated with the first application. In certain furtherembodiments, for example, the pre-stored, pre-authorized value may beselected based on at least one port number associated with the secondapplication. In certain further embodiments, for example, thepre-stored, pre-authorized value may be selected based on at least oneport number associated with the first middleware. In certain furtherembodiments, for example, the pre-stored, pre-authorized value may beselected based on at least one port number associated with the secondmiddleware (for example the port number may be associated with thesecond middleware and may be an endpoint of the network tunnel).

In certain embodiments, for example, the initializing the network tunnelmay comprise obtaining the predetermined, pre-authorized 2-tuple. Incertain embodiments, for example, the initializing the network tunnelmay comprise obtaining the predetermined, pre-authorized 3-tuple.

In certain embodiments, for example, the validating may comprise thefirst middleware verifying (for example verifying in a kernel of thefirst node) that data sent from the first application is permitted topass through a first port identified by a first port number (for examplewherein the first port number is a port number associated with the firstmiddleware). In certain further embodiments, for example, the validatingmay comprise a second middleware present on the second node parsingmetadata present in the network packet to obtain a descriptor comprisinga first application component, a first application user component, and adata protocol component. In certain further embodiments, for example,the validating may comprise the second middleware looking up apredetermined value based on a destination port number of the networkpacket. In certain further embodiments, for example, the validating maycomprise comparing the obtained descriptor with the looked-up,predetermined value. In certain embodiments, for example, at least aportion of the testing (for example all of the testing) may be performedby a second middleware present on the second node, processor, orcomputing device. In certain embodiments, for example, a first portionof the testing may be performed by the first middleware and a secondportion of the testing may be performed by the second middleware. Incertain embodiments, for example, the testing may comprise the secondmiddleware inspecting metadata of the network packet. In certain furtherembodiments, for example, the testing may comprise the second middlewareparsing the metadata to obtain a connection state indicator of thenetwork tunnel. In certain embodiments, for example, the testing maycomprise the second middleware comparing a destination port number ofthe network packet with a predetermined, pre-authorized destination portnumber.

In certain embodiments, for example, the testing may comprise testing,by at least a portion of a second middleware present on the second node(for example at least a portion of a middleware executing in a kernel ofthe second node), whether a destination port of the network packetmatches an open, pre-authenticated second port number. In certainembodiments, for example, the open, pre-authenticated second port numbermay be pre-authenticated during the initialization of the tunnel networkbased on (a) being associated with the second middleware; (b) appearingin a record present on the second node, the record comprising the secondapplication, a user of the second application, and a port numberassociated with the second application and the user of the secondapplication; and (c) an open connection comprising the port numberassociated with the second application and the user of the secondapplication.

In certain embodiments, for example, the method may further comprise:communicating the data from a second middleware present on the secondnode to the second application.

In certain embodiments, for example, the mutual authentication andauthorization of the first node and the second node may be independentof initializing the network tunnel. In certain embodiments, for example,the mutual authentication and authorization of the first node and thesecond node may occur after the network tunnel is initialized. Incertain embodiments, for example, the network tunnel may be encryptedbased on executing an encryption algorithm (for example encrypted basedon executing a key exchange algorithm) and the mutual authentication andauthorization of the first node and the second node may be performedseparately from the executing the encryption algorithm (for example maybe performed after the executing the encryption algorithm). In certainembodiments, for example, the mutual authentication and authorization ofthe first node and the second node may comprise encrypting a first nodeidentification code using a cryptographic key derived from the executingthe key exchange algorithm. In certain further embodiments, for example,the cryptographic key may be nonpublic (for example the cryptographickey may be a shared secret between the first middleware and a secondmiddleware executing on the second node). In certain embodiments, forexample, the mutual authentication and authorization of the first nodeand the second node may comprise: (a) encrypting a first nodeidentification code using a first cryptographic key derived from theexecuting the key exchange algorithm, and (b) encrypting a second nodeidentification code using a second cryptographic key (for example asecond cryptographic key that is different from the first cryptographickey) derived from the executing the key exchange algorithm. In certainfurther embodiments, for example, the cryptographic key may be nonpublic(for example the first cryptographic key and the second cryptographickey may each be a shared secret between the first middleware and asecond middleware executing on the second node).

Certain embodiments may provide, for example, a method for authorizednetwork communication, comprising: i) detecting a request by a firstapplication present on a first node to transmit data to a secondapplication present on a second node; ii) validating the authority ofthe first application to transmit the data, the validating based atleast on a predetermined port number of the first application; iii)passing the data from the first application to a first middleware on thefirst node; iv) transmitting a network packet containing the datathrough a network tunnel, the network tunnel extending from the firstmiddleware to a second middleware present on the second node, thenetwork tunnel initialized based on the detected request, theinitialization based at least on mutual authentication and authorizationof the first node and the second node; and v) testing the authority ofthe second application to receive the data, the testing based at leaston a predetermined port number of the second application and a dataprotocol of the data.

Certain embodiments may provide, for example, a method for authorizednetwork communication. In certain embodiments, for example, the methodmay comprise detecting a request by a first application process on afirst node to establish a connection for transmitting data having a datatype to a second application process at a destination port number. Incertain embodiments, for example, the method may comprise validating theauthority of the first application process to transmit the data at leastby checking a preconfigured list present on the first node for acombination of a first application process identifier and thedestination port number. In certain embodiments, for example, the methodmay comprise passing the data from the first application process to afirst middleware process on the first node, processor, or computingdevice. In certain embodiments, for example, the method may compriseestablishing a dedicated encrypted communication pathway fortransmitting data having the data type between the first applicationprocess and the second application process, the dedicated encryptedcommunication pathway extending from the first middleware process to asecond middleware process on the second node, by mutual authenticationand authorization of the first node and/or the second node, the firstapplication process and/or the second application process, a firstapplication process owner and/or a second application process owner,and/or a data protocol of the data.

In certain embodiments, for example, the data may be passed from thefirst application process to the first middleware process by a TCPconnection. In certain embodiments, for example, the encryptedcommunication pathway may comprise a UDP connection. In certainembodiments, for example, the data may be passed from the firstapplication process to the first middleware process by a TCP connectionand the encrypted communication pathway may comprise a UDP connection.In certain embodiments, for example, the data may be passed from thesecond application process to the second middleware process by a furtherTCP connection. In certain embodiments, for example, the data may bepassed from the first application process to the first middlewareprocess by a TCP connection, the encrypted communication pathway maycomprise a UDP connection, and the data may be passed from the secondapplication process to the second middleware process by a further TCPconnection.

Certain embodiments may provide, for example, a method for authorizednetwork communication, comprising: i) detecting a request by a firstapplication process on a first node to establish a connection fortransmitting data having a data type to a second application process ata destination port number; ii) validating the authority of the firstapplication process to transmit the data at least by checking apreconfigured list present on the first node for a combination of afirst application process identifier and the destination port number;iii) passing the data from the first application process to a firstmiddleware process on the first node; iv) establishing a dedicatedencrypted communication pathway for transmitting data having the datatype between the first application process and the second applicationprocess, the dedicated encrypted communication pathway extending fromthe first middleware process to a second middleware process on thesecond node, by mutual authentication and authorization of the firstnode and/or the second node, the first application process and/or thesecond application process, a first application process owner and/or asecond application process owner, and/or a data protocol of the data.

Certain embodiments may provide, for example, plural nodes coupled to anetwork, wherein each data transfer between a first node of the pluralnodes and a second node (for example each second node) of the pluralnodes may be according to one of the foregoing methods for authorizedcommunication. In certain further embodiments, for example, the pluralnodes coupled to the network may define a software-defined network (forexample plural virtual router switches cooperatively configured with oneanother).

Certain embodiments may provide, for example, a method to securelytransport plural data packets (for example plural IP packets),comprising: configuring a data pathway from a first application (forexample an application program) executing on a first node to a secondapplication executing on a second node, and exchanging nodeidentification codes over at least a portion of the data pathway to atleast partially authorize the at least a portion of the data pathway. Incertain further embodiments, for example, the method may comprise, foreach one of the transported plural packets from the first application:executing operating system commands to verify that the at leastpartially authorized at least a portion of the data pathway remainsunaltered; reading first application user and data protocol metadata toobtain at least one descriptor (for example at one 4-byte or 8-typedescriptor); and comparing the at least one descriptor with members of astatic list (for example a predetermined white list of authorizeddescriptors).

In certain embodiments, for example, the data pathway may transportpackets exclusively between endpoints defined by the first applicationand the second application (for example a port associated with the firstapplication and a port associated with the second application). Incertain further embodiments, for example, the authorized at least aportion of the data pathway may transport packets exclusively on thedata pathway.

In certain embodiments, for example, the at least a portion of the datapathway may be encrypted based on executing an encryption algorithm (forexample encrypted based on executing a key exchange algorithm) and theexchanging node identification codes may be performed separately fromthe executing the encryption algorithm (for example may be performedafter the executing the encryption algorithm). In certain embodiments,for example, the exchanging node identification codes may compriseencrypting a first node identification code using a cryptographic keyderived from the executing the key exchange algorithm. In certainfurther embodiments, for example, the cryptographic key may be nonpublic(for example the cryptographic key may be a shared secret between thefirst middleware and a second middleware executing on the second node).In certain embodiments, for example, the exchanging node identificationcodes may comprise: (a) encrypting a first node identification codeusing a first cryptographic key derived from the executing the keyexchange algorithm, and (b) encrypting a second node identification codeusing a second cryptographic key (for example a second cryptographic keythat is different from the first cryptographic key) derived from theexecuting the key exchange algorithm. In certain further embodiments,for example, at least one of the node identification codes may benonpublic (for example the first node identification code and the secondnode identification code may each be a shared secret between a networksecurity software executing on the first node and a network securitysoftware executing on the second node).

In certain embodiments, for example, the method may comprise decryptingthe first application user and data protocol metadata prior to thereading.

In certain embodiments, for example, the at least one descriptor may bean n-tuple, wherein n may be at least 2 (for example a 2-tuple).

In certain embodiments, for example, the static list may be present onthe second node, processor, or computing device. In certain embodiments,for example, the comparing may be performed on the second node,processor, or computing device.

In certain embodiments, for example, the executing operating systemcommands may verify that a packet originated from an authenticated,authorized process on the first node, processor, or computing device. Incertain further embodiments, for example, the verifying may compriseinspecting packet metadata to confirm that a packet originated from anauthorized user on the first node, processor, or computing device.

In certain embodiments, for example, the executing operating systemcommands may comprise checking a connection state of the at leastpartially authorized at least a portion of the data pathway. In certainfurther embodiments, for example, said checking may comprise parsingpacket metadata. In certain further embodiments, for example, saidchecking may comprise comparing the parsed metadata to members of a listof connections. In certain further embodiments, for example, each memberof the list of connections may comprise a connection status indicator.In certain embodiments, for example, one or more members of the list ofconnections may comprise a disallowed flag indicating, when thedisallowed flag is set to a predetermined value, that the at leastpartially authorized at least a portion of the data pathway isdisallowed. In certain further embodiments, for example, the method maycomprise terminating the at least partially authorized at least aportion of the data pathway if the checking the connection status, basedon detecting the disallowed flag, determines that the at least partiallyauthorized at least a portion of the data pathway is disallowed. Incertain embodiments, for example, the connection status of a member ofthe list of connections may be updated at least based on the parsedmetadata. In certain further embodiments, for example, a disallowed flagof a member of the list of connections may be set at least based on theparsed metadata.

In certain embodiments, for example, the method may further comprise,for each one of the transported plural packets from the firstapplication: comparing a destination port number with a white list ofauthorized destination port numbers.

Certain embodiments may provide, for example, a method to securelytransport plural data packets, comprising: i) configuring a data pathwayfrom a first application executing on a first node to a secondapplication executing on a second node; ii) exchanging nodeidentification codes over at least a portion of the data pathway to atleast partially authorize the at least a portion of the data pathway;and iii) for each one of the transported plural packets from the firstapplication: a) executing operating system commands to verify that theat least partially authorized at least a portion of the data pathwayremains unaltered; b) reading first application user and data protocolmetadata to obtain at least one descriptor; and c) comparing the atleast one descriptor with a static list of authorized descriptors.

Certain embodiments may provide, for example, a multifactor methodhaving overlapping security layers to securely transport plural datapackets from a first application executing on a first node to a secondapplication executing on a second node, processor, or computing device.In certain embodiments, for example, each one of the plural data packetsmay share a common data protocol with each other one of the plural datapackets. In certain further embodiments, for example, the method maycomprise: configuring a series of dedicated network tunnels, andexchanging and authorizing node identification codes over the encryptedsecond middleware tunnel using at least two single-use cryptographickeys to authorize the second network tunnel independently of theconfiguring. In certain further embodiments, for example, the series ofnetwork tunnels may comprise: a first network tunnel between a firstapplication port associated with the first application and a firstsecurity middleware port associated with first security middleware onthe first node, a second network tunnel between the first securitymiddleware port and a second security middleware port associated withsecond security middleware on the second node, the second network tunnelencrypted based on shared secret cryptography, and a third networktunnel between the second security middleware port and a secondapplication port associated with a second application on the secondnode, processor, or computing device. In certain further embodiments,for example, the method may comprise, for each one of the transportedplural data packets arriving at the second security middleware port:executing operating system commands to verify that connection states ofthe series of dedicated network tunnels are unchanged, encrypting,inserting, decrypting, and reading first application user and dataprotocol metadata, the encrypting and decrypting each using a single-usecryptographic key, and comparing the first application user and dataprotocol metadata with members of a static list (for example a staticlist of authorized 2-tuples).

Certain embodiments may provide, for example, a multifactor methodhaving overlapping security layers to securely transport plural datapackets from a first application executing on a first node to a secondapplication executing on a second node, each one of the plural datapackets sharing a common data protocol with each other one of the pluraldata packets, comprising: i) configuring a series of dedicated networktunnels comprising: a) a first network tunnel between a firstapplication port associated with the first application and a firstsecurity middleware port associated with first security middleware onthe first node; b) a second network tunnel between the first securitymiddleware port and a second security middleware port associated withsecond security middleware on the second node, the second network tunnelencrypted based on shared secret cryptography; and c) a third networktunnel between the second security middleware port and a secondapplication port associated with a second application on the secondnode; ii) exchanging and authorizing node identification codes over theencrypted second middleware tunnel using at least two single-usecryptographic keys to authorize the second network tunnel independentlyof the configuring; and for each one of the transported plural datapackets arriving at the second security middleware port: iii) executingoperating system commands to verify that connection states of the seriesof dedicated network tunnels are unchanged; iv) encrypting, inserting,decrypting, and reading first application user and data protocolmetadata, the encrypting and decrypting each using a single-usecryptographic key; and v) comparing the first application user and dataprotocol metadata with members of a static list.

Certain embodiments may provide, for example, a method to provisionresources for authorized communication over a network, comprising:detecting an attempt by a first user of a first program to trigger atransmission of data from a first port on a first node to a second porton a second node, filtering the attempt to determine whether the attemptis permissible, and if the attempt is permissible, configuring a datapathway for transmitting the data, the data pathway comprising a thirdport and a fourth port each interposed between the first port and thesecond port. In certain further embodiments, for example, the filteringmay be based at least on: identity of the first user, identity of thefirst program, and the second port.

In certain embodiments, for example, the attempt may comprise aconnection request (for example a connection request initiated at anetwork application programming interface).

In certain embodiments, for example, the configuring may furthercomprise recording a connection state of at least a portion of the datapathway. In certain embodiments, for example, the configuring mayfurther comprise recording a connection state of at least a portion ofthe data pathway having the third port and the fourth port as endpoints.In certain embodiments, for example, the configuring may furthercomprise recording a connection state of the data pathway.

In certain embodiments, for example, the determining may comprisecomparing the attempt to a list of permissible attempts.

In certain embodiments, for example, at least a portion of the list ofpermissible attempts may be maintained on the first node solely inkernel random access memory. In certain further embodiments, forexample, the at least a portion of the list of permissible attempts maycomprise a list of data destination ports and, for each member of thelist of destination ports, a user (for example a user of an applicationassociated with the destination port). In certain further embodiments,for example, the at least a portion of the list of permissible attemptsmay comprise an application program. In certain embodiments, forexample, the at least a portion of the list of permissible attempts maybe accessible solely by a singular program executing in the kernel. Incertain further embodiments, for example, the at least a portion of thelist of permissible attempts may be loaded into the kernel random accessmemory of the first node from a file (for example a file resident on anon-transitory computer-readable storage medium (for example anonvolatile memory) of the first node) solely by a different singularprogram.

In certain embodiments, for example, the file may be cryptographicallysigned. In certain embodiments, for example, the file may be encrypted.In certain embodiments, for example, the file may be read-only. Incertain embodiments, for example, the file may be a kernel access-onlyfile. In certain embodiments, for example, the file may be a kernelaccess-only file. In certain embodiments, for example, the file may notbe a kernel access-only file. In certain embodiments, for example, thefile may be a binary file. In certain embodiments, for example, the filemay be accessible from the first node solely be a single program (forexample a program executing in an OSI application layer of the firstnode) executing on a processor of the first node, processor, orcomputing device. In certain embodiments, for example, the file may be aread-only, encrypted file readable only by a single program executing ona processor of the first node, processor, or computing device.

In certain embodiments, for example, the first port, second port, thirdport, and fourth port may each be restricted to establishing no morethan a single data communications session. In certain embodiments, forexample, the data may pass through each port.

In certain embodiments, for example, the first port may be exclusivelyassociated with a first user mode program. In certain embodiments, forexample, the first port may be exclusively associated with a firstapplication program. In certain embodiments, for example, the secondport may be exclusively associated with a second user mode program. Incertain embodiments, for example, the second port may be exclusivelyassociated with a second application program. In certain embodiments,for example, the first port may be exclusively associated with a firstuser mode program and the second port may be exclusively associated witha second application program. In certain embodiments, for example, thefirst port may be exclusively associated with a first user mode program.In certain embodiments, for example, the first port may be exclusivelyassociated with a first user mode program. In certain embodiments, forexample, the second port may be exclusively associated with a seconduser mode program. In certain embodiments, for example, the second portmay be exclusively associated with a second user mode program. Incertain embodiments, for example, the first port may be exclusivelyassociated with a first user mode program and the second port may beexclusively associated with a second user mode program.

In certain embodiments, for example, the data may be translated into acommon format (for example a format based on MQ Telemetry Transportprotocol) for transport between the third and fourth port.

Certain embodiments may provide, for example, a method of transmittingnon-malicious packets of data over a network, comprising: loading datapacket filters into random access memory on a first node coupled to thenetwork, initializing a network tunnel (and/or an encryptedcommunication pathway) to transmit the data, assigning one of the loadeddata packet filters to the network tunnel (and/or the encryptedcommunication pathway), passing packets of data from the transmittingapplication through the assigned data packet filter, encrypting at leasta portion of the filtered packets, and transmitting through the networktunnel (and/or the encrypted communication pathway) only the filteredpackets having at least a destination port number, a data sourceapplication, and a user of the data source application matching theassigned data packet filter.

In certain embodiments, for example, the data packet filter may furthercomprise a destination network address. In certain embodiments, forexample, an encryption key used in the encrypting may be used only once.In certain embodiments, for example, initializing the network tunnel(and/or the encrypted communication pathway) may comprise shared secretcryptography. In certain embodiments, for example, the network tunnel(and/or the encrypted communication pathway) may be unidirectional. Incertain embodiments, for example, the network tunnel (and/or theencrypted communication pathway) may be bidirectional. In certainembodiments, for example, each one of the data packet filters maycomprise a sequential series of sub-filters.

Certain embodiments may provide, for example, a method of transmittingnon-malicious packets of data over a network, comprising: loading datapacket filters into random access memory on a first node coupled to thenetwork, initializing a network tunnel (and/or an encryptedcommunication pathway) to receive the data, assigning one of the loadeddata packet filters to the network tunnel (and/or the encryptedcommunication pathway), receiving packets of data from the networktunnel (and/or the encrypted communication pathway), passing the packetsof data through the assigned data packet filter, and passing to an OSIapplication layer of the first node only the filtered packets having atleast a destination port number, a data source application, a user ofthe data source application, and a data protocol descriptor matching theassigned data packet filter.

In certain embodiments, for example, filtered packets passed to the OSIapplication layer further may have a command type descriptor having avalue and/or falling in a range specified by the assigned data packetfilter. In certain embodiments, for example, filtered packets passed tothe OSI application layer may further have a date and/or time falling ina range specified by the assigned data packet filter. In certainembodiments, for example, filtered packets passed to the OSI applicationlayer further may have an expected elapse time falling in a rangespecified by the assigned data packet filter. In certain embodiments,for example, the data protocol descriptor may conform to an MQ TelemetryTransport protocol. In certain embodiments, for example, the dataprotocol descriptor may conform to a file transfer protocol. In certainembodiments, for example, the data protocol descriptor may conform to adomain name server protocol. In certain embodiments, for example, thedata protocol descriptor may conform to an internet control messageprotocol. In certain embodiments, for example, the data protocoldescriptor may conform to a structured query language protocol. Incertain embodiments, for example, the data protocol descriptor mayconform to a publish-subscribe messaging pattern protocol. In certainembodiments, for example, the data protocol descriptor may conform to adata distribution service protocol. In certain embodiments, for example,the data protocol descriptor may comprise a publish-subscribe topicidentifier. In certain embodiments, for example, the data protocoldescriptor may comprise a data structure identifier. In certainembodiments, for example, the data protocol descriptor may comprise adata type identifier. In certain embodiments, for example, the dataprotocol descriptor may comprise a data definition identifier.

Certain embodiments may comprise, for example, a method of transmittingnon-malicious packets of data over a network. In certain embodiments,for example, the method may comprise: loading data packet filters intokernel random access memory (or in certain other embodiments, forexample, loading the data packet filters in application space memory) ona first node coupled to the network, initializing a network tunnel(and/or an encrypted communication pathway) to transmit the data,assigning one of the loaded data packet filters to the network tunnel(and/or the encrypted communication pathway), passing packets of datafrom the transmitting application through the assigned data packetfilter, encrypting at least a portion of the filtered packets, andtransmitting through the network tunnel (and/or encrypted communicationpathway) only the filtered packets having at least an application portnumber, an encrypted port number, a data protocol field, and adestination port number matching the assigned data packet filter.

In certain embodiments, for example, the data may be application programdata. In certain embodiments, for example, the data may be a file or aportion thereof (for example an executable file). In certainembodiments, for example, an encryption key used in the encrypting maybe a single-use key. In certain embodiments, for example, the encryptionkey may be used only once. In certain embodiments, for example,initializing the network tunnel (and/or the encrypted communicationpathway) may comprise shared secret cryptography. In certainembodiments, for example, the network tunnel (and/or the encryptedcommunication pathway) may be unidirectional. In certain embodiments,for example, the network tunnel (and/or the encrypted communicationpathway) may be bidirectional. In certain embodiments, for example, eachone of the data packet filters may comprise a sequential series ofsub-filters. In certain embodiments, for example, the method may furthercomprise: transmitting to the network only the filtered packetscontaining a parameter specifying a file size of a file, wherein thefile size falls in a range specified by the assigned data packet filter.In certain embodiments, for example, the method may further comprise:transmitting to the network only the filtered packets containing aparameter specifying a command type, wherein the command type has avalue and/or falls in a range specified by the assigned data packetfilter. In certain embodiments, for example, the method may furthercomprise: transmitting to the network only the filtered packetscontaining a parameter specifying a date and/or time, wherein thespecified data and/or time falls in a range specified by the assigneddata packet filter. In certain embodiments, for example, the method mayfurther comprise: transmitting to the network only the filtered packetscontaining a parameter specifying a an expected elapsed time, whereinthe expected elapsed time falls in a range specified by the assigneddata packet filter. In certain further embodiments, for example, themethod may further comprise: transmitting to the network only thefiltered packets having an actual and/or estimated transmission timefalling in a range specified by the assigned data packet filter.

In certain embodiments, for example, the data protocol field mayidentify an MQTT protocol. In certain embodiments, for example, the dataprotocol field may conform to a publish-subscribe messaging patternprotocol (for example a data distribution service (DDS) protocol). Incertain embodiments, for example, the data protocol field may identify aConstrained Application Protocol (CaOP). In certain embodiments, forexample, the data protocol field may identify an OMA LightweightM2M(LWM2M) protocol. In certain embodiments, for example, the data protocolfield may identify a JavaScript Object Notation (JSON) protocol. Incertain embodiments, for example, the data protocol field may identify aRepresentational State Transfer (REST) protocol. In certain embodiments,for example, the data protocol field may identify an OPC UnifiedArchitecture (OPC-UA) protocol. In certain embodiments, for example, thedata protocol field may identify a file transfer protocol. In certainembodiments, for example, the data protocol field may identify a domainname server protocol. In certain embodiments, for example, the dataprotocol field may identify an internet control message protocol. Incertain embodiments, for example, the data protocol field may identify astructured query language protocol. In certain embodiments, for example,the data protocol field may comprise a publish-subscribe topicidentifier. In certain embodiments, for example, the data protocol fieldmay comprise a data structure identifier. In certain embodiments, forexample, the data protocol field may comprise a data type identifier. Incertain embodiments, for example, the data protocol field may comprise adata definition identifier.

Certain embodiments may provide, for example, a network security productfor managing all port-to-port communications of a networked processornode, processor, or computing device. In certain embodiments, forexample, the product may comprise a non-transitory computer-readablestorage medium having a configuration file embodied therein forprocessing in the networked processor node by network security softwareto define authorized port-to-port communications. In certainembodiments, for example, the configuration file may comprise auniversal nonpublic identifier for the networked processor node,processor, or computing device. In certain further embodiments, forexample, the configuration file may comprise a series of recordscomprising parameters for authorized port-to-port communications. Incertain embodiments, for example, each of one or more of (for exampleeach of) the series of records may comprise an identifier for anauthorized application resident on the networked processor node,processor, or computing device. In certain embodiments, for example,each of one or more of (for example each of) the series of records maycomprise an identifier for an authorized user associated with theauthorized application resident on the networked processor node,processor, or computing device. In certain embodiments, for example,each of one or more of (for example each of) the series of records maycomprise a universal nonpublic identifier for a remote networkedprocessor node, processor, or computing device. In certain embodiments,for example, each of one or more of (for example each of) the series ofrecords may comprise an identifier for an authorized applicationresident on the remote networked processor node, processor, or computingdevice. In certain embodiments, for example, each of one or more of (forexample each of) the series of records may comprise an identifier for anauthorized user associated with the authorized application resident onthe remote networked processor node, processor, or computing device. Incertain embodiments, for example, each of one or more of (for exampleeach of) the series of records may comprise a port associated with theauthorized application resident on the remote networked processor node,processor, or computing device. In certain embodiments, for example,each of one or more of (for example each of) the series of records maycomprise a port associated with a network security software resident onthe remote networked processor node, processor, or computing device. Incertain embodiments, for example, each of one or more of (for exampleeach of) the series of records may comprise a data protocol descriptor.

Certain embodiments may provide, for example, a network security productfor managing all port-to-port communications of a networked processornode, processor, or computing device. In certain embodiments, forexample, the product may comprise a non-transitory computer-readablestorage medium having a configuration file embodied therein forprocessing in the networked processor node by network security softwareto define authorized port-to-port communications. In certainembodiments, for example, the configuration file may comprise auniversal nonpublic identifier for the networked processor node,processor, or computing device. In certain further embodiments, forexample, the configuration file may comprise a series of recordscomprising parameters for authorized port-to-port communications. Incertain embodiments, for example, each of one or more of (for exampleeach of) the series of records may comprise an identifier for anauthorized application resident on the networked processor node, anidentifier for an authorized user associated with the authorizedapplication resident on the networked processor node, a universalnonpublic identifier for a remote networked processor node, anidentifier for an authorized application resident on the remotenetworked processor node, an identifier for an authorized userassociated with the authorized application resident on the remotenetworked processor node, and a data protocol descriptor. In certainfurther embodiments, for example, each of one or more of (for exampleeach of) the series of records may comprise a port associated with theauthorized application resident on the remote networked processor node,processor, or computing device. In certain embodiments, for example,each of one or more of (for example each of) the series of records maycomprise a port associated with a network security software resident onthe remote networked processor node, processor, or computing device.

Certain embodiments may provide, for example, a network security productfor managing all port-to-port communications of a networked processornode, the product comprising a non-transitory computer-readable storagemedium having a configuration file embodied therein for processing inthe networked processor node by network security software to defineauthorized port-to-port communications, the configuration filecomprising: i) a universal nonpublic identifier for the networkedprocessor node; and ii) a series of records comprising parameters forauthorized port-to-port communications, each of the series of recordscomprising at least two of the following: a) an identifier for anauthorized application resident on the networked processor node; b) anidentifier for an authorized user associated with the authorizedapplication resident on the networked processor node; c) a universalnonpublic identifier for a remote networked processor node; d) anidentifier for an authorized application resident on the remotenetworked processor node; e) an identifier for an authorized userassociated with the authorized application resident on the remotenetworked processor node; f) optionally, a port associated with theauthorized application resident on the remote networked processor node;g) optionally, a port associated with a network security softwareresident on the remote networked processor node; and h) optionally, adata protocol descriptor.

Certain embodiments may provide, for example, a distributed system. Incertain embodiments, for example, the distributed system may comprise:plural security programs resident on computer-readable storage media ofplural networked nodes, the plural security programs cooperativelyconfigured to negotiate dedicated data pathways for port-to-portcommunications between the plural networked nodes. In certainembodiments, for example, the negotiating may comprise, on a first node,negotiating a first data pathway between a first user-application and afirst network security program of the plural security programs. Incertain embodiments, for example, the negotiating may comprise, on asecond node, negotiating a second data pathway between a second networksecurity program of the plural security programs and a seconduser-application. In certain embodiments, for example, the negotiatingmay comprise negotiating a third data pathway between the first networksecurity program and the second network security program, the third datapathway comprising a network tunnel and/or an encrypted communicationpathway. In certain embodiments, for example, each of the first datapathway, second data pathway, and third data pathway participate to format least a part of a dedicated data pathway for exclusivelycommunicating data from a first port of the first user-application to asecond port of the second user-application.

In certain embodiments, for example, the first data pathway and/or thesecond data pathway may comprise a TCP connection. In certainembodiments, for example, the third data pathway may comprise a UDPconnection. In certain embodiments, for example, the first data pathwayand/or the second data pathway may comprise a TCP connection, and thethird data pathway may comprise a UDP connection.

Certain embodiments may provide, for example, a distributed systemcomprising: plural security programs resident on computer-readablestorage media of plural networked nodes, the plural security programscooperatively configured to negotiate dedicated data pathways forport-to-port communications between the plural networked nodes, thenegotiating comprising: i) on a first node, negotiating a first datapathway between a first user-application and a first network securityprogram of the plural security programs; ii) on a second node,negotiating a second data pathway between a second network securityprogram of the plural security programs and a second user-application;and iii) negotiating a third data pathway between the first networksecurity program and the second network security program, the third datapathway comprising a network tunnel and/or an encrypted communicationpathway, each of the first data pathway, second data pathway, and thirddata pathway participate to form at least a part of a dedicated datapathway for exclusively communicating data from a first port of thefirst user-application to a second port of the second user-application.

Certain embodiments may provide, for example, a method of securing anode connected to the internet, comprising: authorizing incoming packetsby comparing metadata from the packets to a list of authorized packetsources, applications, and payload protocols, and allowing only payloadsfrom authorized packets to pass to an OSI application layer of the node,processor, or computing device. In certain further embodiments, forexample, the method may be performed at a rate of at least 95% of wirespeed and at most 10% processor load.

Certain embodiments may provide, for example, a method of securing anode (for example a computing device) connected to the internet. Incertain embodiments, for example, the method may comprise: authorizingincoming IP packets at wire speed, allowing only payloads fromauthorized incoming IP packets to pass to an OSI application layer ofthe node, authorizing outgoing packets, allowing only authorizedoutgoing packets to pass to the internet. In certain furtherembodiments, for example, the method may be performed at a rate of atleast 95% of wire speed and at most 10% processor load. In certainfurther embodiments, for example, the authorizing the incoming packetsmay comprise comparing metadata from the incoming packets to a list ofauthorized packet sources, applications, and payload protocols. Incertain embodiments, for example, the authorizing the outgoing packetsmay comprise processing a list of authorized sending applications, thelist containing, for each sending application present on the list ofauthorized sending applications, a port associated with the sendingapplication.

In certain embodiments, for example, one of the foregoing methods tosecure may induce a processor load of less than 5% according to the LoadBenchmark Test.

In certain embodiments, for example, one of the foregoing methods tosecure may slow network packet processing by less than 2 ms according tothe Speed Benchmark Test. In certain embodiments, for example, one ofthe foregoing methods to secure may process at least 50,000 packets persecond according to the Packet Processing Benchmark Test. In certainembodiments, for example, one of the foregoing methods to secure mayprevent the secure node from establishing data communications sessionsif greater than 90% of random access memory is utilized. In certainembodiments, for example, one of the foregoing methods to secure may befurther configured to terminate all secure node data communicationssessions if greater than 99% of random access memory is utilized. Incertain embodiments, for example, the metadata may be obtained from apredetermined portion of each packet. In certain embodiments, forexample, the rate and processor load of one of the foregoing methods tosecure may be measured based on an Ethernet port having at least a 1Gigabit (Gb) bandwidth (for example a 10 Gb bandwidth) and having lessthan 10% overhead. In certain embodiments, for example, the processorload may be based on a 1 GHz ARM9 processor running Microlinux.

Certain embodiments may provide, for example, a method of securing acomputing device connected to the internet, comprising: i) authorizingincoming packets, at wire speed, by comparing metadata from the incomingpackets to a list of authorized packet sources, applications, andpayload protocols; ii) allowing only payloads from authorized incomingpackets to pass to the OSI application layer of the node; iii)authorizing outgoing packets, based on a list of authorized source portsand sending applications; and iv) allowing only authorized outgoingpackets to pass to the internet, at a rate of at least 95% of wire speedand at most 10% processor load.

Certain embodiments may provide, for example, a secure node comprising aprocessor, random access memory, and network security software, thenetwork security software configured to: match, in a kernel of thesecure node (or, in certain other embodiments, for example, anapplication space of the secure node), a destination port number of eachincoming network packet to a member of a list of authorized destinationports, decrypt metadata from each incoming network packet, and comparethe decrypted metadata to a list of authorized n-tuples, each n-tuplesin the list of authorized n-tuples comprising descriptors for: a packetpayload source application and a payload protocol. In certain furtherembodiments, for example, the matching, decrypting, and comparing may beperformed at a rate of at least 95% of wire speed and at most 10%processor load based on a 1 Gb Ethernet port having less than 10%overhead.

In certain embodiments, for example, the network security software mayinduce a processor load of less than 5% according to the Load BenchmarkTest. In certain embodiments, for example, the network security softwaremay slow network packet processing by less than 2 ms according to theSpeed Benchmark Test. In certain embodiments, for example, the node mayprocess at least 50,000 packets per second according to the PacketProcessing Benchmark Test. In certain embodiments, for example, thenetwork security software may be further configured to prevent thesecure node from establishing data communications sessions if greaterthan 90% of random access memory is utilized. In certain embodiments,for example, the network security software may be further configured toterminate all secure node data communications sessions if greater than99% of random access memory is utilized. In certain embodiments, forexample, packet payload source application descriptor may comprise anapplication identifier and a user identifier. In certain embodiments,for example, the metadata may be obtained from a predetermined portionof each packet.

In certain embodiments, for example, the processor load may be based onan Ethernet port having at least a 1 Gigabit (Gb) bandwidth (for examplea 10 Gb bandwidth) and having less than 10% overhead. In certainembodiments, for example, the processor load may be based on a 1 GHzARM9 processor running Microlinux. In certain embodiments, for example,the metadata may be decrypted using a symmetric decryption algorithm(for example 256-bit AES). In certain further embodiments, for example,the decrypting may comprise using a cryptographic key (for example acryptographic key derived from Elliptic-Curve Diffie-Hellman (ECDH) keyexchange. In certain further embodiments, for example, the key may be asingle-use key. In certain embodiments, for example, the key may be arotated key.

In certain embodiments, for example, the network security software maybe configured to drop (or discard) an incoming network packet if adestination port number of the network packet is not present on the listof authorized destination ports.

In certain further embodiments, for example, the matching may furthercomprise checking a connection state associated with the destinationport number. In certain embodiments, for example, the network securitysoftware may be configured to drop an incoming network packet based on astatus of a connection state associated with a destination port of thenetwork packet (for example if the connection state is not open).

In certain embodiments, for example, the decrypting and comparing may beperformed in an OSI application layer of the secure node, processor, orcomputing device.

In certain embodiments, for example, the list of sending applicationsand authorized ports may comprise a security middleware applicationhaving a root user and a port associated with the security middlewareapplication. In certain embodiments, for example, the list of sendingapplications and authorized ports may comprise an application programand a port associated with the application program.

Certain embodiments may provide, for example, a node preconfigured toconstrain communication over a network, comprising: a file stored onnon-transitory computer-readable storage medium, the file defining alist of authorized data communications sessions, each record of the filecomprising. In certain further embodiments, for example, each record ofthe file may further comprise: a) a universal identifier for a datasource, comprising an authorized source application identifier and anidentifier for an authorized user of the source application; b) auniversal identifier for a data destination, comprising an authorizeddestination application identifier and an identifier for an authorizeduser of the destination application; c) a port associated with thedestination application; d) a different port associated with amiddleware; and e) a data protocol field.

In certain embodiments, for example, the file may be a binary file. Incertain embodiments, for example, the file may be a variable recordlength file. In certain embodiments, for example, the file may beencrypted on the non-transitory computer-readable storage medium. Incertain embodiments, for example, the port associated with thedestination application may communicate with the middleware by aloopback interface. In certain embodiments, for example, the differentport associated with the middleware may be an endpoint of an encryptedtunnel-portion of an authorized data communications session of theauthorized data communications sessions. In certain embodiments, forexample, each record of the file may comprise a network interfacecontroller code for a network interface controller present on the node,processor, or computing device. In certain further embodiments, forexample, a network address of the network interface controller may bedetermined based at least in part on the network interface controllercode. In certain embodiments, for example, each record of the file mayfurther comprise a different network interface controller code for anetwork interface controller present on a remote node, processor, orcomputing device. In certain further embodiments, for example, a networkaddress of the remote network interface controller may be determinedbased at least in part on the different network interface controllercode. In certain embodiments, for example, each record of the file maycomprise a nonpublic identification code for the node, processor, orcomputing device. In certain embodiments, for example, each record ofthe file may comprise a nonpublic identification code for a remote node,processor, or computing device.

In certain embodiments, for example, each record of the file maycomprise a private key (or a cryptographic parameter or primitive). Incertain further embodiments, for example, the private key may be used bya key exchange algorithm executing on a processor of the node toestablish a shared key with a remote node, processor, or computingdevice. In certain embodiments, each record of the file has a differentprivate key.

In certain embodiments, for example, a portion of the file may be readinto kernel random access memory on boot-up of the node, processor, orcomputing device. In certain embodiments, for example, the file may beaccessible only by a kernel of the node, processor, or computing device.In certain embodiments, for example, the file may be accessible only bya root user of the node, processor, or computing device. In certainembodiments, for example, the file may be accessible by an applicationprogram module executed by a root user.

Certain embodiments may provide, for example, a node preconfigured toconstrain communication over a network, comprising: a file stored onnon-transitory computer-readable storage medium, the file defining alist of authorized data communications sessions, each record of the filecomprising: a) a universal identifier for a data source, comprising anauthorized source application identifier and an identifier for anauthorized user of the source application; b) a universal identifier fora data destination, comprising an authorized destination applicationidentifier and an identifier for an authorized user of the destinationapplication; c) a port associated with the destination application; d) adifferent port associated with a middleware; e) a data protocol field;f) a network interface controller code for a network interfacecontroller present on the node; g) a different network interfacecontroller code for a network interface controller present on a remotenode; h) a nonpublic identification code for the node; i) a differentnonpublic identification code for the remote node; and j) a private keyprovisioned for use by a key exchange algorithm executing on the node toestablish a shared key with the remote node, processor, or computingdevice.

Certain embodiments may provide, for example, a node preconfigured toconstrain communication over a network, comprising a file stored onnon-transitory computer-readable storage medium, the file having a listof authorized data communications sessions. In certain furtherembodiments, for example, each member of the list may comprise: an indexdefined by an application authorized to be executed on the processor andan authorized user of the application, a unique 2-tuple consisting of aport number assigned to the application and a port number assigned to anetwork security middleware, a unique 2-tuple consisting of a portnumber assigned to a remote application and a port number assigned to aremote network security middleware, and a data protocol descriptor.

In certain embodiments, for example, the file may be read-only. Incertain embodiments, for example, the file may be cryptographicallysigned. In certain embodiments, for example, the read-only file may beencrypted. In certain embodiments, for example, the read-only file maybe a binary file. In certain embodiments, for example, one member of thelist may have a different record length than another member of the list.

In certain embodiments, for example, the index of a member of the listmay be derived from a concatenation of a user name (or a portionthereof) and an application name (or a portion thereof), or at leastportions thereof.

In certain embodiments, for example, the port number assigned to theapplication may appear only once in the list. In certain embodiments,for example, the port number assigned to the network security middlewaremay appear only once in the list. In certain embodiments, for example,the port number assigned to a remote application appears only once inthe list. In certain embodiments, for example, the port number assignedto the remote network security middleware appears only once in the list.In certain embodiments, for example, each of the port number assigned tothe application, port number assigned to the network securitymiddleware, port number assigned to a remote application, and the remotenetwork security middleware may appear only once in the list. In certainembodiments, for example, the data protocol descriptor may appear in aplurality of members of the list.

Certain embodiments may provide, for example, a node preconfigured toconstrain communication over a network, comprising: a processor, anon-transitory computer-readable storage medium, and a read-only filestored on the non-transitory computer-readable storage medium. Incertain further embodiments, for example, the file may comprise pluraln-tuples, the plural n-tuples defining an exclusive list of authorizeddata communications sessions. In certain further embodiments, forexample, each one of the plural n-tubles may comprise: an index definedby an application authorized to be executed on the processor and anauthorized user of the application, a unique 2-tuple consisting of aport number assigned to the application and a port number assigned to anetwork security middleware, a unique 2-tuple consisting of a portnumber assigned to a remote application and a port number assigned to aremote network security middleware, and a data protocol descriptor.

In certain embodiments, for example, the network security middleware maybe stored on the non-transitory computer-readable storage medium.

In certain embodiments, for example, the remote application and theremote network security middleware may reside on a common remote node,processor, or computing device. In certain embodiments, for example, theremote application and the remote network security middleware may resideon separate remote nodes. In certain further embodiments, for example,the remote network security middleware may reside on a software-definedperimeter controller.

In certain embodiments, for example, the read-only file may becryptographically signed. In certain embodiments, for example, theread-only file may be encrypted. In certain embodiments, for example,the read-only file may be a binary file. In certain embodiments, forexample, one of the n-tuples may have a different record length thananother one of the n-tuples.

In certain embodiments, for example, the node may further comprise:network security software stored on the non-transitory computer-readablestorage medium different from the network security middleware, thedifferent network security software having sole permission to read thefile. In certain further embodiments, for example, the different networksecurity software may be configured to be executed by the processor toload at least a portion of the file into the kernel random accessmemory. In certain embodiments, for example, the different networksecurity software may be executed in an OSI application layer of thenode, processor, or computing device. In certain embodiments, forexample, the different network security software may be executed in akernel of the node, processor, or computing device. In certain furtherembodiments, for example, the at least a portion of the file may beloaded solely upon boot-up of the node, processor, or computing device.

In certain embodiments, for example, the network security middleware maybe configured to be executed by the processor to prevent initializationof any data communications session except for the list of authorizeddata communications sessions.

Certain embodiments may provide, for example, a node preconfigured toconstrain communication over a network, comprising: i) a processor; ii)a non-transitory computer-readable storage medium; iii) a read-only filestored on the non-transitory computer-readable storage medium, the filecomprising plural n-tuples, the plural n-tuples defining an exclusivelist of authorized data communications sessions, each one of the pluraln-tubles comprising: a) an index defined by an application authorized tobe executed on the processor and an authorized user of the application;b) a unique 2-tuple consisting of a port number assigned to theapplication and a port number assigned to a network security middleware,the network security middleware stored on the non-transitorycomputer-readable storage medium; c) a unique 2-tuple consisting of aport number assigned to a remote application and a port number assignedto a remote network security middleware; and d) a data protocoldescriptor.

Certain embodiments may provide, for example, a method to retrofit acomputing device coupled to a network. In certain embodiments, forexample, the method may comprise: storing an encrypted file on anon-transitory computer-readable storage medium of the computing device,installing network security software on the non-transitorycomputer-readable storage medium of the computing device, settingpermissions of the file whereby the file is readable only by the networksecurity software; and modifying a network stack resident on thecomputing device to receive or intercept each data packet incoming fromor outgoing to the network. In certain further embodiments, for example,the file may comprise a list interpretable by the network securitymiddleware to define authorized communication sessions and an authorizeddata protocol for each authorized communication session of theauthorized communication sessions. In certain further embodiments, forexample, the network security software may be configured to load atleast a portion of the file into kernel random access memory uponboot-up of the computing device. In certain further embodiments, forexample, the network stack may be modified to route each received orintercepted data packet through the network security middleware. Incertain further embodiments, for example, the network securitymiddleware may be configured to drop a received or an intercepted datapacket unless the received or intercepted data packet is authorized tobe transmitted using one of the authorized communication sessions.

In certain embodiments, for example, the method may be exclusive of anymodification to a pre-existing application program. In certainembodiments, for example, the modifying a network stack may comprisemodifying a network protocol application programming interface. Incertain embodiments, for example, the method may further comprise:installing cryptographic primitives (for example cryptographicprimitives provided by Secured Socket Layer (SSL) software) to enable aseparate encrypted network tunnel to be established for each authorizedcommunication session of the authorized communication sessions.

Certain embodiments may provide, for example, a method to retrofit acomputing device coupled to a network, comprising: i) storing anencrypted file on a non-transitory computer-readable storage medium ofthe computing device, the file comprising a list interpretable bynetwork security middleware executing on the computing device to defineauthorized communication sessions and an authorized data protocol foreach authorized communication session of the authorized communicationsessions; ii) installing the network security software on thenon-transitory computer-readable storage medium of the computing device,the network security software configured to load at least a portion ofthe file into kernel random access memory (or, in certain otherembodiments, for example, into application space memory) upon boot-up ofthe computing device; iii) setting permissions of the file whereby thefile is readable only by the network security software; and iv)modifying a network stack resident on the computing device to: a)receive or intercept each data packet incoming from or outgoing to thenetwork; and b) route each received or intercepted data packet throughthe executing network security middleware, the network securitymiddleware configured to drop a received or an intercepted data packetunless it is authorized to be transmitted using one of the authorizedcommunication sessions.

Certain embodiments may provide, for example, a secure system. Incertain embodiments, for example, the secure system may comprise: anetwork configured to transmit data based on at least one networkpacket-based protocol, and plural nodes coupled to the network, each oneof the plural nodes comprising a network stack, a network protocolapplication programming interface, and middleware. In certain furtherembodiments, for example, the network protocol application programminginterface may be configured to pass each data packet received to themiddleware. In certain further embodiments, for example, the middlewaremay be configured to verify, prior to sending data towards a destinationport, that the data: has been generated by an authorized application,conforms to an authorized data protocol, has been received from anauthorized node, contains at least one port number that is present on apredetermined list of port numbers.

In certain embodiments, for example, the middleware may obtain data froma data packet passing through the network stack. In certain embodiments,for example, the data packet may be encrypted. In certain embodiments,for example, the middleware may generate metadata, encrypt metadata, andinsert metadata into a partially assembled network packet.

In certain embodiments, for example, the at least one networkpacket-based protocol may comprise Ethernet protocol. In certainembodiments, for example, the at least one network packet-based protocolmay comprise Wi-Fi protocol. In certain embodiments, for example, the atleast one network packet-based protocol may comprise Bluetooth protocol.

In certain embodiments, for example, the at least one port number may beassociated with an application responsible for producing a data packet.In certain embodiments, for example, the at least one port number may beassociated with source port (for example may be a source port) in anetwork packet header. In certain embodiments, for example, the at leastone port number may be associated with a destination port (for examplemay be a destination port) in a network packet header.

Certain embodiments may provide, for example, a secure system,comprising: i) a network configured to transmit data based on at leastone network packet-based protocol; and ii) plural nodes coupled to thenetwork, each one of the plural nodes comprising a network stack, anetwork protocol application programming interface, and middleware, thenetwork protocol application programming interface configured to passeach data packet received to the middleware, the middleware configuredto verify, prior to sending data towards a destination port, that thedata: a) has been generated by an authorized application; b) conforms toan authorized data protocol; c) has been received from an authorizednode; and d) contains at least one port number that is present on apredetermined list of port numbers.

Certain embodiments may provide, for example, a secure system,comprising: i) a network configured to transmit data based on at leastone network packet-based protocol; and ii) plural nodes coupled to thenetwork, each one of the plural nodes comprising a network stack, anetwork protocol application programming interface, and a middleware,invocation of the middleware being triggered by each data packetcrossing the network protocol application programming interface for thefirst time, the middleware configured to verify, prior to sending datatowards a destination port, that the data: a) has been generated by anauthorized application, as determined based at least on metadataobtained by the middleware; b) conforms to an authorized data protocol,as determined based at least on the metadata; c) has been received froman authorized node; and d) contains at least one port number that ispresent on a predetermined list of port numbers.

Certain embodiments may provide, for example, a distributed method tosecure plural computing devices coupled to a network. In certainembodiments, for example, the distributed method may comprise: havingpreprovisioned (or predetermined) configuration files on the pluralcomputing devices, defining authorized port-to-port connections based inpart on information from the configuration files on at least two of theplural computing devices (for example a first configuration file on afirst computing device and a second configuration file on a secondcomputing device), and restricting network communications to and fromthe plural computing devices to the authorized port-to-port connections.

In certain embodiments, for example, the preprovisioned (orpredetermined) configuration files may be read on boot-up. In certainembodiments, for example, the preprovisioned (or predetermined)configuration files may be read by one or more application spaceprograms. In certain embodiments, for example, the preprovisioned (orpredetermined) configuration files may be read by one or more kernelspace programs. In certain embodiments, for example, the preprovisioned(or predetermined) configuration files may be read by a combination ofapplication space programs and kernel space programs.

In certain embodiments, for example, each one of the authorizedport-to-port connections may comprise: a first socket referenced byfirst network security software executing on a first computing device ofthe plural computing devices; and a second socket referenced by networksecurity software. In certain further embodiments, for example, thenetwork security software may execute on: a second computing device ofthe plural computing devices, a third computing device executing anauthorized deployment server, the authorized deployment serverexclusively responsible for managing the static, preconfigured list ofauthorized pathways, or a fourth computing device executing a gatewayserver, network communication of the gateway server restricted to theauthorized pathways. In certain embodiments, for example, data may bepassed to the gateway server and processed by network security softwareon the fourth computing device unless the data is received from one ofthe authorized pathways. In certain embodiments, for example, the fourthcomputing device may be constrained, by an operating system, toexecuting only a static, preconfigured list of computer programs. Incertain embodiments, for example, one or more of the preprovisioned (orpredetermined) configuration files may be distributed by the authorizeddeployment server to at least two of the plural computing devices.

In certain embodiments, for example, the plural computing devices may bephysically located at a common facility (for example a hospital,factory, chemical processing facility, power station, or offshoreplatform).

In certain embodiments, for example, at least one (for example each one)of the authorized port-to-port connections may be stateful. In certainembodiments, for example, at least one (for example each one) of theauthorized port-to-port connections may be stateless.

Certain embodiments may provide, for example, a secured systemcomprising: plural nodes coupled to a network, and plural securityprograms for management of all communication between the plural nodesover the network, the plural security programs cooperatively configuredto form dedicated data pathways for inter-application communicationbetween the plural nodes. In certain further embodiments, for example,at least one of the dedicated data pathways may comprise: a firstsecurity program to send data from a first one of the plural nodes and asecond security program to receive data on a second one of the pluralnodes, and a dedicated encrypted network tunnel between the firstsecurity program and a second security program.

In certain embodiments, for example, the network may be apacket-switched network. In certain embodiments, for example, thereceived data may comprise a series of data packets. In certainembodiments, for example, the first security program may verify thateach data packet of the series of data packets was transmitted from anauthorized application. In certain embodiments, for example, the firstsecurity program may verify that a data packet of the series of datapackets was transmitted from a port associated with an applicationauthorized to transmit the data packet, based at least on a port numberassociated with the transmitting application, an identifier for thetransmitting application, a user of the transmitting application, and adata protocol descriptor for the data packet. In certain embodiments,for example, the second security program may verify that each datapacket of the series of data packets was transmitted from an authorizedapplication. In certain embodiments, for example, the second securityprogram may verify that each data packet of the series of data packetsis being transmitted to an authorized port associated with an authorizedapplication. In certain embodiments, for example, the second securityprogram may verify that a data packet of the series of data packets isbeing transmitted to a port associated with an application authorized toreceive the data packet, based at least on an identifier for thereceiving application, an identifier for an application associated withthe transmission of the data packet, a user of the transmittingapplication, and a data protocol descriptor for the data packet.

Certain embodiments may provide, for example, a secured systemcomprising: plural nodes coupled to a network, a first applicationprogram executing on a first node and a second application programexecuting on a second node, plural security programs for management ofall communication between the plural nodes over the network, and pluralread-only configuration files accessible by the plural securityprograms. In certain embodiments, for example, the plural securityprograms may be cooperatively configured to form a dedicated datapathway for inter-application communication between the firstapplication program and the second application program. In certainfurther embodiments, for example, the dedicated data pathway may passthrough a first security program and a second security program of theplural security programs, the first security program and a secondsecurity program interposed between the first application program andthe second application program, and the data pathway may comprise adedicated encrypted network tunnel between the first security programand a second security program. In certain further embodiments, forexample, each of the plural configuration files may define an exclusivelist of authorized inter-application communications, may further definean exclusive data protocol for each authorized inter-applicationcommunication of the exclusive list of authorized inter-applicationcommunications, may assigning a fixed port number to the first securitysoftware, and may contain nonpublic node identification codes.

In certain embodiments, for example, the fixed port number may be uniqueto a 5-tuple consisting of: an identifier for the first applicationprogram, a user of the first application program, an identifier for thesecond application program, a user of the second application program,and the exclusive data protocol. In certain embodiments, for example,the fixed port number may be unique on the first node and the secondnode to a 5-tuple consisting of: an identifier for the first applicationprogram, a user of the first application program, an identifier for thesecond application program, a user of the second application program,and the exclusive data protocol.

In certain embodiments, for example, each of the plural configurationfiles may be a binary file. In certain embodiments, for example, each ofthe plural configuration files may be divided into records. In certainfurther embodiments, for example, the records may be indexed by thefixed port number.

In certain embodiments, for example, each of the records may have avariable length. In certain embodiments, for example, each of therecords may comprise a private key (or a cryptographic parameter orprimitive). In certain embodiments, for example, each private key may beunique to the secured system.

In certain embodiments, for example, the nonpublic node identificationcodes may comprise a first node identification code assigned to thefirst node and a second node identification code assigned to the secondnode, processor, or computing device.

Certain embodiments may provide, for example, a secured systemcomprising: i) plural nodes coupled to a network; ii) a firstapplication program executing on a first node and a second applicationprogram executing on a second node; iii) plural security programs formanagement of all communication between the plural nodes over thenetwork, the plural security programs cooperatively configured to form adedicated data pathway for inter-application communication between thefirst application program and the second application program, whereinthe dedicated data pathway—a) passes through a first security programand a second security program of the plural security programs, the firstsecurity program and a second security program interposed between thefirst application program and the second application program; and b)comprises a dedicated encrypted network tunnel between the firstsecurity program and a second security program; iv) plural read-onlyconfiguration files accessible by the plural security programs, each ofthe plural configuration files—a) defining an exclusive list ofauthorized inter-application communications; b) further defining anexclusive data protocol for each authorized inter-applicationcommunication of the exclusive list of authorized inter-applicationcommunications; c) assigning a fixed port number to the first securitysoftware; and d) containing nonpublic node identification codes.

Certain embodiments may provide, for example, a secure systemcomprising: plural nodes configured to communicate over a networkexclusively by plural encrypted communication pathways (for example byplural encrypted network tunnels), each one of the plural encryptedcommunication pathways (for example each one of the network tunnels)restricted to transmitting data sent from a single transmittingapplication on a first node of the plural nodes and directed to a singlereceiving application on a second node of the plural nodes. In certainfurther embodiments, for example, each one of the plural encryptedcommunication pathways (for example the plural encrypted networktunnels) may be restricted to transmitting data having a single payloaddata type, and encrypted with a cryptographic key that may be used onlyonce. In certain further embodiments, for example, each one of theplural encrypted communication pathways (for example each one of theplural encrypted network tunnels) may be established by mutual exchangeand authentication of preconfigured application authenticationidentification codes and nonpublic node identification codes. In each ofthe foregoing embodiments, the transmitting application, first node,receiving application, and/or receiving node may be different for eachdifferent encrypted network communication (for example each differentnetwork tunnel) of the plural encrypted network communication pathways(for example of the plural encrypted network tunnels).

In certain embodiments, for example, the plural encrypted communicationpathways (for example the plural encrypted network tunnels) may compriseone or plural unidirectional encrypted communication pathways (forexample one or plural unidirectional encrypted network tunnels). Incertain embodiments, for example, the plural encrypted communicationpathways (for example the plural encrypted network tunnels) may compriseone or plural bidirectional encrypted communication pathways (forexample one or plural bidirectional network tunnels).

In certain embodiments, for example, the plural encrypted communicationpathways (for example the plural encrypted network tunnels) may compriseone or plural stateful data communications sessions. In certainembodiments, for example, the plural encrypted communication pathways(for example the plural encrypted network tunnels) may be at leastpartially managed by middleware present on the plural nodes. In certainembodiments, for example, the plural encrypted communication pathways(for example the plural encrypted network tunnels) may be at leastpartially managed by a broker software present on at least one node ofthe plural nodes.

Certain embodiments may provide, for example, a secure systemcomprising: plural nodes configured to communicate over a networkexclusively by plural encrypted network tunnels, each one of the pluralencrypted network tunnels—i) restricted to transmitting data—a) sentfrom a single transmitting application on a first node of the pluralnodes; b) directed to a single receiving application on a second node ofthe plural nodes; c) having a single payload data type; and d) encryptedwith a cryptographic key that is used only once; and ii) established bymutual exchange and authentication of preconfigured—a) applicationauthentication identification codes; and b) nonpublic nodeidentification codes.

Certain embodiments may provide, for example, a secure system,comprising: plural nodes coupled to a network, plural applicationsoftware executing on at least a first node and a second node of theplural nodes, at least one encrypted network tunnel configured toperform at least a partial data pathway for transport of data from afirst application software of the plural application software on thefirst node of the plural nodes to a second application software of theplural application software on the second node of the plural nodes, thedata conforming to a preconfigured, predefined, pre-established and/orpreprovisioned first data protocol, and at least one security softwareinitiating the at least one encrypted network tunnel. In certain furtherembodiments, for example, the at least one security software may beconfigured to authorize the encrypted network tunnel, based at least onauthorizing the first node, the second node, the first applicationsoftware, and the second application software. In certain furtherembodiments, for example, the at least one security software may beconfigured to confirm that the first application software is authorizedto transmit the first data protocol. In certain further embodiments, forexample, the at least one security software may be positioned betweenthe first application software and the second application software in adata pathway comprising the at least one encrypted network tunnel.

In certain embodiments, for example, the encrypted tunnel may have anendpoint at a port associated with one of the at least one securitysoftware.

In certain embodiments, for example, the at least one security softwaremay be plural security software, and the encrypted tunnel may have afirst endpoint at a first port associated with a first security softwareof the plural security software and a second endpoint at a second portassociated with a second security software of the plural securitysoftware.

In certain embodiments, for example, authorizing the first applicationsoftware may comprise authorizing a user of the first applicationsoftware. In certain embodiments, for example, the at least one securitysoftware may be transparent to the first application software and thesecond application software. In certain embodiments, for example, theauthorize and the confirm may each comprise encrypted communication overthe network. In certain embodiments, for example, the system may beconfigured as a software-defined perimeter. In certain embodiments, forexample, an access controller of the software-defined perimeter maycomprise one of the at least one security software.

Certain embodiments may provide, for example, a secure system,comprising: i) plural nodes coupled to a network; ii) plural applicationsoftware executing on at least a first node and a second node of theplural nodes; iii) at least one encrypted network tunnel configured toperform at least a partial data pathway for transport of data from afirst application software of the plural application software on thefirst node of the plural nodes to a second application software of theplural application software on the second node of the plural nodes, thedata conforming to a preconfigured, predefined, pre-established and/orpreprovisioned first data protocol; and iv) at least one middlewareinitiating the at least one encrypted network tunnel, the at least onemiddleware positioned between the first application software and thesecond application software in a data pathway comprising the at leastone encrypted network tunnel, the at least one middleware configured to:a) authorize the encrypted network tunnel, based at least on authorizingthe first node, the second node, the first application software, and thesecond application software; and b) confirm that the first applicationsoftware is authorized to transmit the first data protocol.

Certain embodiments may provide, for example, a secure systemcomprising: plural nodes coupled to a network, plural applicationsoftware executing on at least a first node and a second node of theplural nodes, at least one encrypted network tunnel established betweena first application software of the plural application software on thefirst node of the plural nodes and a second application software of theplural application software on the second node of the plural nodes, thefirst application software configured to send data conforming to apreconfigured, predefined, pre-established and/or preprovisioned firstdata protocol, and at least one middleware initiating the at least oneencrypted network tunnel. In certain further embodiments, for example,the at least one middleware may be positioned between the firstapplication software and the second application software in a datapathway comprising the at least one encrypted network tunnel. In certainfurther embodiments, for example, the at least one middleware may beconfigured to authorize the encrypted network tunnel, based at least onauthorizing at least one of the plural nodes, the first applicationsoftware, and the second application software. In certain furtherembodiments, for example, the at least one middleware may be configuredto confirm that the second application software is authorized to receivethe first data protocol.

In certain embodiments, for example, the at least one middleware may betransparent to the first application software and the second applicationsoftware. In certain embodiments, for example, the authorize and theconfirm each comprise encrypted communication over the network.

Certain embodiments may provide, for example, a secure systemcomprising: i) plural nodes coupled to a network; ii) plural applicationsoftware executing on at least a first node and a second node of theplural nodes; iii) at least one encrypted network tunnel establishedbetween a first application software of the plural application softwareon the first node of the plural nodes and a second application softwareof the plural application software on the second node of the pluralnodes, the first application software configured to send data conformingto a preconfigured, predefined, pre-established and/or preprovisionedfirst data protocol; and iv) at least one middleware initiating the atleast one encrypted network tunnel, the at least one middlewarepositioned between the first application software and the secondapplication software in a data pathway comprising the at least oneencrypted network tunnel, the at least one middleware configured to: a)authorize the encrypted network tunnel, based at least on authorizing atleast one of the plural nodes, the first application software, and thesecond application software; and b) confirm that the second applicationsoftware is authorized to receive the first data protocol.

Certain embodiments may provide, for example, a secure system comprisingplural nodes communicating over a network by machine-to-machinemiddleware, each node of the plural nodes comprising: a preconfiguredlist, and machine-to-machine middleware. In certain embodiments, forexample, each member of the of the preconfigured list may comprise a2-tuple, the 2-tuple comprising a port number. In certain furtherembodiments, for example, the machine-to-machine middleware may beconfigured to: interpret the preconfigured list to define authorizedclient-server connections, receive a network packet from the network,decrypt an encrypted metadata portion of the network packet using asingle-use cryptographic key, extract an authorization parameter fromthe decrypted metadata portion of the network packet, and compare a2-tuple consisting of the destination port number of the network packetand the authorization parameter with at least one member of thepreconfigured list.

In certain embodiments, for example, the preconfigured file may bestored on a non-transitory computer-readable storage medium (for examplea nonvolatile memory storage medium) exclusively as an encrypted binaryfile. In certain embodiments, for example, the authorization parametermay be a remote node identification code. In certain embodiments, forexample, the remote node identification code may be nonpublic. Incertain embodiments, for example, the remote node identification codemay be a shared secret among a subset of the plural nodes.

In certain embodiments, for example, the authorization parameter maycomprise a remote descriptor, the remote descriptor comprising a remoteapplication identifier, an identifier for a user of the remoteapplication, and a data protocol code. In certain embodiments, forexample, the machine-to-machine middleware may be at least partiallyembedded in a kernel.

Certain embodiments may provide, for example, a secure system comprisingplural nodes communicating over a network by machine-to-machinemiddleware, each node of the plural nodes comprising: i) a preconfiguredlist, each member of the of the preconfigured list comprising a 2-tuple,the 2-tuple comprising a port number; and ii) machine-to-machinemiddleware configured to: a) interpret the preconfigured list to defineauthorized client-server connections; b) receive a network packet fromthe network; c) decrypt an encrypted metadata portion of the networkpacket using a single-use cryptographic key; d) extract an authorizationparameter from the decrypted metadata portion of the network packet; ande) compare a 2-tuple consisting of the destination port number of thenetwork packet and the authorization parameter with at least one memberof the preconfigured list.

In certain embodiments, for example, the machine-to-machine middlewaremay be transparent to the client application. In certain embodiments,for example, the network packet may comprise a segmented payload. Incertain embodiments, for example, at least 25% (for example at least50%, such as at least 75%) of the plural nodes may be dedicatedcomputing devices.

Certain embodiments may provide, for example, a secure system comprisingplural nodes communicating over a network by machine-to-machinemiddleware, each node of the plural nodes comprising: a clientapplication, a preconfigured list, a security layer, a kernel, andmachine-to-machine middleware at least partially embedded in the kernel.In certain further embodiments, for example, the machine-to-machinemiddleware may be configured to: interpret the preconfigured list todefine authorized client-server connections, receive a network packetfrom the network, decrypt an encrypted metadata portion of the networkpacket using a single-use cryptographic key (for example a rotated keyderived from ECDH key exchange), extract at least a 2-tuple consistingof a remote server code and a data protocol code from the decryptedmetadata portion of the network packet, and compare the 2-tuple to atleast one member of the preconfigured list. In certain furtherembodiments, for example, each member of the of the preconfigured listmay consist of an n-tuple, the n-tuple comprising a 2-tuple consistingof a remote server code and a data protocol code.

In certain embodiments, for example, the machine-to-machine middlewaremay be transparent to the client application. In certain embodiments,for example, the network packet may comprise a segmented payload. Incertain embodiments, for example, at least 25% (for example at least50%, such as at least 75%) of the plural nodes may be dedicatedcomputing devices.

Certain embodiments may provide, for example, a secure system comprisingplural nodes communicating over a network by machine-to-machinemiddleware, each node of the plural nodes comprising: i) a clientapplication; ii) a preconfigured list, each member of the of thepreconfigured list consisting of an n-tuple, the n-tuple comprising a2-tuple consisting of a remote server code and a data protocol code;iii) a security layer; iv) a kernel; and v) machine-to-machinemiddleware at least partially embedded in the kernel, themachine-to-machine middleware configured to: a) interpret thepreconfigured list to define authorized client-server connections; b)receive a network packet from the network; c) decrypt an encryptedmetadata portion of the network packet using a single-use cryptographickey; d) extract at least a 2-tuple consisting of a remote server codeand a data protocol code from the decrypted metadata portion of thenetwork packet; and e) compare the 2-tuple to at least one member of thepreconfigured list.

Certain embodiments may provide, for example, a method to instantiateand manage a dedicated data pathway extending from a source port on afirst node to a destination port on a second node, processor, orcomputing device. In certain embodiments, for example, the method maycomprise selecting, from a predetermined, exclusive list of authorizeddata pathways, a security port number exclusively paired with a portnumber of the destination port. In certain embodiments, for example, themethod may comprise forming an encrypted communication pathway extendingfrom the first node to a security port present on the second node, thesecurity port having the selected security port number (i.e., theselected security port number assigned to the security port). In certainembodiments, for example, the method may comprise, prior to transmittingany data from the source port to the destination port: verifying, at thefirst node, that a first n-tuple received from the encryptedcommunication pathway matches an expected value based on the securityport number, the first n-tuple comprising: a nonpublic device code forthe second node, a user associated with the destination port, anapplication associated with the destination port, and a data protocoldescriptor. In certain embodiments, for example, the method maycomprise, prior to passing a network packet to the destination port:verifying, at the second node, that an second n-tuple obtained from thenetwork packet matches an expected value based on the security portnumber, the second n-tuple comprising: a user associated with the sourceport, an application associated with the source port, and the dataprotocol descriptor.

Certain embodiments may comprise, for example, a method to instantiateand manage a dedicated data pathway extending from a source port on afirst node to a destination port on a second node, comprising: i)selecting, from a predetermined, exclusive list of authorized datapathways, a security port number exclusively paired with a port numberof the destination port; ii) forming an encrypted communication pathwayextending from the first node to a security port present on the secondnode, the security port having the selected security port number (i.e.,the selected security port number assigned to the security port); iii)prior to transmitting any data from the source port to the destinationport: verifying, at the first node, that a first n-tuple received fromthe encrypted communication pathway matches an expected value based onthe security port number, the first n-tuple comprising: a nonpublicdevice code for the second node, a user associated with the destinationport, an application associated with the destination port, and a dataprotocol descriptor; and iv) prior to passing a network packet to thedestination port: verifying, at the second node, that an second n-tupleobtained from the network packet matches an expected value based on thesecurity port number, the second n-tuple comprising: a user associatedwith the source port, an application associated with the source port,and the data protocol descriptor.

Certain embodiments may provide, for example, a method to instantiateand manage a dedicated data pathway extending from a source port on afirst node to a destination port on a second node, comprising:selecting, from a predetermined, exclusive list of authorized datapathways, a tunnel port number exclusively paired with a port number ofthe destination port; forming a network tunnel extending from the firstnode to a tunnel port present on the second node, the tunnel port havingthe selected tunnel port number (i.e., the selected tunnel port numberassigned to the tunnel port); iii) prior to transmitting any data fromthe source port to the destination port: verifying, at the first node,that a first n-tuple received from the network tunnel matches anexpected value based on the tunnel port number, the first n-tuplecomprising: a nonpublic device code for the second node, a userassociated with the destination port, an application associated with thedestination port, and a data protocol descriptor; and iv) prior topassing a network packet to the destination port: verifying, at thesecond node, that an second n-tuple obtained from the network packetmatches an expected value based on the tunnel port number, the secondn-tuple comprising: a user associated with the source port, anapplication associated with the source port, and the data protocoldescriptor.

Certain embodiments may provide, for example, a system comprising:plural nodes communicating over a network according to a shared networkprotocol, wherein each one of the plural nodes may be preconfigured toinitialize at least one encrypted network tunnel with at least anotherone of the plural nodes, and each one of the plural nodes havingapplication and/or data transfer privileges may be limited totransferring data to another one of the plural nodes exclusively by anencrypted network tunnel of the at least one encrypted network tunnel.

In certain embodiments, for example, each one of the least 25% (forexample at least 50%, such as at least 90%) of the plural nodes may bean edge computing device.

Certain embodiments may provide, for example, a method to retrofit anode interface to a network, comprising: inserting a computing devicebetween a node and the network. In certain further embodiments, forexample, the computing device may comprise: a file stored onnon-transitory computer-readable storage medium, the file having a listof authorized data communications sessions, the file comprising: anindex defined by an application authorized to be executed on a processorof the node and an authorized user of the application, a unique 2-tupleconsisting of a port number assigned to the application and a portnumber assigned to a network security middleware, a unique 2-tupleconsisting of a port number assigned to a remote application and a portnumber assigned to a remote network security middleware, and a dataprotocol descriptor.

Certain embodiments may provide, for example, a method to retrofit anode interface to a network, comprising: inserting a computing devicebetween a node and the network, the computing device comprising: a fileon a non-transitory computer-readable storage medium of the computingdevice, the file interpretable by network security middleware executingon the computing device to define authorized communication sessions andan authorized data protocol for each one of the authorized communicationsessions. In certain further embodiments, for example, the computingdevice may further comprise a network stack configured to route eachdata packet through the network security middleware, the networksecurity middleware configured to drop a data packet unless it isauthorized to be transmitted using one of the authorized communicationsessions.

Certain embodiments may provide, for example, a secure method for afirst computing device to update resident software, comprising:receiving, from a predetermined, authenticated, authorized clientexecuting on a second computing device, an encrypted nonexecutablepayload noticing availability of updated software. In certain furtherembodiments, for example, the receiving may be followed by establishinga unidirectional encrypted network tunnel with a predetermined serverexecuting on a third computing device. In certain further embodiments,for example, the establishing may comprise exchanging and authenticatingencrypted device identifiers between the first computing device and thethird computing device, and verifying that the second computing deviceand the third computing device are different devices. In certain furtherembodiments, for example, the method may further comprise downloadingthe updated software over the unidirectional encrypted network tunnel.

Certain embodiments may provide, for example, a secure computing devicecomprising a physical network interface, the physical network interfaceconfigured to: compare a destination port number of each incomingnetwork packet to a list of authorized destination ports, execute remoteprocedure calls to first software program (or module or portion of code)executing on a central processing unit of the computing device, thefirst software configured to decrypt metadata from each incoming networkpacket, and execute remote procedure calls to second software executingon the central processing unit. In certain further embodiments, forexample, the second software program may be configured to compare thedecrypted metadata to a list of authorized n-tuples, each of then-tuples in the list of authorized n-tuples comprising descriptors for:a source application for the incoming network packet, a user for thesource application, and a payload protocol for the network packet.

In certain embodiments, for example, the physical network interface maybe a field-programmable gate array.

In certain embodiments, for example, the physical network interface maybe further configured (for example programmed) to execute remoteprocedure calls to a third software program executing on the centralprocessing unit, the third software configured to translate a payload ofthe incoming network packet into native formatted data for consumptionby the receiving application.

In certain embodiments, for example, at least one of the first software,second software, or third software execute in an OSI application layerof the computing device.

Certain embodiments may provide, for example, a method to filter anetwork packet in an edge computing device, comprising: parsing at leasta portion of the network packet to obtain payload data in a networkstack of the edge computing device; and invoking publish-subscribepattern messaging software from a sub-session layer of the network stackto retrieve, based on at least a portion of the payload data, one ormore network packet authentication and/or access control parameters.

In certain embodiments, for example, the publish-subscribe patternmessaging software may conform to the Data Distribution Servicestandard.

In certain embodiments, for example, the publish-subscribe patternmessaging software may conform to an MQ Telemetry Transport messagingprotocol.

In certain embodiments, for example, the one or more network packetauthentication and/or access control parameters may be retrieved frommetadata encoded in the payload data. In certain embodiments, forexample, the one or more network packet authentication and/or accesscontrol parameters may comprise a source application, a sourceapplication user, and a data protocol of the payload data. In certainembodiments, for example, the one or more network packet authenticationand/or access control parameters may be encrypted. In certainembodiments, for example, the method may further comprise: comparing aport address number of the network packet to a list of pre-authorizedport address numbers stored in kernel random access memory.

Certain embodiments may provide, for example, a method to filter anetwork packet (for example an IP packet containing an IP header and aTCP segment). In certain embodiments, for example, the method maycomprise parsing the network packet to obtain network packet data; andinvoking data distribution service software from a sub-session layer(for example a transport layer according to the Open SystemsInterconnection model) of a network stack to retrieve, based on at leasta portion of the network packet data (for example a metadata portion),one or more network packet authentication and/or access controlparameters. In certain embodiments, for example, the network packet maybe an incoming packet received from an Ethernet connection. In certainembodiments, for example, the network packet may be an outgoing packetbeing directed towards received from an Ethernet connection. In certainembodiments, for example, parsing the network packet may compriseparsing a header of the network packet (for example a network headersuch as an IP header, an IPsec header, or a TCP header of a TCPsegment). In certain embodiments, for example, the one or more networkpacket authentication and/or access control parameters may comprise adestination port. In certain embodiments, for example, parsing thenetwork packet may comprise parsing metadata (for example payloadmetadata). In certain further embodiments, for example, the metadata maycomprise metadata useful for authenticating a computing device sendingat least a portion of a payload present in the network packet. Incertain embodiments, for example, the metadata may comprise metadatauseful for authenticating an application and/or user sending at least aportion of a payload present in the network packet. In certainembodiments, for example, the metadata may comprise metadata useful forauthorizing an application to have access to at least a portion of apayload present in the network packet.

In certain embodiments, for example, the network stack may be executingon a node in a data distribution service domain. In certain embodiments,for example, the node may be a subscriber in the data distributionservice domain. In certain embodiments, for example, the node may be apublisher in the data distribution service domain. In certainembodiments, for example, the metadata may comprise metadata inserted bydata distribution service middleware. In certain embodiments, forexample, the metadata may comprise a publish-subscribe topic. In certainembodiments, for example, the network packet may comprise a payloadhaving at least a portion that is strongly typed. In certainembodiments, for example, the metadata may comprise a publish-subscribedata type definition. In certain further embodiments, for example, theone or more network packet access control parameters may comprise thepublish-subscribe data type definition. In certain embodiments, forexample, the method may further comprise comparing the one or morenetwork packet authentication and/or access control parameters withsettings of a domain participant in a data distribution service domain.In certain embodiments, for example, the settings may define at leastone data reader in the data distribution service domain. In certainembodiments, for example, the settings may define at least one datawriter in the data distribution service domain. In certain embodiments,for example, the method may further comprise creating and maintaining anevent log.

In certain further embodiments, for example, the data distributionservice software may be invoked by operating system software, forexample by operating system software operating at kernel priority. Incertain embodiments, for example, the data distribution service softwaredefines at least part of a software library, for example a pre-builtlibrary. In certain embodiments, for example, the data distributionservice software defines at least one subroutine. In certainembodiments, for example, the data distribution service software definesat least one module. In certain embodiments, for example, the datadistribution service software defines at least one function. In certainembodiments, for example, the data distribution service software definesat least a portion of an object.

In certain embodiments, for example, the network stack may be executingon a dedicated computing device. In certain embodiments, for example,the method may be performed at wire speed.

Certain embodiments may provide, for example, a kernel-based method forauthorized network communication, comprising: detecting a network packetadded to a network stack memory, moving the detected network packet fromthe network stack memory to a heap space; authorizing the networkpacket, and removing the authorized network packet from the heap spaceand replacing the network packet in network stack memory. In certainembodiments, for example, the authorizing may be based at least on: a) auniversal identifier for a source of the network packet, comprising anauthorized source application identifier and an identifier for anauthorized user of the source application; b) a universal identifier fordestination of the network packet, comprising an authorized destinationapplication identifier and an identifier for an authorized user of thedestination application; c) a port associated with the destinationapplication; d) a different port associated with a middleware; and e) adata protocol field

In certain embodiments, for example, the middleware may be responsiblefor the detecting. In certain embodiments, for example, the middlewaremay be responsible for the moving. In certain embodiments, for example,the middleware may be responsible for the authorizing. In certainembodiments, for example, the middleware may be responsible for thedetecting, the moving, and the authorizing.

Certain embodiments may provide, for example, a kernel-based method forauthorized network communication, comprising: i) detecting a networkpacket added to a network stack memory; ii) moving the detected networkpacket from the network stack memory to a heap space; iii) authorizingthe network packet, based at least on: a) a universal identifier for asource of the network packet, comprising an authorized sourceapplication identifier and an identifier for an authorized user of thesource application; b) a universal identifier for destination of thenetwork packet, comprising an authorized destination applicationidentifier and an identifier for an authorized user of the destinationapplication; c) a port associated with the destination application; d) adifferent port associated with a middleware; and e) a data protocolfield; and iv) removing the authorized network packet from the heapspace and replacing the network packet in network stack memory.

Certain embodiments may comprise, for example, a kernel-based method forauthorized network communication, comprising: detecting (for examplereceiving or intercepting) a network packet added to a network stackmemory, making the detected network packet accessible to a heap space(for example by moving or copying the network packet from the networkstack memory to the heap space), authorizing the network packet, andremoving the authorized network packet from the heap space and replacingthe network packet in network stack memory. In certain furtherembodiments, for example, the authorizing may reference: an indexdefined by a pre-approved application a pre-approved user of theapplication, a unique 2-tuple consisting of a port number assigned tothe application and a port number assigned to an encryption layer, aunique 2-tuple consisting of a port number assigned to a remoteapplication and a port number assigned to a remote encryption layer, anda data protocol field.

Certain embodiments may provide, for example, a method to prevent anattack by malware resident on a node, comprising: a network securityagent opening a port in listening mode, the port configured to establisha compromised encrypted connection, receiving a connection request atthe port from a malware configured to exploit the compromised encryptionprotocol, establishing an encrypted tunnel between the network securityagent and the malware, the encrypted tunnel having the port as anendpoint, and the network security agent terminating the encryptedtunnel after a fixed number of attempts by the malware to provide anexpected identification code for the node, the expected identificationcode selected by the network security agent based on the port number ofthe port.

In certain embodiments, for example, the network security agent may bepresent on the node, processor, or computing device. In certainembodiments, for example, the network security agent may be present on aremote node, processor, or computing device. In certain embodiments, forexample, the encrypted connection may be compromised due to acompromised private key. In certain embodiments, for example, theencrypted connection may be compromised due to one or more compromisedcomponents of a cipher suite. In certain embodiments, for example, theencrypted connection may be compromised due to one or more securityholes in a software implementation of an encryption protocol. In certainembodiments, for example, the malware may be present on the node,processor, or computing device. In certain embodiments, for example, themalware may be present on a different node, processor, or computingdevice. In certain embodiments, for example, the port may be configuredaccording to a secure socket layer protocol. In certain embodiments, forexample, the port may be configured according to an IPsec protocol. Incertain embodiments, for example, the malware may identify the portbased on a port scan. In certain embodiments, for example, the expectednode identification code may have a length of at least 2048 bits. Incertain embodiments, for example, the sum-of-digits of the expected nodeidentification code may be a prime number. In certain embodiments, forexample, a portion of the expected node identification code may be arandomly generated number. In certain embodiments, for example, at least90% of the digits of the expected node identification code may be arandomly generated number. In certain embodiments, for example, theexpected node identification code may be stored in a proprietary binaryformat configured to be interpreted solely by the network securityagent. In certain embodiments, for example, the expected nodeidentification code may be stored on a non-transitory computer-readablestorage medium (for example a nonvolatile memory storage medium) in anencrypted, read-only binary file, the binary file comprising aproprietary record structure. In certain embodiments, for example, thebinary file may comprise plural records having variable record length.In certain embodiments, for example, the binary file may be readableinto random access memory solely by the network security agent. Incertain embodiments, for example, the security agent may terminate theencrypted tunnel after no more than 20 attempts to provide the expectedidentification code.

Certain embodiments may provide, for example, a method to prevent anattack by malware resident on a node, comprising: a network securityagent sending a connection request to a spoofed listening portassociated with a malware, the network security agent configured toestablish a compromised encrypted connection, establishing an encryptedtunnel between the network security agent and the malware, the encryptedtunnel having the malware port as an endpoint, and the network securityagent terminating the encrypted tunnel after a fixed number of attemptsby the malware to provide an expected identification code for the node,the expected identification code selected by the network security agentbased on the port number of the port. In certain embodiments, forexample, the network security agent may inadvertently send theconnection request to the spoofed listening port. In certainembodiments, for example, the network security agent may be directed(for example by malware) to send the connection request to the spoofedlistening port.

Certain embodiments may provide, for example, a method to prevent anattack by malware resident on a node, comprising: the malware attemptingto transmit a connection request to a remote destination port, andchecking an application code (for example an application code obtainedfrom process status check) and a user code value of the malware againstexpected values, the expected values selected based on the destinationport.

In certain embodiments, for example, the method may further comprisedropping the connection request based on the application code and a usercode failing to match the expected values. In certain embodiments, forexample, the method may further comprise dropping the connection requestbased on the absence of the destination port in a preconfigured list ofallowed destination ports. In certain embodiments, for example, themalware may be introduced to the node via a USB port.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, processor, or computing device.In certain embodiments, for example, the method may compriseestablishing an encrypted connection to transfer data exclusivelybetween a first process running on the first node and a second processrunning on the second node, processor, or computing device. In certainembodiments, for example, the establishing may comprise the second nodereceiving a node identification packet from the first node andconfirming a shared secret node identification code received from thefirst node, processor, or computing device. In certain embodiments, forexample, the method may comprise managing a connection state of theauthorized encrypted connection. In certain embodiments, for example,the managing may comprise confirming that network packets received atthe second node via the encrypted connection comprise at least apredetermined user identification code, a predetermined processidentification code, and/or a predetermined data protocol identificationcode. In certain embodiments, for example, the node identificationpacket may comprise a packet type header configured for processing bynetwork security software. In certain embodiments, for example, thenetwork security software may be invoked in a network stack. In certainfurther embodiments, for example, the packet type header may be locatedafter a layer three header according to the OSI Seven Layer Model. Incertain further embodiments, for example, the packet type header may belocated after a layer four header according to the OSI Seven LayerModel. In certain further embodiments, for example, the packet typeheader may be located after an SSL/TLS header. In certain embodiments,for example, a data protocol of the data to be transferred may match anexpected data protocol based on the data protocol identification code.In certain embodiments, for example, the predetermined useridentification code, the predetermined process identification code,and/or the predetermined data protocol identification code may bemetadata present in the network packets. In certain embodiments, forexample, the metadata may be configured for processing by networksecurity software. In certain embodiments, for example, the networksecurity software may be invoked in a network stack. In certain furtherembodiments, for example, the packet type header may be located after alayer three header according to the OSI Seven Layer Model. In certainfurther embodiments, for example, the metadata may be located after alayer four header according to the OSI Seven Layer Model. In certainfurther embodiments, for example, the packet type header may be locatedafter an SSL/TLS header.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, processor, or computing device.In certain embodiments, for example, the method may comprise authorizingan encrypted connection to transfer data exclusively between a firstprocess (for example a first user process) running on the first node anda second process (for example a second user process) running on thesecond node, processor, or computing device. In certain embodiments, forexample, the authorizing may comprise transmitting a node identificationpacket from the first node to the second node, the node identificationpacket comprising a shared secret node identification code for the firstnode, processor, or computing device. In certain embodiments, forexample, the authorizing may be followed by managing a connection stateof the authorized encrypted connection. In certain embodiments, forexample, the managing may comprise withdrawing the authorization if atleast one network packet received from the authorized encryptedconnection is missing one or more of an expected user identificationcode, process identification code, and data protocol identificationcode. In certain embodiments, for example, the authorizing may furthercomprise: transmitting a node identification packet from the second nodeto the first node, the node identification packet comprising a sharedsecret node identification code for the second node, processor, orcomputing device. In certain embodiments, for example, the authorizingmay further comprise: transmitting a process identification packet fromthe first node to the second node, the process identification packetcomprising a user identifier for the first process, an applicationidentifier for the first process, a data protocol identifier for theconnection, or a combination of two or more of the foregoingidentifiers. In certain embodiments, for example, the authorizing mayfurther comprise: executing operating system commands to identify aprocess requesting the data transfer, followed by verifying that therequesting process is authorized to transfer and/or receive the data. Incertain embodiments, for example, the managing may further comprise:executing operating system commands to identify a process requesting thedata transfer, followed by verifying that the requesting process isauthorized to transfer and/or receive the data. In certain embodiments,for example, the authorizing may comprise consulting configuration filespresent on the first node and second node to obtain one or more of theshared secret node identification code, user identification code,process identification code, and data protocol identification code. Incertain embodiments, for example, the managing may comprise consultingconfiguration files present on the first node and second node to obtainone or more of the shared secret node identification code, useridentification code, process identification code, and data protocolidentification code. In certain embodiments, for example, a 3-tuplecomprising the user identification code, process identification code,and data protocol identification code may be a shared secret between thefirst node and the second node, processor, or computing device. Incertain embodiments, for example, a 4-tuple comprising the shared secretnode identification code, user identification code, processidentification code, and data protocol identification code may be ashared secret between the first node and the second node, processor, orcomputing device. In certain embodiments, for example, the authorizingmay comprise mutual exchange from and authorization by the first nodeand second node of one or more of the shared secret node identificationcode, user identification code, process identification code, and dataprotocol identification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, processor, or computing device.In certain embodiments, for example, the method may comprise authorizingan encrypted connection to transfer data between a first process runningon the first node and a second process running on the second node,processor, or computing device. In certain embodiments, for example, theauthorizing may comprise mutual exchange, authentication, andauthorization of shared secret first and second node identificationcodes. In certain embodiments, for example, the authorizing may befollowed by managing a connection state of the authorized encryptedconnection. In certain embodiments, for example, the managing maycomprise dropping the connection if an incoming network packet from theauthorized encrypted connection is missing one or more of an expecteduser identification code, process identification code, and data protocolidentification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, processor, or computing device.In certain embodiments, for example, the method may comprise authorizingan encrypted connection to transfer data exclusively between a firstprocess running on the first node and a second process running on thesecond node, processor, or computing device. In certain embodiments, forexample, the authorizing may comprise transmitting a node identificationpacket from the first node to the second node, the node identificationpacket comprising a shared secret node identification code for the firstnode, processor, or computing device. In certain embodiments, forexample, the authorizing may be followed by managing a connection stateof the authorized encrypted connection. In certain embodiments, forexample, the managing may comprise withdrawing the authorization if atleast one network packet received from the authorized encryptedconnection is missing an expected user, process, and/or packet payloaddata protocol identification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, comprising: i) establishing anencrypted connection to transfer data exclusively between a firstprocess running on the first node and a second process running on thesecond node, comprising: the second node receiving a node identificationpacket from the first node and confirming a shared secret nodeidentification code received from the first node; and ii) managing aconnection state of the authorized encrypted connection, comprising:confirming that network packets received at the second node via theencrypted connection comprise at least an predetermined useridentification code, a predetermined process identification code, and/ora predetermined data protocol identification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, comprising: i) authorizing anencrypted connection to transfer data exclusively between a firstprocess running on the first node and a second process running on thesecond node, comprising: transmitting a node identification packet fromthe first node to the second node, the node identification packetcomprising a shared secret node identification code for the first node;followed by ii) managing a connection state of the authorized encryptedconnection, comprising: withdrawing the authorization if at least onenetwork packet received from the authorized encrypted connection ismissing one or more of an expected user identification code, processidentification code, and data protocol identification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, comprising: i) authorizing anencrypted connection to transfer data between a first process running onthe first node and a second process running on the second node,comprising: mutual exchange, authentication, and authorization of sharedsecret first and second node identification codes; followed by ii)managing a connection state of the authorized encrypted connection,comprising: dropping the connection if an incoming network packet fromthe authorized encrypted connection is missing one or more of anexpected user identification code, process identification code, and dataprotocol identification code.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, comprising: i) authorizing anencrypted connection to transfer data exclusively between a firstprocess running on the first node and a second process running on thesecond node, comprising: transmitting a node identification packet fromthe first node to the second node, the node identification packetcomprising a shared secret node identification code for the first node;followed by ii) managing a connection state of the authorized encryptedconnection, comprising: withdrawing the authorization if at least onenetwork packet received from the authorized encrypted connection ismissing an expected user, process, and/or packet payload data protocolidentification code.

Certain embodiments may provide, for example, a method of securingnetwork communications received by a network node, processor, orcomputing device. In certain embodiments, for example, the method maycomprise confirming network packets received are from a preconfigured,predefined, pre-established and/or preprovisioned source process runningon a preconfigured, predefined, pre-established and/or preprovisionedauthorized source node and directed to a preconfigured, predefined,pre-established and/or preprovisioned authorized destination processrunning on a preconfigured, predefined, pre-established and/orpreprovisioned authorized destination node, processor, or computingdevice. In certain embodiments, for example, the method may furthercomprise passing at least a portion of the payloads from the networkpackets to the authorized destination process.

In certain embodiments, for example, the authorized source process maybe preconfigured, predefined, pre-established and/or preprovisionedrelative to the network node (for example the network node may contain afile identifying the source process, wherein the file is present on thenetwork node prior to the confirming and passing). In certainembodiments, for example, the authorized source node may bepreconfigured, predefined, pre-established and/or preprovisionedrelative to the network node (for example the network node may contain afile identifying the source node, wherein the file is present on thenetwork node prior to the confirming and passing). In certainembodiments, for example, the authorized destination process may bepreconfigured, predefined, pre-established and/or preprovisionedrelative to the network node (for example the network node may contain afile identifying the destination process, wherein the file is present onthe network node prior to the confirming and passing). In certainembodiments, for example, the authorized destination node may bepreconfigured, predefined, pre-established and/or preprovisionedrelative to the network node (for example the network node may contain afile identifying the destination node, wherein the file is present onthe network node prior to the confirming and passing). In certainembodiments, for example, the authorized source process may bepreconfigured, predefined, pre-established and/or preprovisionedrelative to the authorized source node (for example the authorizedsource node may contain a file identifying the source process, whereinthe file is present on the authorized source node prior to theconfirming and passing). In certain embodiments, for example, theauthorized source node may be preconfigured, predefined, pre-establishedand/or preprovisioned relative to the authorized source node (forexample the authorized source node may contain a file identifying thesource node, wherein the file is present on the authorized source nodeprior to the confirming and passing). In certain embodiments, forexample, the authorized destination process may be preconfigured,predefined, pre-established and/or preprovisioned relative to theauthorized source node (for example the authorized source node maycontain a file identifying the destination process, wherein the file ispresent on the authorized source node prior to the confirming andpassing). In certain embodiments, for example, the authorizeddestination node may be preconfigured, predefined, pre-establishedand/or preprovisioned relative to the authorized source node (forexample the authorized source node may contain a file identifying thedestination node, wherein the file is present on the authorized sourcenode prior to the confirming and passing). In certain embodiments, forexample, the authorized source process may be preconfigured, predefined,pre-established and/or preprovisioned relative to the authorizeddestination node (for example the authorized destination node maycontain a file identifying the source process, wherein the file ispresent on the authorized destination node prior to the confirming andpassing). In certain embodiments, for example, the authorized sourcenode may be preconfigured, predefined, pre-established and/orpreprovisioned relative to the authorized destination node (for examplethe authorized destination node may contain a file identifying thesource node, wherein the file is present on the authorized destinationnode prior to the confirming and passing). In certain embodiments, forexample, the authorized destination process may be preconfigured,predefined, pre-established and/or preprovisioned relative to theauthorized destination node (for example the authorized destination nodemay contain a file identifying the destination process, wherein the fileis present on the authorized destination node prior to the confirmingand passing). In certain embodiments, for example, the authorizeddestination node may be preconfigured, predefined, pre-establishedand/or preprovisioned relative to the authorized destination node (forexample the authorized destination node may contain a file identifyingthe destination node, wherein the file is present on the authorizeddestination node prior to the confirming and passing).

In certain embodiments, for example, the received packets may bereceived via an authorized encrypted communication pathway, wherein theauthorized encrypted communication pathway may be established, whereinthe establishing of the authorized encrypted communication pathway maycomprise authorizing a preconfigured, predefined, pre-established and/orpreprovisioned source node and a preconfigured, predefined,pre-established and/or preprovisioned destination node, processor, orcomputing device.

In certain embodiments, for example, the authorized destination node maybe the network node, processor, or computing device. In certainembodiments, for example, the authorized destination node may performthe confirming and passing.

In certain embodiments, for example, the confirming may be transparentto the authorized source process. In certain embodiments, for example,the confirming may be transparent to the authorized destination process.In certain embodiments, for example, the confirming may be transparentto the authorized source process and the authorized destination process.In certain embodiments, for example, the confirming may comprise:comparing destination port numbers of the network packets with apreconfigured, predefined, pre-established and/or preprovisioned portnumber associated with the authorized destination process. In certainembodiments, for example, the associated port may be assigned to theauthorized destination process. In certain embodiments, for example, theassociated port may be assigned to network security software incommunication with the authorized destination process. In certainembodiments, for example, the confirming may comprise: obtainingdestination port numbers and source application codes, source processowners, and/or data type protocol from the network packets; selectingone or plural preconfigured, predefined, pre-established and/orpreprovisioned authorization codes assigned to the destination portnumbers; and matching the source application codes, source processowners, and/or data type protocol obtained from the network packets tothe one or plural authorization codes.

In certain embodiments, for example, the passing may comprisetransmitting the least a portion of the payloads from the networkpackets on a dedicated communication pathway for the authorized sourceprocess. In certain embodiments, for example, the passing may comprisetransmitting the at least a portion of the payloads from the networkpackets via a loopback interface. In certain embodiments, for example,the passing may comprise passing the at least a portion of the payloadsfrom the network packets via kernel functions (for example read and/orwrite functions). In certain embodiments, for example, the passing maycomprise copying the at least a portion of the payloads from one memorylocation to another memory location. In certain embodiments, forexample, the passing may not comprise copying the at least a portion ofthe payloads from one memory location to another memory location. Incertain embodiments, for example, the passing may comprise adjusting apointer to a location in kernel memory.

In certain embodiments, for example, the method may further comprise:establishing an authorized connection having the associated port as anendpoint, followed by receiving the network packets received.

Certain embodiments may provide, for example, a method of securingnetwork communications received by a network node, processor, orcomputing device. In certain embodiments, for example, the method maycomprise establishing an authorized encrypted communication pathway,which may comprise authorizing a preconfigured, predefined,pre-established and/or preprovisioned source node and a preconfigured,predefined, pre-established and/or preprovisioned destination node,processor, or computing device. In certain embodiments, for example, themethod may comprise confirming network packets received via theencrypted communication pathway are from a preconfigured, predefined,pre-established and/or preprovisioned authorized source process runningon the authorized source node and directed to a preconfigured,predefined, pre-established and/or preprovisioned authorized destinationprocess running on the authorized destination node, processor, orcomputing device. In certain embodiments, for example, the method maycomprise passing at least a portion of the payloads from the networkpackets to the authorized destination process. In certain embodiments,for example, the source node and the destination node may authorize oneanother based on mutual exchange, authentication, and authorization ofshared secret device codes between the source node and the destinationnode, processor, or computing device. In certain embodiments, forexample, the mutual exchange may be made across the encryptedcommunication pathway prior to its authorization. In certainembodiments, for example, the shared secret device codes may be createdindependently of any internet protocol. In certain embodiments, forexample, the encrypted communication pathway may be formed according toSSL/TLS protocol prior to its authorization. In certain embodiments, forexample, the encrypted communication pathway may be formed according toIPsec protocol prior to its authorization. In certain embodiments, forexample, the encrypted communication pathway may be formed according toL2TP protocol prior to its authorization.

Certain embodiments may provide, for example, a method of securingnetwork communications received by a network node, comprising: i)confirming network packets received are from a preconfigured,predefined, pre-established and/or preprovisioned authorized sourceprocess running on a preconfigured, predefined, pre-established and/orpreprovisioned authorized source node and directed to a preconfigured,predefined, pre-established and/or preprovisioned authorized destinationprocess running on a preconfigured, predefined, pre-established and/orpreprovisioned authorized destination node; and ii) passing at least aportion of the payloads from the network packets to the authorizeddestination process.

Certain embodiments may provide, for example, a method of securingnetwork communications received by a network node, comprising: i)establishing an authorized encrypted communication pathway, comprisingauthorizing a preconfigured, predefined, pre-established and/orpreprovisioned source node and a preconfigured, predefined,pre-established and/or preprovisioned destination node; ii) confirmingnetwork packets received via the encrypted communication pathway arefrom a preconfigured, predefined, pre-established and/or preprovisionedauthorized source process running on the authorized source node anddirected to a preconfigured, predefined, pre-established and/orpreprovisioned authorized destination process running on the authorizeddestination node; and iii) passing at least a portion of the payloadsfrom the network packets to the authorized destination process.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, processor, or computing device.In certain embodiments, for example, the method may comprise pre-loadinga first configuration file (for example a preprovisioned firstconfiguration file) on the first node (for example loading the file ontoa non-transitory computer-readable storage medium (for example anonvolatile memory storage medium) of the first node prior to boot-up ofthe first node, or loading the file into memory of the first node priorto other steps of the method enumerated herein) and a secondconfiguration file (for example a preprovisioned second configurationfile) on the second node, processor, or computing device. In certainembodiments, for example, the method may comprise forming an encryptedcommunication pathway. In certain embodiments, for example, the methodmay comprise authorizing the encrypted communication pathway to transferdata between a first process running on the first node and a secondprocess running on the second node, processor, or computing device. Incertain embodiments, for example, the authorizing may comprisetransmitting a first node identification packet from the first node tothe second node, the first node identification packet comprising apayload having a first node identifier assigned to the first node, thefirst node identifier obtained from the pre-loaded first configurationfile on the first node, processor, or computing device. In certainembodiments, for example, the authorizing may comprise comparing thefirst node identifier from the first node identification packet with afurther node identifier assigned to the first node, the further nodeidentifier obtained from the pre-loaded second configuration file on thesecond node, processor, or computing device. In certain embodiments, forexample, the data may comprise an executable program, a program command,typed data, a combination of two or more of the foregoing, or a portionof one of the foregoing.

In certain embodiments, for example, the method may be transparent tothe first process and the second process (for example the first processand the second process may execute first and second compiled codewhether or not the method is invoked, or each of the source code for thefirst process and the source code for the second process may interfacewith a network stack using standard function syntax of a networkapplication programmer's interface).

In certain embodiments, for example, the first node identificationpacket may be transmitted through the encrypted communication pathway.In certain embodiments, for example, the first node identifier may benonpublic and a shared secret. In certain embodiments, for example, thefirst node identifier may be nonpublic. In certain embodiments, forexample, the first node identifier may be a shared secret between thefirst node and the second node, processor, or computing device. Incertain embodiments, for example, the first node identifier may not bean IP address. In certain embodiments, for example, the first nodeidentifier may not be a MAC address. In certain embodiments, forexample, the first node identifier may not be a parameter used in (or afield present in) a layer 2-5 protocol header according to the OSImodel.

In certain embodiments, for example, the comparing may be performed bynetwork security software, the network security software invoked in anetwork stack of the second node, processor, or computing device. Incertain embodiments, for example, the network security software may betransparent to the first process and the second process. In certainembodiments, for example, an interface to the network security softwaremay be invoked using standard network API syntax.

In certain embodiments, for example, the first configuration file may bepre-loaded on first nonvolatile storage media (for example firstphysical nonvolatile storage media) and the second configuration filemay be pre-loaded on second nonvolatile storage media (for examplesecond physical nonvolatile storage media). In certain embodiments, forexample, the pre-loaded second configuration file may comprise at leastone record, no more than one of the at least one record comprising ann-tuple consisting of the first node identifier and one or more of afirst application code, first process owner code, and first data typecode. In certain embodiments, for example, the at least one record maycomprise an identifier, the identifier used in forming the encryptedcommunication pathway. In certain embodiments, for example, theidentifier may be a cryptographic primitive (for example a prime number,or for example a private key). In certain embodiments, for example, theat least one record may be a variable length record. In certainembodiments, for example, the second configuration file may be anencrypted binary file.

In certain embodiments, for example, the method may further comprise:transmitting a data packet from the first node to the second node, thedata packet comprising a payload, the payload comprising: data from thefirst process; and at least one first process identifier comprising oneor more of an application code (i.e., a code or identifier assigned tothe application), process owner code, and data type code, the at leastone first process identifier assigned to the first node, the at leastone first process identifier obtained from the pre-loaded firstconfiguration file on the first node, processor, or computing device. Incertain embodiments, for example, the data may conform (for example theformatting of the data may conform) to a data type assigned to the datatype code.

In certain embodiments, for example, the method may further comprise:comparing the at least one first process identifier with an at least oneprocess identifier assigned to the first process, the at least oneprocess identifier obtained from the pre-loaded second configurationfile on the second node, processor, or computing device. In certainembodiments, for example, the method may further comprise: updating anauthorized connection list to show an open connection state for theauthorized encrypted communication pathway.

In certain embodiments, for example, the method may further comprise:transmitting data packets from the first node to the second node, thedata packets comprising payloads, each of the payloads comprising: datafrom the first process; and at least one first process identifiercomprising one or more of an application code, process owner code, anddata type code, the at least one first process identifier assigned tothe first node, the at least one first process identifier obtained fromthe pre-loaded first configuration file on the first node, processor, orcomputing device. In certain embodiments, for example, the method mayfurther comprise: checking an authorized connection list resident on thesecond node to confirm that the encrypted communication pathway is in anopen connection state. In certain embodiments, for example, the at leastone first process identifier may be positioned in the payload to beprocessed by network security software. In certain embodiments, forexample, the processing may be timed to occur prior to the processing ofany application layer protocol header. In certain embodiments, forexample, the method may further comprise: comparing the at least onefirst process identifier contained in each one of the payloads with anat least one process identifier assigned to the first process, the atleast one process identifier obtained from the pre-loaded secondconfiguration file on the second node, processor, or computing device.In certain embodiments, for example, the method may further comprise:updating an authorized connection list to change the authorizedencrypted communication pathway connection state from open to closed ifthe at least one first process identifier contained in at least one ofthe payloads does not match the at least one first process identifierobtained from the pre-loaded first configuration file on the first node,processor, or computing device.

In certain embodiments, for example, the authorizing may comprise:transmitting a second node identification packet from the second node tothe first node, the second node identification packet comprising apayload having a second node identifier assigned to the second node, thesecond node identifier obtained from the pre-loaded second configurationfile on the second node; and comparing the second node identifier fromthe second node identification packet with an additional node identifierassigned to the second node, the additional node identifier obtainedfrom the pre-loaded first configuration file on the first node,processor, or computing device.

In certain embodiments, for example, the authorizing may comprise:transmitting a first process identification packet from the first nodeto the second node, the first process identification packet comprising apayload having at least one first process identifier assigned to thefirst process, the at least one first process identifier comprising oneor more of a first application code, first process owner code, and firstdata type code, the at least one first process identifier assigned tothe first node, the first process identifier obtained from thepre-loaded first configuration file on the first node; and comparing theat least one first process identifier from the first processidentification packet with a further at least one process identifierassigned to the first node, the further at least one process identifierobtained from the pre-loaded second configuration file on the secondnode, processor, or computing device.

In certain embodiments, for example, the authorizing may comprise:transmitting a second process identification packet from the second nodeto the first node, the second process identification packet comprising apayload having at least one second process identifier assigned to thesecond process, the at least one second process identifier comprisingone or more of a second application code, second process owner code, andsecond data type code, the at least one second process identifierassigned to the second node, the second process identifier obtained fromthe pre-loaded second configuration file on the first node; andcomparing the at least one second process identifier from the secondprocess identification packet with an additional at least one processidentifier assigned to the second node, the additional at least oneprocess identifier obtained from the pre-loaded first configuration fileon the second node, processor, or computing device.

In certain embodiments, for example, the method may further comprise:executing operating system commands to identify a process requesting thedata transfer, followed by verifying that the requesting process is thefirst process.

Certain embodiments may provide, for example, a method for communicationbetween a first node and a second node, comprising: i) pre-loading afirst configuration file on the first node and a second configurationfile on the second node; ii) forming an encrypted communication pathway;and iii) authorizing the encrypted communication pathway to transferdata between a first process running on the first node and a secondprocess running on the second node, comprising: a) transmitting a firstnode identification packet from the first node to the second node, thefirst node identification packet comprising a payload having a firstnode identifier assigned to the first node, the first node identifierobtained from the pre-loaded first configuration file on the first node;and b) comparing the first node identifier from the first nodeidentification packet with a further node identifier assigned to thefirst node, the further node identifier obtained from the pre-loadedsecond configuration file on the second node, processor, or computingdevice.

Certain embodiments may provide, for example, a method for authorizednetwork communication. In certain embodiments, for example, the methodmay comprise: establishing a communication pathway between a firstprocessor node and a second processor node, processor, or computingdevice. In certain embodiments, for example, the method may comprisecomparing a second node identification code obtained from a second nodeidentification packet against a second node expected value. In certainembodiments, for example, the method may comprise further comparing afirst node identification code obtained from a first node identificationpacket against a first node expected value. In certain embodiments, forexample, the method may comprise transmitting, after the comparing andfurther comparing, application data via the communication pathway.

In certain embodiments, for example, the first processor node mayexecute the comparing. In certain embodiments, for example, the secondprocessor node may execute the further comparing. In certainembodiments, for example, the comparing and further comparing may followthe establishing. In certain embodiments, for example, the transmittingmay be executed only after the comparing and further comparing.

In certain embodiments, for example, the communication pathway may beencrypted. In certain embodiments, for example, the first nodeidentification code may be encrypted in the first node identificationpacket with a first single-use encryption key; and/or the second nodeidentification code is encrypted in the second node identificationpacket with a second single-use encryption key.

In certain embodiments, for example, the first node identification codeand/or the second node identification code may be nonpublic. In certainembodiments, for example, the first node identification code and/or thesecond node identification code may be a shared secret. In certainembodiments, for example, the second node expected value may bepre-provisioned on the first processor node; and/or the first nodeexpected value may be pre-provisioned on the second processor node,processor, or computing device.

In certain embodiments, for example, the first node identificationpacket may comprise a higher-than-OSI layer three header, the ahigher-than-OSI layer three header comprising a packet type indicator,the packet type indicator interpretable by network security software toalert the network security software to expect the first nodeidentification code. In certain embodiments, for example, the secondnode identification packet may comprise a higher-than-OSI layer threeheader, the a higher-than-OSI layer three header comprising a packettype indicator, the packet type indicator interpretable by networksecurity software to alert the network security software to expect thesecond node identification code.

In certain embodiments, for example, the first node identificationpacket and the second node identification packet may be received via thecommunication pathway. In certain embodiments, for example, the firstnode identification packet and the second node identification packet maybe received via the network. In certain embodiments, for example, thefirst node identification packet and the second node identificationpacket may not be received via the communication pathway.

Certain embodiments may provide, for example, a method for authorizednetwork communication. In certain embodiments, for example, the methodmay comprise: i) establishing a communication pathway between a firstprocessor node and a second processor node; ii) comparing a second nodeidentification code obtained from a second node identification packetagainst a second node expected value; iii) further comparing a firstnode identification code obtained from a first node identificationpacket against a first node expected value; and iv) transmitting, afterthe comparing and further comparing, application data via thecommunication pathway.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: comparing a destination computing device nonpublicidentification code obtained from the destination computing device witha destination computing device pre-established value. In certainembodiments, for example, the destination computing devicepre-established value may be preprovisioned on the source computingdevice.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: comparing a destination computing device nonpublicidentification code obtained from the destination computing device witha destination computing device pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device. Incertain embodiments, for example, the forming a communication pathwaymay comprise comparing a destination computing device nonpublicidentification code obtained from the destination computing device viathe network with a destination computing device pre-established value.In certain embodiments, for example, the forming a communication pathwaymay comprise further comparing a source computing device nonpublicidentification code obtained from the source computing device via thenetwork to a source computing device pre-established value.

In certain embodiments, for example, the comparing and the furthercomparing may be performed independently. In certain embodiments, forexample, the comparing and the further comparing may be performedsequentially. In certain embodiments, for example, the further comparingmay not be performed until after the comparing is performed. In certainembodiments, for example, the comparing may not be performed until afterthe further comparing is performed. In certain embodiments, for example,the comparing and the further comparing may be performed asynchronously.In certain embodiments, for example, the comparing and the furthercomparing may be performed in a predetermined sequence.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: a) comparing a destination computing device nonpublicidentification code obtained from the destination computing device viathe network with a destination computing device pre-established value;and b) comparing a source computing device nonpublic identification codeobtained from the source computing device via the network to a sourcecomputing device pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device. Incertain embodiments, for example, the forming a communication pathwaymay comprise comparing a destination computing device nonpublicidentification code obtained from the destination computing device viathe network with a destination computing device pre-established value.In certain embodiments, for example, the forming a communication pathwaymay comprise further comparing a source computing device nonpublicidentification code obtained from the source computing device via thenetwork to a source computing device pre-established value. In certainembodiments, for example, the forming a communication pathway maycomprise additionally comparing user-application identifiers and apayload data-type identifiers exchanged between the source anddestination computing devices with predefined authorization codes.

In certain embodiments, for example, the comparing, further comparing,and additionally comparing may be performed independently. In certainembodiments, for example, the comparing, further comparing, andadditionally comparing may be performed sequentially. In certainembodiments, for example, the further comparing may not be performeduntil after the comparing is performed. In certain embodiments, forexample, the comparing may not be performed until after the furthercomparing is performed, and the additionally comparing may not beperformed until after the further comparing is performed. In certainembodiments, for example, the comparing, further comparing, andadditionally comparing may be performed asynchronously. In certainembodiments, for example, the comparing, further comparing, andadditionally comparing may be performed in a predetermined sequence.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: a) comparing a destination computing device nonpublicidentification code obtained from the destination computing device viathe network with a destination computing device pre-established value;b) comparing a source computing device nonpublic identification codeobtained from the source computing device via the network to a sourcecomputing device pre-established value; and c) comparinguser-application identifiers and a payload data-type identifiersexchanged between the source and destination computing devices withpredefined authorization codes.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device. Incertain embodiments, for example, the forming a communication pathwaymay comprise comparing, on the source computing device, a destinationcomputing device nonpublic identification code obtained via the networkwith a destination computing device pre-established value.

In certain embodiments, for example, the destination computing devicenonpublic identification code may be provided by the destinationcomputing device. In certain embodiments, for example, the destinationcomputing device nonpublic identification code may not be provided bythe destination computing device. In certain embodiments, for example,the destination computing device nonpublic identification code may beprovided by a node, the node different from the destination computingdevice.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: comparing, on the source computing device, a destinationcomputing device nonpublic identification code obtained via the networkwith a destination computing device pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device. Incertain embodiments, for example, the forming a communication pathwaymay comprise comparing, on the source computing device, a destinationcomputing device nonpublic identification code obtained from thedestination computing device with a destination computing devicepre-established value. In certain embodiments, for example, the forminga communication pathway may comprise comparing, on the destinationcomputing device, a source computing device nonpublic identificationcode obtained from the source computing device to a source computingdevice pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: a) comparing, on the source computing device, a destinationcomputing device nonpublic identification code obtained from thedestination computing device with a destination computing devicepre-established value; and b) comparing, on the destination computingdevice, a source computing device nonpublic identification code obtainedfrom the source computing device to a source computing devicepre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: forming a communication pathwaybetween a source computing device and a destination computing device. Incertain embodiments, for example, the forming a communication pathwaymay comprise comparing, at the source computing device, a destinationcomputing device nonpublic identification code obtained from adestination node packet with a destination node pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: forming a communication pathwaybetween a source computing device and a destination computing device,comprising: comparing, at the source computing device, a destinationcomputing device nonpublic identification code obtained from adestination node packet with a destination node pre-established value.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a computingdevice (for example a computing device executing an operating system(for example a Linux operating system, a Linux-based operating system, areal time operating system, a mini-operating system, an edge deviceoperating system, and/or an open source operating system)) to enableand/or cause the computing device to perform communication managementoperations. In certain embodiments, for example, the communicationmanagement operations may comprise: establishing authorizedcommunication pathways for port-to-port network communications among theplurality of computing devices. In certain embodiments, for example, theestablishing authorized communication pathways may comprise interceptinga network connection request from a source port, the request having anassociated destination port number. In certain embodiments, for example,the establishing authorized communication pathways may compriseverifying that the source port is authorized to communicate with adestination port having the associated destination port number. Incertain embodiments, for example, the establishing authorizedcommunication pathways may comprise authorizing a communication pathwaybetween a source computing device hosting the source port and adestination computing device hosting the destination port prior to anytransmission of application data between the source computing device andthe destination computing device via the communication pathway. Incertain embodiments, for example, the authorizing may comprisecomparing, on the source computing device, a destination computingdevice nonpublic identification code to a destination computing deviceexpected value, the destination computing device nonpublicidentification code obtained from a destination computing deviceidentification packet. In certain embodiments, for example, theauthorizing may comprise further comparing, on the destination computingdevice, a source computing device nonpublic identification code to asource computing device expected value, the source computing devicenonpublic identification code obtained from a source computing deviceidentification packet.

In certain embodiments, for example, the destination computing deviceidentification packet and/or the source computing device identificationpacket may be received via the network. In certain embodiments, forexample, the destination computing device identification packet and/orthe source computing device identification packet may be received viathe communication pathway.

In certain embodiments, for example, the destination computing deviceexpected value may be pre-provisioned on the source computing device. Incertain embodiments, for example, the source computing device expectedvalue may be pre-provisioned on the destination computing device.

In certain embodiments, for example, the comparing and/or the furthercomparing may be enabled by a kernel of the computing device. In certainembodiments, for example, the computer-readable program code may beexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system).

In certain embodiments, for example, the communication managementoperations may comprise: inserting the source computing device nonpublicidentification code into a higher-than-OSI layer three portion of thesource computing device identification packet. In certain embodiments,for example, the communication management operations may comprise:inserting the source computing device nonpublic identification code intoa higher-than-OSI layer four portion of the source computing deviceidentification packet. In certain embodiments, for example, thecommunication management operations may comprise: inserting the sourcecomputing device nonpublic identification code into a payload portion ofthe source computing device identification packet. In certainembodiments, for example, the communication management operations maycomprise: inserting the destination computing device nonpublicidentification code into a higher-than-OSI layer three portion of thedestination computing device identification packet. In certainembodiments, for example, the communication management operations maycomprise: inserting the destination computing device nonpublicidentification code into a higher-than-OSI layer four portion of thedestination computing device identification packet. In certainembodiments, for example, the communication management operations maycomprise: inserting the destination computing device nonpublicidentification code into a payload portion of the destination computingdevice identification packet.

In certain embodiments, for example, the communication managementoperations may comprise: encrypting the source computing devicenonpublic identification code and inserting the encrypted sourcecomputing device nonpublic identification code into the source computingdevice identification packet. In certain embodiments, for example, thesource computing device nonpublic identification code may be encryptedwith a single-use cryptographic key. In certain embodiments, forexample, the communication management operations may comprise:encrypting the destination computing device nonpublic identificationcode and inserting the encrypted destination computing device nonpublicidentification code into the destination computing device identificationpacket. In certain embodiments, for example, the destination computingdevice nonpublic identification code is encrypted with a single-usecryptographic key.

In certain embodiments, for example, the communication pathway betweenthe source computing device and the destination computing device may beestablished prior to the authorizing.

In certain embodiments, for example, the communication managementoperations may comprise: requesting negotiation of the communicationpathway, the requesting comprising sending a connection request packetcomprising the associated destination port number.

In certain embodiments, for example, the communication managementoperations may comprise: establishing authorized encrypted communicationpathways for all port-to-port network communications among the pluralityof networked processor nodes.

In certain embodiments, for example, the communication managementoperations may comprise: comparing user-application identifiers and apayload data-type identifiers exchanged between the source anddestination computing devices with predefined authorization codes.

In certain embodiments, for example, the comparing and the furthercomparing may be performed independently. In certain embodiments, forexample, the comparing and the further comparing may be performedsequentially. In certain embodiments, for example, the further comparingmay not be performed until after the comparing is performed. In certainembodiments, for example, the comparing may not be performed until afterthe further comparing is performed. In certain embodiments, for example,the comparing and the further comparing may be performed asynchronously.In certain embodiments, for example, the comparing and the furthercomparing may be performed in a predetermined sequence.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: establishing authorized communicationpathways for port-to-port network communications among the plurality ofcomputing devices, comprising: i) intercepting, via a network, a networkconnection request from a source port, the request having an associateddestination port number; ii) verifying that the source port isauthorized to communicate with a destination port having the associateddestination port number; and iii) authorizing a communication pathwaybetween a source computing device hosting the source port and adestination computing device hosting the destination port prior to anytransmission of application data between the source computing device andthe destination computing device via the communication pathway,comprising: a) comparing, on the source computing device, a destinationcomputing device nonpublic identification code to a destinationcomputing device expected value, the destination computing devicenonpublic identification code obtained from a destination computingdevice identification packet; and b) further comparing, on thedestination computing device, a source computing device nonpublicidentification code to a source computing device expected value, thesource computing device nonpublic identification code obtained from asource computing device identification packet.

Certain embodiments may provide, for example, a method for securecommunication between applications on two nodes. In certain embodiments,for example, the method may comprise intercepting, at a first node, anetwork connection request from a resident first user-application tosend data to a destination port on a second node, processor, orcomputing device. In certain embodiments, for example, the method maycomprise consulting a first local policy on the first node to verifythat the first user-application is authorized to send data to thedestination port. In certain embodiments, for example, the method maycomprise verifying, at the second node, that the connection request isauthorized by the first local policy for the destination port.

In certain embodiments, for example, the method may further comprisetransmitting an encrypted identifier for the first local policy from thefirst node to the second node, processor, or computing device.

In certain embodiments, for example, the verifying may compriseconsulting the first local policy and a second local policy, the secondlocal policy consulted to verify that a second user application isauthorized to receive the data at the destination port. In certainembodiments, for example, the first local policy may comprise an n-tuplefilter. In certain embodiments, for example, the first local policy maycomprise a port-to-port mapping of authorized connection between thefirst node and the second node, processor, or computing device. Incertain embodiments, for example, the authorized port-to-port mappingmay comprise an authorized first user-application identifier, anidentifier for a second user application authorized to receive the dataat the destination port authorized, and a data type identifier.

Certain embodiments may provide, for example, a method for securecommunication between applications on two nodes, comprising: i)intercepting, at a first node, a network connection request from aresident first user-application to send data to a destination port on asecond node; ii) consulting a first local policy on the first node toverify that the first user-application is authorized to send data to thedestination port; and iii) verifying, at the second node, that theconnection request is authorized by the first local policy for thedestination port.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or compilable,linkable, and/or loadable to be executable) by a computing device (forexample a computing device executing an operating system (for example aLinux operating system, a Linux-based operating system, a real timeoperating system, a mini-operating system, an edge device operatingsystem, and/or an open source operating system)) to enable and/or causethe computing device to perform communication management operations. Incertain embodiments, for example, the communication managementoperations may comprise performing communication processing functions onall port-to-network communications of the plurality of processor nodes.In certain embodiments, for example, the communication processingfunctions may comprise receiving data packets from a user-applicationsource port, the data packets having payloads and associated destinationport numbers. In certain embodiments, for example, the communicationprocessing functions may comprise assembling packet segments for allreceived data packets from the user-application, the packet segmentscomprising one of the payloads, an associated user-applicationidentifier, and a payload data type descriptor.

In certain embodiments, for example, the communication processingfunctions may comprise verifying that the source ports are authorized tocommunicate with ports having the associated destination port numbers.

In certain embodiments, for example, the communication processingfunctions may comprise requesting transmission of network packets to thenetwork, each one of the network packets comprising a port number of oneof the associated destination port numbers and one of the assembledpacket segments.

In certain embodiments, for example, the communication processingfunctions may comprise requesting transmission of network packets to thenetwork through encrypted communication pathways.

In certain embodiments, for example, each one of the encryptedcommunication pathways may have a one-to-one correspondence with one ofthe associated destination port numbers.

In certain embodiments, for example, the receiving may occur in a kernelof the computing device.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example acomputing device executing an operating system (for example a Linuxoperating system, a Linux-based operating system, a real time operatingsystem, a mini-operating system, an edge device operating system, and/oran open source operating system)) to enable and/or cause the computingdevice to perform communication management operations, the communicationmanagement operations comprising: performing communication processingfunctions on all port-to-network communications of the plurality ofprocessor nodes, the performing communication processing functionscomprising: i) receiving data packets from a user-application sourceport, the data packets having payloads and associated destination portnumbers; and ii) assembling packet segments for all received datapackets from the user-application, the packet segments comprising one ofthe payloads, an associated user-application identifier, and a payloaddata type descriptor.

Certain embodiments may provide, for example, a distributed method tomanage communications between plural nodes coupled to a network. Incertain embodiments, for example, the distributed method may compriseauthorizing port-to-port connections, comprising: obtaining portnumbers, node identifiers, user-application identifiers, and payloaddata type descriptors from pre-provisioned configuration files presenton at least two computing devices of the plural computing devices. Incertain embodiments, for example, the distributed method may compriserestricting network communications to and from at least one of the atleast two computing devices to the authorized port-to-port connections.

Certain embodiments may provide, for example, a distributed method tomanage communications between plural nodes coupled to a network,comprising: i) authorizing port-to-port connections, comprising:obtaining port numbers, node identifiers, user-application identifiers,and payload data type descriptors from pre-provisioned configurationfiles present on at least two computing devices of the plural computingdevices; and ii) restricting network communications to and from at leastone of the at least two computing devices to the authorized port-to-portconnections.

Certain embodiments may provide, for example, a method for securenetwork communication, comprising: i) selecting, from a pre-configured,exclusive list of authorized data pathways, a dedicated data pathwayextending from a source port on a first node to a destination port on asecond node, the selected data pathway characterized by a tunnel portnumber exclusive to the destination port; ii) instantiating a networktunnel extending from the first node to a tunnel port present on thesecond node, the tunnel port having the selected tunnel port number;iii) prior to transmitting any data from the source port to thedestination port: verifying, at the first node, that a first n-tuplereceived from the network tunnel matches an expected value based on thetunnel port number, the first n-tuple comprising: a nonpublic devicecode for the second node, a user associated with the destination port,an application associated with the destination port, and a data protocoldescriptor; and iv) prior to passing a network packet to the destinationport: verifying, at the second node, that an second n-tuple obtainedfrom the network packet matches an expected value based on the tunnelport number, the second n-tuple comprising: a user associated with thesource port, an application associated with the source port, and thedata protocol descriptor.

Certain embodiments may provide, for example, a method for securenetwork communication, comprising: i) selecting, from a pre-configured,exclusive list of authorized data pathways, a dedicated data pathwayextending from a source port on a first node to a destination port on asecond node; ii) instantiating a network tunnel for exclusive use by thededicated data path, the network tunnel extending from the first node tothe second node; iii) prior to transmitting any data through the networktunnel, verifying that the first node, the second node, a userassociated with the source port, an application associated with thesource port, a user associated with the destination port, an applicationassociated with the destination port, and a data protocol of the datamatch parameters of the dedicated data path; followed by iv) prior topassing a network packet to the destination port: verifying, at thesecond node, that the user associated with the source port, theapplication associated with the source port, and the data protocoldescriptor match parameters of the dedicated data pathway.

Certain embodiments may provide, for example, a method of securelytransmitting data, comprising: i) prior to transmitting data packets viaa dedicated data pathway extending from a source port on a first node toa destination port on a second node, receiving a series of codes at thefirst node via the dedicated data path; ii) verifying that the receivedcodes include expected codes for the data path, the expected codesassociated with the second node, a specified data type, and an owner ofthe destination port; iii) verifying that the data packets containexpected codes associated with the specified data type and an owner ofthe source port; followed by iv) passing the data packets to thedestination port.

Certain embodiments may provide, for example, a method of securelytransmitting data, comprising: i) establishing a dedicated data pathwaybetween a source port on a first node and a destination port on a secondnode, the destination port associated with an executing user-applicationconfigured to receive a specified data type; ii) receiving a series ofcodes at the first node via the dedicated data path; iii) verifying thatthe received series of codes include expected codes associated with thesecond node, the specified data type, and the user-application; followedby iv) transmitting data packets via the dedicated data pathway to thesecond node; v) further verifying that the transmitted data packetscontain expected codes associated with the specified data type and anowner of the source port; followed by vi) passing the transmitted datapackets to the destination port. In certain embodiments, for example,the transmitted data packets may be exclusive of the destination portnumber.

Certain embodiments may provide, for example, a method of securelytransmitting data, comprising: i) assembling data packets at a firstnode, each one of the data packets comprising: a) plural identifiersencoded in metadata; and b) payload obtained from a user-applicationexecuting on the source node; ii) passing the assembled data packets toa second node via a dedicated data pathway, the data pathway comprisinga source port associated with the user-application; iii) verifying thatthe metadata identifies a data type and a user-application expectedbased on a destination port associated with the destination address ofthe data packets; followed by iv) passing the data packets to thedestination port. In certain embodiments, for example, the assembleddata packets passed to the second node may be exclusive of thedestination port number.

Certain embodiments may provide, for example, a method for securecommunication. In certain embodiments, for example, the method maycomprise receiving a first network packet from a first user-application,the first network packet comprising a destination port number and apayload. In certain embodiments, for example, the method may compriseforming a second network packet comprising the payload, the secondnetwork packet not comprising the destination port number. In certainembodiments, for example, the method may comprise transmitting thesecond network packet via a machine-to-machine network. In certainembodiments, for example, the method may comprise processing thetransmitted second network packet to form a third packet comprising thedestination port number and the payload. In certain embodiments, forexample, the method may comprise transmitting the payload to a seconduser-application, the second user-application having a destination portassigned thereto, the destination port number assigned to thedestination port.

Certain embodiments may provide, for example, a method for securecommunication, comprising: i) receiving a first network packet from afirst user-application, the first network packet comprising adestination port number and a payload; ii) forming a second networkpacket comprising the payload, the second network packet not comprisingthe destination port number; iii) transmitting the second network packetvia a machine-to-machine network; and iv) processing the transmittedsecond network packet to form a third packet comprising the destinationport number and the payload.

Certain embodiments of the presently disclosed methods, systems,products, software, middleware, computing infrastructure and/orapparatus may provide, for example, improvements to existing computingtechnology for packet-based network communications. Internet protocolsallow open access for computer users to remotely access other computersand information stores easily from any access point, resulting in manypoints of attack for malware. While security layers have been added ontop of this core architecture, modern malware exploits gaps in theselayers through flaws in software and imperfect trust relationshipsbetween communicating devices. The improvements of the presentdisclosure include the following embodiments.

Certain embodiments may provide, for example, a method for networkcommunication between a first computing device and a second computingdevice and comprising establishing a communication pathway between afirst software port of the first computing device and a second softwareport of the second computing device according to UDP or TCP, theimprovement comprising: i) sending a nonpublic first identification codefor the first computing device to the second software port via theestablished communication pathway; ii) receiving, in response to thesending, a nonpublic second identification code for the second computingdevice at the first software port; and iii) comparing the nonpublicsecond identification code with a pre-established value for the secondcomputing device.

Certain embodiments may provide, for example, a method for networkcommunication comprising establishing communication pathways accordingto UDP or TCP, the improvement comprising: i) intercepting networkconnection requests having associated destination port numbers; ii)identifying predefined communication port numbers, comprisingidentifying at least one predefined communication port number for eachassociated destination port number of the associated destination portnumbers; iii) sending UDP or TCP connection request packets comprisingthe predefined communication port numbers, each one of the communicationpathways having a one-to-one correspondence with one of the predefinedcommunication port numbers; and iv) authorizing the communicationpathways, comprising comparing computing device identifiers,user-application identifiers, and payload data-type identifiers receivedthe communication pathways with predefined authorization codes.

Certain embodiments may provide, for example, a method for networkcommunication comprising establishing communication pathways accordingto UDP or TCP, the improvement comprising: i) intercepting networkconnection requests from source ports, the requests having associateddestination port numbers; ii) verifying that the source ports areauthorized to communicate with ports having the associated destinationport numbers; iii) sending a UDP or TCP connection request packetscomprising the associated destination port numbers; and iv) authorizingthe communication pathways, comprising comparing computing deviceidentifiers, user-application identifiers, and payload data-typeidentifiers received from the communication pathways with predefinedauthorization codes.

Certain embodiments may provide, for example, a method for networkcommunication comprising transmitting UDP or TCP network packets throughcommunication pathways, the improvement comprising: i) receiving datapackets having payloads and associated destination port numbers; ii)identifying predefined port numbers, each one of the predefined portnumbers having a one-to-one correspondence with one of the associateddestination port numbers; iii) assembling packet segments, each one ofthe packet segments comprising one of the payloads, an associateduser-application identifier, and a payload data type descriptor; and iv)requesting transmission of UDP or TCP network packets through thecommunication pathways, each one of the network packets comprising aport number of one of the predefined port numbers and one of theassembled packet segments, each one of the communication pathways havinga one-to-one correspondence with one of the predefined port numbers.

Certain embodiments may provide, for example, a method for networkcommunication comprising receiving UDP or TCP network packets fromcommunication pathways, the improvement comprising: i) obtainingdestination port numbers, metadata, and payloads associated with UDP orTCP network packets; ii) identifying predefined authorization codesassociated with the destination port numbers, each one of the predefinedauthorization codes comprising a predefined user-application identifierand a predefined payload data-type identifier associated with one of thedestination port numbers; iii) authorizing the network packets,comprising: comparing at least a portion of the metadata with thepredefined authorization codes; and iv) requesting transmission ofpayloads from the authorized network packets to destinations referencedby the destination port numbers.

Certain embodiments may provide, for example, a method for networkcommunication between a first computing device and a second computingdevice and comprising establishing a communication pathway between afirst software port of the first computing device and a second softwareport of the second computing device according to UDP or TCP, theimprovement comprising: one or more of the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of anyof the embodiments disclosed herein.

Certain embodiments, for example, may comprise a product for securingcommunications of a plurality of networked computing devices. In certainembodiments, for example, the product may comprise a non-transitorycomputer-readable storage medium having computer-readable program codeembodied therein. In certain embodiments, for example, thecomputer-readable program code may be executable (or program codecompilable, linkable, and/or loadable to be executable) by a firstcomputing device (for example a computing device executing an operatingsystem (for example a Linux operating system, a Linux-based operatingsystem, a real time operating system, a mini-operating system, an edgedevice operating system, and/or an open source operating system)) toenable and/or cause the first computing device to perform communicationmanagement operations. In certain embodiments, for example, thecommunications management operations may comprise receiving a firstnetwork packet from a first user-application, the first network packetcomprising a destination port number and a payload. In certainembodiments, for example, the communications management operations maycomprise forming a second network packet comprising the payload, thesecond network packet not comprising the destination port number. Incertain embodiments, for example, the communications managementoperations may comprise transmitting the second network packet tonetwork security software on a second computing device. In certainembodiments, for example, the communications management operations maycomprise confirming that the network security software is pre-configuredto transmit the payload to a second user-application on the secondcomputing device, the second user-application having a destination portassigned thereto, the destination port number assigned to thedestination port.

In certain embodiments, for example, the first user-application may beresident on the first computing device. In certain embodiments, forexample, the network security software may obtain the destination portnumber from a preprovisioned file, the preprovisioned file resident onnonvolatile storage media in communication with the second computingdevice.

Certain embodiments may provide, for example, a product for managingcommunications of a plurality of networked computing devices, theproduct comprising a non-transitory computer-readable storage mediumhaving computer-readable program code embodied therein, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a first computing device executingan operating system (for example a Linux operating system, a Linux-basedoperating system, a real time operating system, a mini-operating system,an edge device operating system, and/or an open source operating system)to enable and/or cause the first computing device to performcommunication management operations, the communication managementoperations comprising: i) receiving a first network packet from a firstuser-application, the first network packet comprising a destination portnumber and a payload; ii) forming a second network packet comprising thepayload, the second network packet not comprising the destination portnumber; iii) transmitting the second network packet to network securitysoftware on a second computing device; and iv) confirming that thenetwork security software is pre-configured to transmit the payload to asecond user-application on the second computing device, the seconduser-application having a destination port assigned thereto, thedestination port number assigned to the destination port.

In any of the products disclosed herein for use on a computing device(for example products for managing communications), the product or aportion thereof may be distributed separately (for example on separatenon-transitory computer-readable storage media) from at least a portion(for example all) of an operating system or kernel running (or to berun) on the computing device. In certain embodiments, for example, theproduct or a portion thereof may be installed separately from at least aportion (for example all) of an operating system or kernel running (orto be run) on the computing device. In certain embodiments, for example,the product or a portion thereof may be compiled separately from atleast a portion (for example all) of an operating system or kernelrunning (or to be run) on the computing device. In certain embodiments,for example, the product or a portion thereof is linked separately fromat least a portion (for example all) of an operating system or kernelrunning on the computing device. In certain embodiments,computer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the communication management operations and/or processingfunctions disclosed herein (for example one or more of the establishing,performing, intercepting, identifying, requesting, authorizing,verifying, receiving, assembling, requesting transmission, encrypting,decrypting, inserting, translating, comparing, further comparing,additionally comparing, obtaining, negotiating, identifying, or formingoperations or functions disclosed herein) are distributed on separatenon-transitory computer-readable storage media from computer-readableprogram code executable (or compilable, linkable, and/or loadable to beexecutable) by the computing device to perform the other of thecommunication management operations and/or processing functions. Incertain embodiments, the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform the intercepting may be distributed on separatenon-transitory computer-readable storage media from thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by the computing device to performother communication management operations and/or processing functionsdisclosed herein.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform the intercepting and/or the receivingoperations or functions on a computing device may be distributedseparately (for example on separate non-transitory computer-readablestorage media) from computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by the computingdevice to perform one or more of the identifying, authorizing,verifying, assembling, encrypting, decrypting, inserting, translating,comparing, further comparing, additionally comparing, obtaining,negotiating, identifying, and forming operations or functions. Incertain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform the intercepting and/or the receivingoperations or functions may be installed separately fromcomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by the computing device to perform oneor more of the identifying, authorizing, verifying, assembling,encrypting, decrypting, inserting, translating, comparing, furthercomparing, additionally comparing, obtaining, negotiating, identifying,and forming operations or functions. In certain embodiments, forexample, computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform the intercepting and/or the receiving operations or functionsmay be compiled separately from computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by the computing device to perform one or more of the identifying,authorizing, verifying, assembling, encrypting, decrypting, inserting,translating, comparing, further comparing, additionally comparing,obtaining, negotiating, identifying, and forming operations orfunctions. In certain embodiments, for example, the computer-readableprogram code executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform intercepting and/or thereceiving operations or function may be linked separately fromcomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by the computing device to perform oneor more of the identifying, authorizing, verifying, assembling,encrypting, decrypting, inserting, translating, comparing, furthercomparing, additionally comparing, obtaining, negotiating, identifying,and forming operations or functions.

In certain embodiments, for example, the computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe executable (or compilable, linkable, and/or loadable to beexecutable) in a kernel of the computing device.

In certain embodiments, for example, the computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe agnostic as to the operating system or kernel running on thecomputing device. In certain embodiments, for example, computer-readableprogram code executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may contain only a minimum interface functionalityrequired to communicate with an operating system or kernel running onthe computing device, and be otherwise agnostic as to the operatingsystem or kernel running. In certain further embodiments, for example,the minimum interface functionality may comprise a kernel header, adefinition file, a variable definition, mandatory kernel call, or acombination of two or more of the foregoing. In certain furtherembodiments, for example, the minimum interface functionality may belimited to one or more kernel headers, one or more definition files, oneor more variable definitions, one or more mandatory kernel calls, or acombination of two or more of the foregoing. In certain embodiments, forexample, computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform one or more of the communication management operations and/orprocessing functions disclosed herein may be exclusive of any portion ofcode of a pre-existing operating system or kernel executable (orcompilable, linkable, and/or loadable to be executable) on the computingdevice. In certain embodiments, for example, computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may be exclusive of any calls to functions or modulesof a pre-existing operating system or kernel executable (or compilable,linkable, and/or loadable to be executable) on the computing device.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein mayreceive data from an end-user application program via an operatingsystem or kernel executable (or compilable, linkable, and/or loadable tobe executable) on the computing device. In certain embodiments, forexample, computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform one or more of the communication management operations and/orprocessing functions disclosed herein may not receive any further datafrom an operating system or kernel executable (or compilable, linkable,and/or loadable to be executable) on the computing device. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may not receive any furtherdata from an operating system or kernel executable (or compilable,linkable, and/or loadable to be executable) on the computing device. Incertain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein (forexample all of communication management operations and/or processingfunctions disclosed herein) may not share any address space (for examplekernel address space) with an operating system or kernel executable (orcompilable, linkable, and/or loadable to be executable) on the computingdevice. In certain embodiments, for example, computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may not use and/or manipulate any operating system orkernel data structure on the computing device.

In certain embodiments, for example, at least a portion ofcomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the communication management operations and/or processingfunctions disclosed herein may not be subject to a copyleft license. Incertain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maynot be subject to a copyleft license. In certain embodiments, forexample, computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform one or more of the communication management operations and/orprocessing functions disclosed herein may not be subject to a GeneralPublic License (GPL), for example the GPL version 1, the GPL version 2,the GPL version 3, a Lesser GPL, or a modified GPL. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may not be subject to aBerkeley Software Distribution (BSD) license, for example a BSD Licenseversion 2.0, a Revised BSD License, a New BSD license, a Modified BSDLicense, or an otherwise modified BSD license.

In certain embodiments, for example, at least a portion of thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device (for example aportion of the computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device thatmay not be subject to a copyleft license) may be in communication with(for example may be linked to and/or may exchange data with) softwarethat may be subject to a copyleft license (for example software that maybe subject to the GPL version 2). In certain embodiments, for example,the software that may be subject to a copyleft license may be part orall of a kernel or an operating system or kernel. In certainembodiments, for example, the software that may be subject to a copyleftlicense may be an operating system (for example a Linux operatingsystem, a Linux-based operating system, a real time operating system, amini-operating system, an edge device operating system, and/or an opensource operating system) or kernel. In certain embodiments, for example,the software that may be subject to a copyleft license may be at aboundary (or edge or periphery) of the kernel (for example the softwarethat may be subject to a copyleft license may be an API such as anetwork API). In certain embodiments, for example, the software that maybe subject to a copyleft license may be an interoperability interface(for example an interface for communication between at least a portionof a kernel running on the computing device and an application runningon the computing device.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maynot comprise part of an operating system or kernel executable (orcompilable, linkable, and/or loadable to be executable) on the computingdevice. In certain embodiments, for example, computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may be executable (or compilable, linkable, and/orloadable to be executable) in a kernel of the computing device, forexample in a privileged processing space, while not comprising part ofan operating system or kernel executable (or compilable, linkable,and/or loadable to be executable) on the computing device. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may be executable (orcompilable, linkable, and/or loadable to be executable) in anapplication space of the computing device.

In certain embodiments, for example, a portion of the computer-readableprogram code executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device may be executable (or compilable,linkable, and/or loadable to be executable) in a kernel space of thecomputing device, and a further portion of the computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device may be executable (or compilable,linkable, and/or loadable to be executable) in an application space ofthe computing device. In certain embodiments, for example, a portion ofthe computer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device may beexecutable (or compilable, linkable, and/or loadable to be executable)in a kernel space of the computing device, and a further portion of thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device may not beexecutable (or compilable, linkable, and/or loadable to be executable)in the kernel space (for example it may be executable in the applicationspace or other non-privileged or non-priority executable space).

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform the intercepting and/or the receivingoperations or functions may be executable (or compilable, linkable,and/or loadable to be executable) in a kernel space of the computingdevice, and computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform one or more of the assembling, requesting transmission,encrypting, decrypting, inserting, translating, comparing, furthercomparing, and additionally comparing operations or functions may beexecutable (or compilable, linkable, and/or loadable to be executable)in an application space of the computing device. In certain embodiments,for example, computer-readable program code executable (or compilable,linkable, and/or loadable to be executable) by a computing device toperform the intercepting and/or the receiving operations or functionsmay be executable (or compilable, linkable, and/or loadable to beexecutable) in a kernel space of the computing device, andcomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the assembling, requesting transmission, encrypting,decrypting, inserting, translating, comparing, further comparing, andadditionally comparing operations or functions may not be executable (orcompilable, linkable, and/or loadable to be executable) in the kernelspace.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe a plug-in. In certain embodiments, for example, computer-readableprogram code executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may be present in a library (for example in adynamic-link library). In certain embodiments, for example,computer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the communication management operations and/or processingfunctions disclosed herein may be a loadable module. In certainembodiments, for example, the loadable module may be loaded by acomputing device during bootup of the computing device. In certainembodiments, for example, the loadable module may be loaded by acomputing device prior to loading of an operating system (for examplemay be loaded by an initial runtime environment or loaded by a BasicInput/Output System (BIOS)). In certain embodiments, for example, theloadable module may be loaded by the computing device after bootup ofthe computing device. In certain embodiments, for example, the loadablemodule may be loaded by the computing device during runtime. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may be a loadable kernelmodule. In certain embodiments, for example, computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of thecommunication management operations and/or processing functionsdisclosed herein may be a loadable application module. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may be a driver.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe dynamically linkable (for example may be a dynamically linkablemodule, such as a dynamically linkable loadable module). In certainembodiments, for example, the computer-readable program code may bedynamically linkable with a kernel (for example with a Linux orLinux-based kernel). In certain embodiments, for example, thecomputer-readable program code may be dynamically linkable with anoperating system or kernel (for example with an operating system (forexample a Linux operating system, a Linux-based operating system, a realtime operating system, a mini-operating system, an edge device operatingsystem, and/or an open source operating system)). In certainembodiments, for example, references (for example symbol tables, modulenames, memory offsets, etc.) to the dynamically linkable program codemay be stored in a kernel space of the computing device. In certainembodiments, for example, references to the dynamically linkable programmay be stored in an application space of the computing device. Incertain embodiments, for example, the computer-readable program code maybe compiled separately from an operating system or a kernel to form akernel loadable module. In certain embodiments, for example, the kernelloadable module may be dynamically linked with the kernel during runtimeon the computing device.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe linkable (for example dynamically or statically linkable). In certainembodiments, for example, the computer-readable program code may belinkable in a kernel (for example with a Linux or Linux-based kernel).In certain embodiments, for example, the computer-readable program codemay be linkable with an operating system (for example with an operatingsystem (for example a Linux operating system, a Linux-based operatingsystem, a real time operating system, a mini-operating system, an edgedevice operating system, and/or an open source operating system)). Incertain embodiments, for example, the computer-readable program code maybe linkable (for example dynamically or statically linkable) to anapplication program. In certain embodiments, for example, thecomputer-readable program code may be linkable (for example dynamicallyor statically linkable) to an interface (for example an interoperabilityinterface). In certain embodiments, for example, the computer-readableprogram code may be linkable (for example dynamically or staticallylinkable) to an interface between an application space of the computingdevice and a kernel space of the computing device. In certainembodiments, for example, the computer-readable program code may belinkable (for example dynamically or statically linkable) to anapplication-to-kernel program interface (for example an interface suchas Netlink or Netlinks). In certain embodiments, for example,computer-readable program code may be linkable (for example dynamicallyor statically linkable) to an application-to-application programinterface. In certain embodiments, for example, computer-readableprogram code may be linkable (for example dynamically or staticallylinkable) to a kernel-to-kernel program interface.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe a statically linkable module. In certain embodiments, for example,computer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the communication management operations and/or processingfunctions disclosed herein may be a standalone program.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform one or more of the communicationmanagement operations and/or processing functions disclosed herein maybe an object file. In certain embodiments, for example,computer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the communication management operations and/or processingfunctions disclosed herein may be compilable ASCII code. In certainembodiments, for example, computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the communication management operationsand/or processing functions disclosed herein may be compiled.

In certain embodiments, for example, computer-readable program codeexecutable (or compilable, linkable, and/or loadable to be executable)by a computing device to perform intercepting and/or the receivingoperations or functions may be invoked by one or more modified kernelfunctions (for example by a modified network API function such as bind() or connect( )). In certain embodiments, for example, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to performintercepting and/or the receiving operations or functions may be invokedby one or more modified kernel functions, and computer-readable programcode executable (or compilable, linkable, and/or loadable to beexecutable) by a computing device to perform one or more of theidentifying, authorizing, verifying, comparing, further comparing, andadditionally comparing, may be part or all of a separate executable (orcompilable, linkable, and/or loadable to be executable) code thatcommunicates, via an inter-program interface (for example Netlink orNetlinks), with the computer-readable program code executable (orcompilable, linkable, and/or loadable to be executable) by a computingdevice to perform one or more of the assembling, encrypting, decrypting,inserting, and translating operations or functions. In certainembodiments, for example, the one or more modified kernel functions maybe licensed under the GPL version 2. In certain further embodiments, thecomputer-readable program code executable (or compilable, linkable,and/or loadable to be executable) by a computing device to perform oneor more of the establishing, performing, intercepting, identifying,requesting, authorizing, verifying, receiving, assembling, requestingtransmission, encrypting, decrypting, inserting, translating, comparing,further comparing, additionally comparing, obtaining, negotiating,identifying, forming operations or functions may not be licensed under aGPL or a BSD license. In certain embodiments, for example, the modifiedkernel function may be statically linked with an operating systemexecutable (or compilable, linkable, and/or loadable to be executable)on the computing device. In certain embodiments, for example, themodified kernel function may be dynamically linked with an operatingsystem running on the processor.

Certain embodiments may provide, for example, a computer program productcomprising a computer readable storage medium having a computer readableprogram stored therein, wherein the computer readable program, whenexecuted on a computing device, enables or causes the computing deviceto perform one or more of the methods disclosed herein.

Certain embodiments may provide, for example, a computer program productcomprising a computer readable storage medium having a computer readableprogram stored therein, wherein the computer readable program, whenexecuted on a computing device, further enables or causes the computingdevice to perform one or more of the methods disclosed herein.

Certain embodiments may provide, for example, a computer program productcomprising a computer readable storage medium having a computer readableprogram stored therein, wherein the computer readable program, whenexecuted on a computing device running a Linux operating system, enablesor causes the computing device to perform one or more of the methodsdisclosed herein.

Certain embodiments may provide, for example, a computer program productcomprising a computer readable storage medium having a computer readableprogram stored therein, wherein the computer readable program, whenexecuted on a computing device running an operating system (for example,Linux), further enables or causes the computing device to perform one ormore of the methods disclosed herein.

Certain embodiments may provide, for example, an apparatus, comprising:a processor; and a memory coupled to the processor, wherein the memorycomprises instructions which, when executed by the processor, enable orcause the processor to perform one or more of the methods disclosedherein.

Certain embodiments may provide, for example, a system, comprising: oneor more processors; a memory coupled to said one or more processors,said memory including a computer useable medium tangibly embodying atleast one program of instructions executable by at least one of said oneor more processors to perform one or more of the methods disclosedherein.

Certain embodiments may provide, for example, a computer programproduct, comprising: one or more machine-useable storage media; programinstructions provided by said one or more media for programming a dataprocessing platform to perform one or more of the methods disclosedherein.

Certain embodiments may provide, for example, an apparatus comprising: ahost operating system comprising an active kernel and an activecontainer; and a processor operable with said active kernel toinstantiate instances for active Kernel Loadable Modules (KLMs) forservicing said active container, said active KLM's executable to performone or more of the methods disclosed herein.

Certain embodiments may provide, for example, a system, comprising: oneor more processors; an operating system executing on said one or moreprocessors; memory coupled to said one or more processors, said memoryincluding a computer useable medium tangibly embodying at least oneprogram of instructions executable by at least one of said one or moreprocessors to perform operations to perform one or more of the methodsdisclosed herein.

Certain embodiments may provide, for example, logic encoded on one ormore non-transitory computer readable media for execution and whenexecuted operable to perform one or more of the methods disclosedherein.

Certain embodiments may provide, for example, logic encoded on one ormore non-transitory computer readable media for execution on one or moreprocessors executing operating system commands, when executed operableto perform one or more of the methods disclosed herein.

Certain embodiments may provide, for example, a readable storage mediumhaving a computer readable program stored therein, wherein the computerreadable program, when executed on a computing device, causes thecomputing device to perform one or more of the methods disclosed herein.

Certain embodiments may provide, for example, a computing devicecomprising: a memory containing machine readable medium comprisingmachine executable code having stored thereon instructions to performone or more of the methods disclosed herein.

Certain embodiments may provide, for example, a computer program productto perform one or more of the methods disclosed herein, the computerprogram product comprising: one or more computer readable storage media;and program instructions stored on the one or more computer readablestorage media to perform the one or more of the methods disclosedherein.

Certain embodiments may provide, for example, a non-transitorymachine-readable storage medium comprising instructions to provideenhanced communication security of a system comprising a processoroperating with a Linux or Linux-based operating system, the instructionsexecutable by the processor one or more of the methods disclosed herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1: Simplified schematic of a hospital.

FIG. 2: Simplified schematic of an Internet of Things ecosystem.

FIG. 3: Simplified schematic of a smart car ecosystem.

FIG. 4: Simplified schematic of a process-controlled industrialproduction unit.

FIG. 5: Simplified schematic of a retail banking system.

FIG. 6: Simplified schematic for loan application system.

FIG. 7: Simplified schematic for a cloud computing ecosystem.

FIG. 8: Schematic view of exemplary data flow between nodes coupled to anetwork.

FIG. 9: Schematic view of an exemplary translated data flow betweennodes coupled to a network.

FIG. 10: Schematic view of exemplary network configuration.

FIG. 11: Schematic view of exemplary node transmitting data to anetwork.

FIG. 12: Schematic view of exemplary node comprising a read-only file.

FIG. 13: Schematic view of exemplary node receiving data from a network.

FIG. 14: Schematic view of gateway server.

FIG. 15: Schematic view of gateway server comprising separation kernel.

FIG. 16(A-D): A flow chart illustrating exemplary communicationmanagement operations that may be associated with a network system inaccordance with certain embodiments disclosed herein.

FIG. 17(A-C): A flow chart illustrating exemplary communicationmanagement operations that may be associated with a network system inaccordance with certain embodiments disclosed herein.

FIG. 18(A-C): A flow chart illustrating exemplary communicationmanagement operations that may be associated with a network system inaccordance with certain embodiments disclosed herein.

FIG. 19(A-B): A flow chart illustrating exemplary communicationmanagement operations that may be associated with a network system inaccordance with certain embodiments disclosed herein.

FIG. 20: Flow diagram of secure communication protocol.

FIG. 21: Schematic view of first node having network configuration firstdata structure.

FIG. 22: Schematic view of second node having network configurationsecond data structure.

FIG. 23: Schematic view of first node having network configuration thirddata structure.

FIG. 24: Schematic view of second node having network configurationfourth data structure.

FIG. 25: Schematic view of first node having network configuration fifthdata structure.

FIG. 26: Schematic view of second node having network configurationsixth data structure.

FIG. 27: Schematic view of first node having network configurationseventh data structure.

FIG. 28: Schematic view of second node having network configurationeighth data structure.

FIG. 29: Schematic view of exemplary node transmitting data to anetwork.

FIG. 30: Schematic view of exemplary node receiving data from a network.

FIG. 31: Schematic view of gateway server.

FIG. 32: Schematic view of first node having network configuration ninthdata structure.

FIG. 33: Schematic view of second node having network configurationtenth data structure.

DETAILED DESCRIPTION OF THE INVENTION

In certain embodiments of the methods, systems, products, software,middleware, computing infrastructure and/or apparatus of the presentdisclosure, computing infrastructure may be secured by managing networkcommunications (for example, all port-to-network, port-to-port andnetwork-to-port communications) between networked nodes. Communicationsfrom user-applications on the network nodes may be managed, transparentto the user-application, by middleware that prevents theuser-application from binding directly to a physical interface (or, forexample, a virtual interface of a virtual machine). The middleware mayoperate on multiple nodes to manage outgoing communications from a node(port-to-network), and incoming communications into a node(network-to-port). The middleware may be present on a plurality ofnetwork nodes, including, for example, all of the network nodes of adefined group (such as a preconfigured group or a software definednetwork) to manage encrypted or partially encrypted communications suchas tunnel communications (network port-to-network port, ornetwork-to-network). The encrypted or partially encrypted communicationssuch as tunnel communications may be established cooperatively betweenmiddleware on two or more network nodes. Authorized networkcommunication may be transacted via these encrypted or partiallyencrypted communications such as tunnels, which may be dedicatedencrypted or partially encrypted communications such as tunnels forauthorized communications between a user-application on one network nodeand a user-application on another network node, processor, or computingdevice. In addition, the middleware may manage network communication byverifying most data packets (including all or substantially all datapackets) resulting from a user-application for transmission over thenetwork complies with a preconfigured, predefined, pre-establishedand/or preprovisioned set of authentication code parameters (including,for example, one or more of the following: a source user-applicationidentifier, a payload data type descriptor, and port number). Similarly,the middleware may manage network communication by verifying most datapackets (including all or substantially all data packets) received froma transmission over the internet for a user-application complies with apreconfigured, predefined, pre-established and/or preprovisioned set ofauthentication code parameters (including, for example, one or more ofthe following: a source user-application identifier, a payload data typedescriptor, and port number). In such embodiments, the ability formalware to intrude, interrogate and/or proliferate within or among thenetwork nodes is severely thwarted. In certain further embodiments,network communication security may be complemented by computing hygienepolicies including human access monitoring and disabling a portion orall USB interfaces on network-accessible devices.

In certain embodiments, for example, the encrypted or partiallyencrypted communications may comprise a network tunnel. In certainembodiments, for example, the communications are encapsulated publicnetwork transmission units that appear to be data. In certainembodiments, for example, the communications may be partially or fullyencrypted and transmitted across a network using a network tunnel,wherein the network tunnel may be defined by one or more encryption keysand one or more decryption keys. In certain embodiments, for example,the network tunnel may be defined by a protocol, for example InternetProtocol Security (IPsec), Transport Layer Security (SSL/TLS), DatagraphTransport Layer Security (DTLS), Microsoft Point-to-Point Encryption(MPPE), Microsoft Secure Socket Tunneling Protocol (SSTP),Point-to-Point Protocol (PPP), Layer 2 Tunneling Protocol (L2TP), MultiPath Virtual Private Network (MPVPN), or Secure Shell (SSH) protocol. Incertain embodiments, for example, the protocol may require encapsulatinga network packet inside another network packet (for example, adding anadditional header). In certain embodiments, for example, a networktunnel may be defined by one or more encryption keys and one or moredecryption keys associated with the tunnel, exclusive of any additionalprotocol header.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) among networked nodes in an institution, for example ahospital, a university, a manufacturing facility, etc. In certainembodiments, for example a hospital such as the hospital 100schematically depicted in FIG. 1, network security software andconfiguration data may be employed throughout a defined group ofnetworked processor nodes (for example, all or most of the networkedprocessors at a facility, inclusive of remote facilities) to managenetworked communications between workstations, databases, smart devices,communication devices, etc. without requiring pre-existing or newapplication software to be modified to accommodate the network securitysoftware. In the inpatient ward 102 of FIG. 1, for example, the securitysoftware and configuration data is installed on a nurse's station 104and smart devices (vital sign monitoring device 106A, a mobile x-raymachine 106B, and an infusion device 106C) in a monitoring zone, whichincludes private patient suites 108. In addition, a smart MRI machine110 is connected to monitoring systems in another department of thehospital 100.

In operation, device software on a smart device generates packet dataand requests its transmission to a pre-selected destination portassociated with monitoring software at the nurse's station. Rather thansending a data packet directly to the monitoring software, the networksecurity software receives or intercepts the data packet and verifiesthat the device software is authorized to transmit the data and that therequested destination port of the nurse's station is authorized toreceive the payload of the data packet. Next, the network securitysoftware repackages the payload of the data packet into a new datapacket and assigns the new data packet to an encrypted network tunnelthat terminates at a preconfigured port associated with network securitysoftware of the nurse's station. This network tunnel is unique to thespecific data feed being transmitted by the device, so different datafeeds do not share the same tunnel. Prior to forwarding the new datapacket to the network, the network security software inserts encryptedmetadata into the new data packet defining the device software, the userof the device software, and data type being transmitted.

When the transmitted new data packet is received by the nurse's station,network security software on the nurse's station decrypts and inspectsthe inserted metadata to verify against a predefined configuration datathat the sending device software, user, and data type are authorized forthe network tunnel. If so, the network security software extracts thenetwork packet payload and inserts it into a final packet that isforwarded to the destination port of the monitoring software. In each ofthe foregoing steps, the configuration data provides the necessarytranslation between the encrypted port and the destination port, as wellas identifiers for the authorized device software, user, and data typeused by the network security software to perform authentications.

In a billing department of the hospital, the network security softwaremay be installed on a security server to receive (or intercept) andauthorize all data packets received from an insurance provider via thepublic internet. In cases where a data packet is received from a secureremote node that is cooperatively configured with the security server,the aforementioned steps are applied to the received data packet and thedata forwarded to its destination. In cases where the data is receivedfrom an unsecured remote node, the security server extracts the payloadand processes it into a benign, authenticated format (including steps torender any executable payload inoperable), before forming a new packetfor transmission to an endpoint in the hospital network.

While application transparency facilitates deployment of the networksecurity software, in certain environments it is desirable to buildapplications that directly access a portion of the network securitysoftware through a security API. Such applications may be particularlyuseful, for example, to provide faster data processing and to customizesecurity parameters.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) among networked nodes in a modern hospital. A modernhospital. For example, may occupy several floors of a multistorybuilding and may include hundreds of private patient suites. Throughextensive computerization and network connectivity, the patient suitesmay be grouped into a series of zones, for example, 25-50 suites perzone, which may be monitored by nursing stations dedicated to each zone.Each nursing station may be required to monitor multiple medical datafeeds from smart devices (including life support, infusion, x-ray, MRI,kidney dialysis, etc.) located in or near the patient suites and/orother station throughout the hospital and beyond. To meet changingpatient requirements, the devices may frequently be relocated todifferent suites and/or zones, which may require reconfiguration ofdevice assignments among the nursing stations. Embedded processors andnetwork interfaces in the devices may facilitate frequentreconfiguration. Unless secured, hospital networks may be vulnerablebecause, for example, unsupervised visitors are in frequent closeproximity to the smart devices. A bad actor may compromise the networkfrom the privacy of a patient suite, for example by injecting malwareinto a smart device from a thumb drive (allowing it to spread to othercomputers and devices in the hospital), by plugging a computer into thenetwork and spoofing the device, or simply by moving the device to adifferent suite.

In an embodiment, most of the devices, including all, in the hospitalnetwork (or portion of the hospital network) may be configured withnetwork security software (middleware) and configuration data to acceptnetwork traffic only from (n-tuple) pre-authorized users, pre-authorizedapplications, pre-authorized devices, and/or pre-authorized data-types.In addition, a separate server may update the configuration data acrossall zones to reflect reconfiguration events. With the security softwarerunning on each device on the network, data transmitted from malware ona smart device is rejected (and an alarm may be sounded) when themalware fails to provide a required user identifier and/or applicationidentifier expected by the network security software. In addition, thenetwork security software may prevent a workstation from connecting toany unauthorized device. When the unauthorized device (whether a newdevice or a device removed from its allotted zone) attempts to connect,the attempt may be rejected when the unauthorized device failed toprovide an expected secret identification code.

Each smart device is may also be protected by installed network securitysoftware and configuration data, either installed directly (for deviceswith sufficient processing capability) or through a legacy adapter(containing the network security software and configuration files)disposed between the device and the network. In addition to theintrusion prevention features noted above, the network security softwaremay also prevent malware resident on a smart device from transmittingdata to the network. When the malware attempts to transmit data, thedata may be received (or intercepted) and dropped when the networksecurity software detects that the malware is not a pre-authorizedapplication for the smart device.

In addition to the risk of unsupervised visitors, malware may alsoattempt to penetrate a hospital network through the public Internet, forexample through casual browsing, email, or communication with serviceproviders. According to an embodiment, all data packets from the publicinternet may be passed through a security server before transmitting toany network on the hospital. In cases where the data is received from asecure remote node that is cooperatively configured with the securityserver, the data may be transmitted to a network in the hospital. Incases where the data is received from an unsecured remote node, thesecurity server takes additional steps to convert data packets into abenign, authenticated format (including steps to render any executablepayload inoperable).

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) among networked nodes in an Internet-of-Thingsapplication. In an Internet-of-Things application depicted in FIG. 2,for example, a consumer appliance manufacturer equips a suite ofprocessor equipped, wirelessly networked smart products (a refrigerator200A, a washing machine 200B, window shades 200C, and lighting 200D)with sensors and preconfigured network security software to securelyreport authenticated, authorized, encrypted operating data, via routers202A-D connected to the public Internet 204 from homes 206A-D to themanufacturer's cloud based analytics and maintenance engine 208. Thecloud engine 208, in turn, utilizes the data to compute performanceand/or maintenance parameters, and securely communicates authenticated,authorized control parameter adjustments, maintenance alerts, and/orfirmware updates to the smart products 200A-D.

For example, upon installation of a smart refrigerator, first networksecurity software in the refrigerator utilizes preconfigured privatekeys to negotiate an exclusive encrypted network tunnel with secondnetwork security software in the cloud engine for the purpose oftransmitting time series of temperature and/or temperature set pointreadings from refrigerator control software, across the public Internet,to cloud engine analytic software. Upon receipt, the analytic softwarewill analyze the data and respond to the control software, for example,with seasonal adjustments to parameters that control operation of therefrigerator's compressor.

Prior to transmission of any readings, the cloud engine and refrigeratorcontrol software authenticate the refrigerator-to-cloud data path byexchanging device codes, application (refrigerator control softwareand/or cloud analytic software) identifiers, and/or data-typeidentifiers across the encrypted tunnel and verifying that the exchangedvalues correspond to authorized combinations of values.

Following tunnel authorization, for example, a temperature sensor driverexecuting on the processor may transmit a time series of temperaturereadings to the control software that, in turn, sends a request via anetwork API to transmit the readings in a data packet to a preconfigureddestination port of the cloud engine. A first module of the firstnetwork security software may receive or intercept the request, uses thedestination port number to identify a predetermined tunnel destinationport number associated with the second network security software, andverifies that the network tunnel is open. A second module of the firstnetwork security software may translate the time series into alightweight format (for example an MQTT format) for transport. A thirdmodule of the first network security software may assemble metadatacontaining an identifier for the control software, an identifier for thecontrol software process owner, and/or a data protocol for the timeseries. A fourth module of the first network security software mayencrypt the translated time series and the metadata. A fifth module ofthe first network security software may assemble the encrypted metadataand the encrypted, translated time series to form a network packet fortransmission to the tunnel port of the second network security software.

Upon receipt of the network packet, a first module of the second networksecurity software verifies that the network tunnel is open. A secondmodule of the second network security software may decrypt the metadata.A third module of the second network security software may verify thatthe contents of the metadata match preconfigured, expected values basedon the destination tunnel port number. A fourth module of the secondnetwork security software may decrypt the translated time series. Afifth module of the second network security software further maytranslate the translated time series into a format readable by the cloudengine analytic software. A sixth module of the second network securitysoftware may insert the properly formatted time series into a newnetwork packet and/or may transmit the new network packet to theanalytic software. If the network security software and the analyticsoftware execute on the same processor, the transmittal may use aloopback interface. Otherwise, the new packet may contain appropriateauthorization metadata and may be transmitted to the first networksecurity software by a separate encrypted network tunnel to anappropriate device in accordance with the methods described above.

The analytic engine may analyze the time series and may compute updatedcompressor controller parameters. The new controller parameters may betransmitted to a preconfigured destination port of the refrigeratorcontrol software (a different port than the source port used fortransmitting the time series discussed above), comprising passing anetwork packet containing the parameters (and appropriate metadata)across an encrypted network tunnel between the second network securitysoftware and the first network security software (a different encryptednetwork tunnel than the tunnel used to transmit the time series). Themethods of forming the connection and moving the data may be inaccordance with the methods discussed above. Upon receipt of the updatedparameters, the refrigerator control software may update a compressorconfiguration file(s) referenced by the compressor controller, therebymodifying operation of the refrigerator.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) among networked nodes in a smart transportationecosystem, for example, network security software and configuration datamay be factory installed at a number of attachment points in vehicles,including, for example, dedicated onboard processors for vehiclerouting, vehicle data, vehicle communications (for example mobilerouters) and vehicle maintenance. A vehicle routing computer, forexample, may execute several instances of network security software (inconjunction with configuration data) to ensure the integrity of multiplereal-time data feeds received from remote routing servers over acellular or satellite network, including, for example, weather data, GPSor cellular triangulation data, traffic data, and logistic parameters(for example cargo content, next requested stop, destination location,or delivery status information).

In the smart vehicle ecosystem depicted in FIG. 3, a smart car 300receives satellite geopositioning data from a satellite 302 forprocessing by an onboard navigation computer equipped with the networksecurity software. A second onboard processor of the smart car 300equipped with the network security software receives traffic databroadcasts from a weather bureau 304 by a cellular data network througha cellular tower 306. A third onboard processor of the smart car 300equipped with the network security software communicates transmissiondata to a manufacturer's maintenance bureau 308 and receives periodicfirmware updates from the bureau 308. A fourth onboard processorequipped with the network security software communicates speedometerreadings via the cell tower 306 to a law enforcement vehicle 310.

In operation, the network security software may establish discreteencrypted network tunnels configured for each data feed, includingverifying the authority of a sending device, application, and/orapplication user to provide each particular data feed to, for example,the routing software and user by assigned encrypted tunnel. For example,following establishment of one of the encrypted network tunnels, anetwork security software (or middleware) may receive or interceptincoming network packets at a port defined by the specific encryptedtunnel and extracts data from the packet payload at a predeterminedlocation where it expects encrypted metadata. Next, the first networksecurity software may attempt to decrypt the metadata, for example,using an expected cryptographic key (a rotated key for example derivedfrom an elliptic curve-based key exchange algorithm) and to match thedecrypted metadata against expected identifiers for the sendingapplication, application user, and/or data type. If the match issuccessful, the first network security software may extract the networkpacket payload and may insert it into a final packet which may beforwarded to a predetermined destination port (based on the encryptedtunnel port number) of the routing software.

Additional network security software (or middleware) may authenticatespeedometer data for transmission, for example, to a law enforcementresource. In this mode, configuration data may include cryptographickeys shared with law enforcement used for establishing an encryptednetwork tunnels between the additional network security software andnetwork security software utilized by the law enforcement resource. Theadditional network security software may receive or intercept aspeedometer reading (encoded, for example, in a network packet receivedvia a loopback interface) from speedometer software and may executeoperating system commands to determine the identity of the speedometersoftware and the process owner. The additional network security softwaremay then verify that the speedometer software matches thefactory-installed version and is being executed by a pre-authorizeduser. Next, the additional network security may package the reading intoa data packet and may assign the data packet to an encrypted networktunnel that terminates at a preconfigured port associated with thenetwork security software installed at the law enforcement resource.Prior to transmitting the data packet through the network tunnel, thenetwork security software inserts encrypted metadata that identifies thespeedometer software, the user of the speedometer software, and datatype being transmitted. Upon receipt of the data packet, law enforcementmay authenticate the origin of the reading and the type of data, forexample, by using the methods described herein.

In each of the foregoing steps, configuration data may be resident onmost, for example, all of the attachment points to keep track of, forexample, the ports, sending user-applications, receivinguser-applications, data types, and/or devices assigned to most, forexample, all of the encrypted network tunnels.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) among networked nodes in an Internet-of-Things processcontrolled manufacturing line. In the manufacturing line depicted in inFIG. 4, quality control devices 400A and 400B inspect raw materials andintermediate products. The quality control devices 400A and 400B haveembedded processors executing network security software, and are inmachine-to-machine communication with control systems 402A and 402B,respectively, which also execute network security software. The controlsystems 402A and 402B are, in turn, in machine-to-machine communicationwith a quality control server, 404, which records electronic batch dataand provides control parameters to the control systems 402A and 402B.Raw materials are passed through a first stage 406 to form intermediateproducts, which are passed through a second stage 408 to form finalproducts. The final products are loaded into shipping boxes by a robot410. The robot is in machine-to-machine communication with a logisticsserver 412, and each of the robot 410 and the logistics server areequipped with network security software. The logistics server 412obtains product count information and provides loading instructions tothe robot 410.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) for retail banking applications. In certain embodiments,for example retail banking applications such as the private AutomatedTeller Machine (ATM) network and the wearable payments ecosystemschematically depicted in FIG. 5, configuration data and networksecurity software may be employed throughout a defined group ofnetworked processor nodes to manage network communications. In FIG. 5,network security software is installed on an ATM 500, transactionprocessing engine 502, retail customer's bank server 504, an AutomatedClearing House (ACH) server 506, and cash provider's bank server 508. Inaddition, network security software is installed on a wearable computingdevice 510 containing an embedded near-field communication chip and on amerchant's payment processing computer 512.

In operation, a retail banking customer provides card and pin input tothe ATM 500 to request a cash withdrawal. Device software resident onthe ATM 500 processes the request and generates encrypted packet datacontaining the customer's transaction information, card number, and pininput and requests its transmission to a pre-selected destination portassociated with a remote transaction processing engine 502. Rather thansending a data packet directly to the remote transaction processingengine 502, the network security software receives the data packet andverifies that the device software is authorized to transmit the data andthat the requested destination port of the remote transaction processingengine 502 is authorized to receive the payload of the data packet.Next, the network security software repackages the payload of the datapacket into a new data packet and assigns the new data packet to a firstencrypted network tunnel 514 that terminates at a preconfigured portassociated with network security software of the remote transactionprocessing engine 502. The first encrypted network tunnel 514 is uniqueto the specific retail transaction being transmitted by the ATM 500, sodifferent transactions (for example different retail customers, ordifferent transactions by the same customer) do not share the sametunnel. Prior to forwarding the new data packet to the network, thenetwork security software inserts encrypted metadata into the new datapacket defining the device software, the retail customer, and the datatype being transmitted.

When the transmitted new data packet is received by the transactionprocessing engine 502, network security software resident on thetransaction processing engine 502 decrypts and inspects the insertedmetadata to verify against predefined configuration data that thesending device software, retail customer, and data type are authorizedfor the network tunnel. If so, the network security software extractsthe network packet payload and inserts it into a new packet that isforwarded to the destination port of the transaction processing enginesoftware. In each of the foregoing steps, the configuration dataprovides the necessary translation between the encrypted port and thedestination port, as well as identifiers for the authorized devicesoftware, authorized device software user, and data type used by thenetwork security software to perform authentications.

The transaction processing engine software processes the payload toidentify the retail customer's card network and associated financialinstitution 504, and forms a data packet containing the transactioninformation for transmission to a destination port of software residenton a server of the associated financial institution 504. Rather thansending the data packet directly to the server of the associatedfinancial institution 504, network security software resident on thetransaction processing engine 502 receives the data packet and verifiesthat the transaction processing engine software is authorized totransmit the data and that the requested destination port of the serverof the associated financial institution 504 is authorized to receive thepayload of the data packet. Next, the network security softwarerepackages the payload of the data packet into a new data packet andassigns the new data packet to a second encrypted network tunnel 516that terminates at a preconfigured port associated with network securitysoftware of the server of the associated financial institution 504. Thesecond encrypted network tunnel 516 is unique to the port-to-portconnection between the transaction processing engine software, theassociated financial institution server software, and the data typebeing transmitted (and optionally the retail customer identity and thespecific transaction). Prior to forwarding the new data packet to thenetwork, the network security software inserts encrypted metadata intothe new data packet defining the transaction processing engine software,the transaction processing engine software user, and the data type beingtransmitted.

When the transmitted new data packet is received by the server of theassociated financial institution 504, network security software residenton the associated financial institution server decrypts and inspects theinserted metadata to verify against predefined configuration data thatthe sending transaction processing engine software, transactionprocessing engine software user, and data type are authorized for thesecond network tunnel. If so, the network security software extracts thenetwork packet payload and inserts it into a new packet that isforwarded to the destination port of the associated financialinstitution software. In each of the foregoing steps, the configurationdata provides the necessary translation between the encrypted port andthe destination port, as well as identifiers for the transactionprocessing engine software, transaction processing engine software user,and data type used by the network security software to performauthentications.

The associated financial institution software memo debits the retailcustomer's account in a ledger 518 of the associated financialinstitution, and forms a data packet containing an authorization for theATM transaction for transmission though the second encrypted networktunnel 516 to a destination port of transaction processing enginesoftware. Prior to forwarding the data packet in a network packet to thenetwork, the network security software inserts encrypted metadata intothe network packet defining the associated financial institutionsoftware, the associated financial institution software user, and thedata type being transmitted.

When the transmitted data packet is received by the transactionprocessing engine 502 from the second encrypted network tunnel 516,network security software resident on the transaction processing engine502 decrypts and inspects the inserted metadata to verify againstpredefined configuration data that the associated financial institutionsoftware, the associated financial institution software user, and datatype are authorized for the network tunnel. If so, the network securitysoftware extracts the network packet payload and inserts it into a newpacket that is forwarded to the destination port of the transactionprocessing engine software. In each of the foregoing steps, theconfiguration data provides the necessary translation between theencrypted port and the destination port, as well as identifiers for thetransaction processing engine software, transaction processing enginesoftware user, and data type used by the network security software toperform authentications.

The associated financial institution software forms a data packetproviding an authorization for the ATM transaction for transmissionthough the first encrypted network tunnel 514 to a destination port ofATM 500 device software. Prior to forwarding the data packet in anetwork packet to the network, the network security software insertsencrypted metadata into the network packet defining the transactionprocessing engine software, the transaction processing engine softwareuser, and the data type being transmitted.

When the transmitted data packet is received by the ATM 500 from thetransaction processing engine 502, network security software resident onthe ATM 500 decrypts and inspects the inserted metadata to verifyagainst predefined configuration data that the transaction processingengine software, the transaction processing engine software user, anddata type are authorized for the first network tunnel. If so, thenetwork security software extracts the network packet payload andinserts it into a new data packet that is forwarded to the destinationport of the ATM 500 device software. The ATM 500 device softwareprocesses the payload of new data packet authorizing the transactionfollowed by dispensing cash to the retail customer. In each of theforegoing steps, the configuration data provides the necessarytranslation between the encrypted port and the destination port, as wellas identifiers for the transaction processing engine software,transaction processing engine user, and data type used by the networksecurity software to perform authentications.

In addition to sending transaction authorization data to the ATM 500device software, the transaction processing engine 502 forms a datapacket for transmission to a destination port of ACH server software.Rather than sending the data packet directly to the ACH server 506,network security software resident on the transaction processing engine502 receives the data packet and verifies that the transactionprocessing engine software is authorized to transmit the data and thatthe requested destination port of the ACH server software is authorizedto receive the payload of the data packet. Next, the network securitysoftware repackages the payload of the data packet into a new datapacket and assigns the new data packet to a third encrypted networktunnel 520 that terminates at a preconfigured port associated withnetwork security software of the ACH server 506. The third encryptednetwork tunnel 520 is unique to the port-to-port connection between thetransaction processing engine software, the ACH server software, and thedata type being transmitted (and optionally the retail customer identityand the specific transaction). Prior to forwarding the new data packetto the network, the network security software inserts encrypted metadatainto the new data packet defining the transaction processing enginesoftware, the transaction processing engine software user, and the datatype being transmitted.

When the data packet is received by the ACH server 506, network securitysoftware resident on the ACH server 506 decrypts and inspects theinserted metadata to verify against predefined configuration data thatthe sending transaction processing engine software, transactionprocessing engine software user, and data type are authorized for thethird encrypted network tunnel 520. If so, the network security softwareextracts the network packet payload and inserts it into a new packetthat is forwarded to the destination port of the ACH server software.

The ACH server software processes the payload to identify the cashprovider's bank server, and forms a data packet containing thetransaction information for transmission to a destination port ofsoftware resident on cash provider's bank server 508. Rather thansending the data packet directly to the software resident on cashprovider's bank server 508, the network security software resident onthe ACH server 506 receives the data packet and verifies that the ACHserver software is authorized to transmit the data and that therequested destination port of software resident on cash provider's bankserver 508 is authorized to receive the payload of the data packet.Next, the network security software repackages the payload of the datapacket into a new data packet and assigns the new data packet to afourth encrypted network tunnel 522 that terminates at a preconfiguredport associated with network security software of the destination portof software resident on cash provider's bank server 508. The fourthencrypted network tunnel 522 is unique to port-to-port connectionbetween the ACH server software, the associated financial institutionserver software, the cash provider's bank server software, and the datatype being transmitted (and optionally the retail customer identity andthe specific transaction). Prior to forwarding the new data packet tothe network, the network security software inserts encrypted metadatainto the new data packet defining the ACH server software, the ACHserver software user, and the data type being transmitted.

When the transmitted new data packet is received by the cash provider'sbank server 508, network security software resident on the cashprovider's bank server 508 decrypts and inspects the inserted metadatato verify against predefined configuration data that the sending ACHserver software, ACH server software user, and data type are authorizedfor the fourth encrypted network tunnel 522. If so, the network securitysoftware extracts the network packet payload and inserts it into a newpacket that is forwarded to the destination port of the cash provider'sbank server software. The associated financial institution softwarecredits the cash provider's bank account. In each of the foregoingsteps, the configuration data provides the necessary translation betweenthe encrypted port and the destination port, as well as identifiers forthe ACH server software, ACH server software user, and data type used bythe network security software to perform authentications.

In addition to dispensing cash at the ATM 500, portions of the ATMnetwork may also be used to process transactions in a wearable paymentsecosystem. A merchant customer may use a wearable computing device 510containing an embedded near-field communication chip to transmit creditpayment data to a merchant payment processing computer. Network securitysoftware resident on the wearable computing device forms a fifthencrypted network tunnel 524 analogously to the encrypted networktunnels described above and transmits a network packet containing apayment request payload and metadata analogously to the data transmittedthrough the encrypted tunnels described above. The merchant paymentprocessing computer transmits the payment request data analogously tothe ATM 500 through a sixth encrypted network tunnel 526, and thetransaction processing engine 502 and the retail customer's bank serverfunction as described above. When the transaction is authorized by theretail customer's bank server 504, encrypted packet data is transmittedthrough the network to complete the transaction at the merchant'spayment processing computer 512. In addition, the software resident onthe ACH server 506 transmits instructions to a cash provider's server528 to credit the cash provider's account.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) between customers and a service bureau hostingconfidential personal data, such as personal identity data (for examplesocial security numbers), financial data, and/or or health data (forexample data covered under the Health Insurance Portability andAccountability Act (HIPAA)). In FIG. 6, an applicant for a loan from abank 600 may provide personal financial information to a bankrepresentative who inputs the data into the bank's electronic loanunderwriting software resident on a bank server 602.

The loan underwriting software resident on a bank server 602 forms asecure connection over the public Internet 604 according to Hyper TextTransfer Protocol Secure (HTTPS) protocol with a front end server 606 ata credit bureau 608 and transmits a request for the bank applicant'scredit history. The front end server 606 is equipped with first networksecurity software which processes the request by extracting networkpacket payload data and chopping the data to neutralize any embeddedmalicious executable code. Once the data is chopped, second networksecurity software resident on the front server 606 forms an encryptedconnection with third network security software resident on a databaseserver 610 of the credit bureau. The second and third network securitysoftware authenticate and authorize one another, the front end server606 and the database server 610 devices, and the data protocol. The dataprotocol authorization requires that communications transmitted from thefront end server 606 to the database server 610 consist of SQL queriesto receive data, and communications transmitted from the database server610 to the front end server 606 consist of data having a predeterminedformat. The second network security software creates a request for databased on the chopped payload and, upon receipt, passes the data throughthe HTTPS connection to the bank underwriting software resident on thebank server 602.

In certain embodiments, for example, the methods, systems, products,software, middleware, computing infrastructure and/or apparatus of thepresent disclosure may be employed to manage network communications (forexample, all port-to-network, port-to-port and network-to-portcommunications) between, as shown in FIG. 7, a local node 700 and, viathe public Internet, 702, cloud computing services at a server farm 704.

In operation, all communications between the local node 700 and thecloud computing services are transmitted through a dedicated bare-metalserver 706. The communications are managed by network securitymiddleware present on the local node 700 and on the dedicated bare-metalserver 704. The network security middleware negotiates an encryptednetwork tunnel 708 by mutual authentication of devices based on sharedsecret device codes, process and process user identifiers on eachdevice, and data protocol for the data being transmitted over theencrypted network tunnels. A different encrypted network tunnel isnegotiated for each port-to-port communication, and the sending process,process user, and data protocol are authorized with each packettransmitted.

A communication path 710 between the dedicated bare-metal server 706 andvirtual machines resident on cloud computing devices 712 resident in theserver farm 704 are separately secured and are not protected by theabove-noted network security middleware.

Certain embodiments may provide, for example, methods, systems, modules,or products for authorized communication, over a network, between pluralnodes coupled to the network.

In certain embodiments, for example, the methods, systems, modules, orproducts may be implemented in hardware (for example may be implementedpartially in hardware or entirely in hardware such as anapplication-specific integrated circuit). In certain embodiments, forexample, the hardware may comprise programmable hardware (for example afield-programmable gate array). In certain embodiments, for example, themethods, systems, modules, or products may be implemented in software(for example entirely in software such as firmware, software resident onone or more nodes of the plural nodes, micro-code, etc.). In certainembodiments, for example, the software may be a computer-usable programstored in a computer-readable media (for example one or more of thenon-transitory computer-readable storage media described below). Incertain embodiments, for example, the methods, systems, modules, orproducts may be implemented in a combination of hardware and software.

In certain embodiments, for example, the network may comprise all or aportion of the public Internet, a Local Area Network (LAN) (for examplea wired LAN, a wireless LAN, of a combination of the two), a Wide AreaNetwork, a Metropolitan Area Network, a Campus Area Network, a StorageArea Network, a Personal Area Network, a System Area Network (or aCluster Area Network), an Electronic Private Network, a Virtual PrivateNetwork (VPN), a Software-Defined Network, a Virtual Network, or acombination (or hybrid) of two or more of the foregoing networks. Incertain embodiments, for example, the network may comprise a local areanetwork supporting Ethernet communication over twisted pair cablinginterconnected via one or plural switches and one or plural routers. Incertain embodiments, for example, the network may comprise a local areanetwork supporting wireless communication (for example wirelesscommunication according to the IEEE 802.11 standard) using one or pluralwireless antenna. In certain embodiments, for example, the network maycomprise a local area network having an ARCNET, Token Ring, Localtalk,or FDDI configuration. In certain embodiments, for example, the networkmay comprise a local area network having Internet access. In certainembodiments, for example, the network may be exclusive of Internetaccess. In certain embodiments, for example, the network may transmitpacket data by one or more propagated signals, for example an electricalsignal, an optical signal, an acoustical wave, a carrier wave, aninfrared signal, a digital signal, or a combination of two or more ofthe foregoing signals. In certain embodiments, for example, the networkmay be configured to transmit packet data (for example Ethernet frames)at a rate of at least 25 kilobits per second (Kbps), for example atleast 100 Kbps, at least 250 Kbps, at least 500 Kbps, at least 1 millionbits per second (Mbps), at least 10 Mbps, at least 25 Mbps, at least 50Mbps, at least 100 Mbps, at least 250 Mbps, at least 500 Mbps, at least1 gigabit per second (Gbps), at least 10 Gbps, at least 25 Gbps, atleast 50 Gbps, or the network may be configured to transmit packet dataat a rate of at least 100 Gbps. In certain embodiments, for example, thenetwork may have a tree topology. In certain embodiments, for example,the network may be a mesh network.

In certain embodiments, for example, the network may connect pluralnodes by routers and switches. In certain embodiments, for example, theplural nodes may comprise one or more of a network attached storage, aserver (for example a file server, a mail server, a DNS server, adatabase server, a DHCP server, a VPN server, a VOIP server, ananalytics server, or a portion of a cloud), a workstation (for example adesktop computer or a laptop computer), a mobile computing device (forexample a smart phone, a smart tablet, or an embedded processor in anautomobile), an input/output device (for example a fax machine, aprinter, a scanner such as a bar code scanner, or a scanner/copier), asensor (for example a temperature sensor, a moisture sensor, or a motionsensor), a camera (for example an IP camera), or a geolocation device(for example a Global Positioning System (GPS)-based device or acellular triangulation device).

In certain embodiments, for example, the network may be a corporatecommunication network. In certain embodiments, for example, a portion ofthe plural nodes may be hosted at a corporate headquarters (for examplecentral corporate databases, an email server, or a file backup storage).In certain embodiments, for example, all incoming traffic from thepublic Internet to the corporate network may be routed through thecorporate headquarters. In certain embodiments, for example, a portionof the plural nodes may reside at one or more branch locations removedfrom the corporate headquarters. In certain embodiments, for example,the portion of the plural nodes may comprise one or more of aworkstation or a sensor. In certain embodiments, for example, the one ormore branch locations may communicate with the headquarters by a virtualprivate connection (for example the network may comprise a VPN). Incertain embodiments, for example, the network may provide communicationto one or plural mobile corporate assets (for example an automobile suchas a rental car or a cargo truck). In certain embodiments, for example,the one or plural corporate assets may comprise one or more of anembedded processor and a sensor.

In certain embodiments, for example, the network may providecommunication to, from, or within a hospital or a doctor's office. Incertain embodiments, for example, the network may connect one or pluralresources with databases, computers, devices, and/or sensors located inthe hospital or doctor's office. In certain embodiments, for example,the one or plural resources may comprise a data center (for example alocal or remote data center). In certain embodiments, for example, thenetwork may comprise a VPN and/or plural LANs (for example a WAN). Incertain embodiments, for example, the one or plural resources maycomprise a cloud. In certain embodiments, for example, the one or pluralresources may be connected to more than one hospital and/or doctor'soffice. In certain further embodiments, for example, the network maycommunicate patient records, patient monitoring data (for example realtime data for a patient from a heart monitor being transmitted to anurse's station), telemedicine data, billing and/or reimbursement data,financial data, equipment maintenance data, or a combination of two ormore of the foregoing. In certain embodiments, for example, the networkmay provide communication between one or plural patient rooms and one orplural computing devices at a hospital or a doctor's office location(for example a nurse's station, a doctor's office, a medicalsupervisor's office, or a smart device (for example a smart phonerunning an app) used by a healthcare provider), a data hub (for examplea local data hub or a data hub connected to the hospital by a privateconnection or the public Internet), a database, a smart device (forexample a smart phone running an app) and/or the one or pluralresources. In certain embodiments, for example, the recipient of thecommunication may be located within a LAN of the hospital or doctor'soffice. In certain embodiments, for example, the recipient of thecommunication may be remote from the LAN of the hospital or doctor'soffice. In certain embodiments, for example, the recipient of thecommunication may comprise a business partner (for example a serviceprovider such as a billing service provider or a laboratory) of thehospital or doctor's office. In certain embodiments, for example, thecommunication may comprise sensor data from one or plural sensors in oneof the one or plural patient rooms (for example the one or pluralsensors may be an oxygen monitoring sensor, a heart monitor, a bloodpressure sensor, or a medicine delivery sensor), a scanner (for examplea scanner used to scan a barcode on a medicine container, such as ascanner used to scan a two-dimensional barcode in a hospital room), aninput/output device (for example a keypad or a smartphone running anapp), or a telemedicine device.

In certain embodiments, for example, the network may providecommunication with one or plural automobiles (for example the networkmay provide communication in a smart car ecosystem). In certainembodiments, for example, one or plural devices in an automobile may bewirelessly connected to the Internet. In certain embodiments, forexample, the network may provide communication between one or plural lawenforcement-controlled devices and one or plural devices (for example aspeedometer, a geolocator, or a kill switch) in (or on) the automobile.In certain embodiments, for example, the network may providecommunication between one or plural equipment manufacturer interfaces(for example an interface to a web server or a cloud) and one or pluraldevices (for example a device configured to provide equipment diagnosticinformation) in (or on) the automobile. In certain embodiments, forexample, the network may provide communication between one or pluralurban planning agencies and one or plural devices (for example ageolocator or an onboard video camera) in (or on) the automobile. Incertain embodiments, for example, the network may communicate weatherinformation from a weather provider to a device (for example an onboardcomputer executing an autonomous operating system) in (or on) theautomobile. In certain embodiments, for example, the network maycommunicate traffic information (for example traffic congestioninformation or traffic signal information) to a device (for example anonboard computer executing an autonomous operating system or a globalpositioning system software) in the automobile. In certain embodiments,for example, the network may communicate logistic information (forexample cargo content, next requested stop information, destinationlocation, or delivery status information) between a corporate databaseand a device in (or on) the automobile. In certain embodiments, forexample, the network may communicate vehicle maintenance information(for example an oil change reminder) between a maintenance provider anda device in (or on) the automobile. In certain embodiments, for example,the network may transmit car payload data, car diagnostic data, businessdata, and/or infrastructure data between one or plural automobiles and alaw enforcement agency, an urban planning agency, a weather provider, atraffic provider, a logistics provider, a car maintenance provider, or acombination of two or more of the foregoing.

In certain embodiments, for example, the network may providecommunication in a chemical processing facility. In certain furtherembodiments, for example, the network may provide communication betweena Supervisory Control and Data Acquisition (SCADA) system and aplurality of sensors, controllers, logic units, and controllers. Incertain embodiments, for example, the network may communicate batchrecord data generated at one or plural stages of a chemical process.

In certain embodiments, for example, the network may providecommunication among one or plural nodes for one or plural dedicatedprocesses (for example one or plural industrial control processes or oneor plural IoT applications). In certain further embodiments, forexample, the network may provide communication for maintenance of theconfiguration of communications among the one or plural nodes. Incertain embodiments, for example, the network may provide communicationsfrom one or plural dedicated processes or devices to a cloud (forexample a storage cloud or an analytics engine).

In certain embodiments, for example, the network may providecommunication in a factory. In certain embodiments, for example, thenetwork may provide communication in a power station. In certainembodiments, for example, the network may provide communication in anoffshore platform. In certain embodiments, for example, the network mayprovide communication for Automated Teller Machine (ATM) transactions.In certain embodiments, for example, the network may providecommunication for credit card transactions. In certain embodiments, forexample, the network may provide communication for monitoring IoTdevices (for example monitoring IoT devices located in one or pluralhomes) for a warranty update, a maintenance indication, a serviceindication, a coupon, a cross-sale advertisement, an up-saleopportunity, or a combination of two or more of the foregoing. Incertain embodiment, for example, the network may provide communicationfor database access (for example communication for access to a creditbureau database). In certain embodiments, for example, the network mayprovide communication to a DNS server.

In certain embodiments, for example, the network may transmit packets ofbinary data, signed or unsigned integer data, text (or string) data, orfloating point data. In certain embodiments, for example, the networkmay transmit packets of analog readings (for example readings from ananalog sensor). In certain embodiments, for example, the network maytransmit packets of digital readings (for example readings from adigital sensor). In certain embodiments, for example, the network maytransmit packets of sensor data (such as sensor readings, sensor statedata, sensor warranty information, or sensor configuration data). Incertain embodiments, for example, the network may transmit packets ofvoice data. In certain embodiments, for example, the network maytransmit packets of image data. In certain embodiments, for example, thenetwork may transmit packets of video data. In certain embodiments, forexample, the network may transmit packets containing part or all of afile according to a protocol. In certain embodiments, for example, thefile may be an executable file (for example an application program). Incertain embodiments, for example, the file may be a parameters file, adata file, or configuration file (for example a file used to configureauthorized communications). In certain embodiments, for example, thefile may be a binary file (for example a binary file defining authorizedcommunications). In certain embodiments, for example, the protocol maybe a File Transfer Protocol (FTP). In certain embodiments, for example,the network may transmit packets of data for a remote control session.In certain embodiments, for example, the network may transmit packets oftyped data (for example strongly typed data). In certain embodiments,for example, the network may transmit machine-to-machine communications.In certain embodiments, for example, the network may transmit packets ofdata objects. In certain embodiments, for example, the data objects maycomprise a topic. In certain embodiments, for example, the network maytransmit data packets comprising a publication (for example apublication being transmitted from a publisher to one or moresubscribers). In certain embodiments, for example, the network maytransmit data packets comprising metadata. In certain embodiments, forexample, the metadata may comprise a connection state indicator (forexample a connection state indicator indicating whether a port-to-portconnection is open, closed, or in the process of being established). Incertain embodiments, for example, the metadata may comprise acommunication authentication parameter (for example a parameter used toauthenticate a communicating device, communicating application, orcommunicating user). In certain embodiments, for example, the metadatamay comprise a communication authorization parameter (for example aparameter used to authorize a communicating device, a communicatingapplication, a communicating user, a data type, or a combination of twoor more of the foregoing). In certain embodiments, for example, themetadata may comprise a data type or a data protocol parameter.

In certain embodiments, for example, the one or plural nodes maycomprise an electronic device configured to send, receive, and/orforward information over the network. In certain embodiments, forexample, the electronic device may be (or may host) a communicationendpoint. In certain embodiments, for example, the one or plural nodesmay comprise a device configured for network packet (for exampleEthernet) communication, for example a computer, a computer system, acomputing device, an edge device, part or all of a machine, a sensor, acontroller, a microcontroller, a server, a client, a workstation, a hostcomputer, a modem, a hub, a bridge, a switch, or a router configured fornetwork packet communication. In certain embodiments, for example, theone or plural nodes may comprise a processor node equipped with aprocessor configured to process computer instructions. In certainembodiments, for example, the one or plural nodes may comprise a deviceconfigured for executing a network stack, for example a computer, acomputer system, computing device, an edge device, part or all of amachine, a sensor, a controller, a microcontroller, a server, a client,a workstation, a host computer, a modem, a hub, a bridge, a switch, or arouter executing a network stack.

In certain embodiments, for example, the one or plural nodes maycomprise an electronic instruction execution system. In certainembodiments, for example, the one or plural nodes may comprise aprocessor (for example a central processing unit (CPU)), amicroprocessor (for example a single-board microprocessor), aprogrammable processor (for example a field-programmable gate array(FPGA), an application specific integrated circuit (ASIC), or a virtualmachine.

In certain embodiments, for example, the CPU may have an x86architecture. In certain embodiments, for example, the CPU may be a4-bit processor such as an Intel 4004 processor. In certain embodiments,for example, the CPU may be an 8-bit processor, for example an Intel8008 processor, an Intel 8080 processor, or an Intel 8085 processor. Incertain embodiments, for example, the CPU may be a bit-slice processor,for example a bit-slice processor selected from the Intel 3000 bit-sliceprocessor family. In certain embodiments, for example, the CPU may be a16-bit processor, for example a processor selected from Intel MCS-86processor family such as an Intel 8086 processor, an Intel 8088processor, an Intel 80186 processor, an Intel 80188 processor, or anIntel 80286 processor. In certain embodiments, for example, the CPU maybe a 32-bit processor, for example a non-x86 processor such as an iAPX432 processor, an i960 processor, an i860 processor, or an XScaleprocessor. In certain embodiments, for example, the CPU may be a 32-bitprocessor, for example an Intel 80386 range processor such as an Intel80386DX processor, an Intel 80386SX processor, an Intel 80376 processor,an Intel 80386SL processor, or an Intel 80386EX processor. In certainembodiments, for example, the CPU may be a 32-bit processor, for examplean Intel 80486 range processor such as an Intel 80486DX processor, anIntel 80486SX processor, an Intel 80486DX2 processor, an Intel 80486SLprocessor, or an Intel 80486DX4 processor. In certain embodiments, forexample, the CPU may be based on a 32-bit Intel P5 microarchitecture,for example an Intel Pentium processor or an Intel Pentium processorwith MMX Technology. In certain embodiments, for example, the CPU may bebased on a 32-bit P6/Pentium M microarchitecture, for example an IntelPentium Pro processor, an Intel Pentium II processor, an Intel Celeronprocessor, an Intel Pentium III processor, an Intel Pentium II Xeonprocessor, an Intel Pentium III Xeon processor, an Intel Pentium IIICoppermine-based Celeron processor, an Intel Pentium III Tualatin-basedprocessor, an Intel Pentium M processor, an Intel Celeron M processor,an Intel Core processor, or an Intel Dual-Core Xeon LV processor. Incertain embodiments, for example, the CPU may be based on a 32-bitNetBurst microarchitecture, for example an Intel Pentium 4 processor, anXeon processor, an Intel Mobile Pentium 4-M processor, an Intel Pentium4 EE processor, or an Intel Pentium 4E processor. In certainembodiments, for example, the CPU may be 64-bit IA-64 processor, forexample an Intel Itanium processor or an Intel Itanium 2 processor. Incertain embodiments, for example, the CPU may have a 64-bit NetBurstmicroarchitecture, for example an Intel Pentium 4F processor, IntelPentium D processor, Intel Pentium Extreme Edition processor, or anIntel Xeon processor. In certain embodiments, for example, the CPU mayhave a 64-bit Core microarchitecture, for example an Intel Core 2processor, an Intel Pentium Dual-Core processor, an Intel Celeronprocessor, or an Intel Celeron M processor. In certain embodiments, forexample, the CPU may have a 64-bit Nehalem microarchitecture, forexample an Intel Pentium processor, an Intel Core i3 processor, an IntelCore i5 processor, an Intel Core i7 processor, or an Intel Xeonprocessor. In certain embodiments, for example, the CPU may have a64-bit Sandy Bridge/Ivy Bridge microarchitecture, for example an IntelCeleron processor, an Intel Pentium processor, an Intel Core i3processor, an Intel Core i5 processor, or an Intel Core i7 processor. Incertain embodiments, for example, the CPU may have a 64-bit Haswellmicroarchitecture. In certain embodiments, for example, the CPU may havea Broadwell microarchitecture, for example an Intel Core i3 processor,an Intel Core i5 processor, or an Intel Core i7 processor. In certainembodiments, for example, the CPU may have a Skylake microarchitecture,for example an Intel Core i3 processor, an Intel Core i5 processor, oran Intel Core i7 processor. In certain embodiments, for example, the CPUmay have a Kaby Lake microarchitecture. In certain embodiments, forexample, the CPU may have a Coffee Lake microarchitecture. In certainembodiments, for example, the CPU may have a Cannonlakemicroarchitecture. In certain embodiments, for example, the CPU mayIntel Tera-Scale processor. In certain embodiments, for example, thenode may comprise a microcontroller. In certain embodiments, forexample, the microcontroller may be an Intel 8048 microcontroller, anIntel 8051 microcontroller, an Intel 80151 microcontroller, an Intel80251 microcontroller, or a microcontroller selected from the MCS-96family of microcontrollers.

In certain embodiments, for example, the CPU may have an ARMarchitecture. In certain embodiments, for example, the CPU may have anARMv1 architecture. In certain embodiments, for example, the CPU mayhave an ARMv2 architecture. In certain embodiments, for example, the CPUmay have an ARMv3 architecture. In certain embodiments, for example, theCPU may have an ARMv4 architecture. In certain embodiments, for example,the CPU may have an ARMv4T architecture. In certain embodiments, forexample, the CPU may have an ARMv5TE architecture. In certainembodiments, for example, the CPU may have an ARMv6 architecture. Incertain embodiments, for example, the CPU may have an ARMv6-Marchitecture. In certain embodiments, for example, the CPU may have anARMv7-M architecture. In certain embodiments, for example, the CPU mayhave an ARMv7E-M architecture. In certain embodiments, for example, theCPU may have an ARMv8-M architecture. In certain embodiments, forexample, the CPU may have an ARMv7-R architecture. In certainembodiments, for example, the CPU may have an ARMv8-R architecture. Incertain embodiments, for example, the CPU may have an ARMv7-Aarchitecture. In certain embodiments, for example, the CPU may have anARMv8-A architecture. In certain embodiments, for example, the CPU mayhave an ARMv8-A architecture. In certain embodiments, for example, theCPU may have an ARMv8.1-A architecture. In certain embodiments, forexample, the CPU may have an ARMv8.2-A architecture. In certainembodiments, for example, the CPU may have an ARMv8.3-A architecture.

In certain embodiments, for example, the node may comprise a DigitalSignal Processor (DSP) (for example the DSP may be embedded on a CPU ormay be connected to a CPU). In certain embodiments, for example, the DSPmay be a C6000 series DSP produced by Texas Instruments. In certainembodiments, for example, the CPU may be a TMS320C6474 chip. In certainembodiments, for example, the CPU may comprise a DSP having a StarCorearchitecture, for example MSC81xx chip produced by Freescale such as aMSC8144 DSP. In certain embodiments, for example, the CPU may comprise amulti-core multi-threaded DSP such as a multi-core multi-threadedprocessor produced by XMOS. In certain embodiments, for example, the DSPmay be a CEVA-TeakLite DSP or a CEVA-XC DSP produced by CEVA, Inc. Incertain embodiments, for example, the DSP may be a SHARC-based DSPproduced by Analog Devices. In certain embodiments, for example, the DSPmay be an embedded DSP, for example a Blackfin DSP. In certainembodiments, for example, the DSP may be based on TriMedia VLIWtechnology, for example a DSP produced by NXP Semiconductors. In certainembodiments, for example, the DSP may support fixed-point arithmetic. Incertain embodiments, for example, the DSP may support floating-pointarithmetic.

In certain embodiments, for example, the node may comprise a GraphicsProcessing Unit (GPU) (for example the GPU may be embedded on a CPU ormay be connected to a CPU). In certain embodiments, for example, the GPUmay be a gaming GPU such as GeForce GTX produced by nVidia, a Titan Xproduced by nVidia, a Radeon HD produced by Advanced Micro Devices(AMD), or a Radeon HD produced by Advanced Micro Devices (AMD). Incertain embodiments, for example, the GPU may be a cloud gaming GPU suchas a Grid produced by nVidia, or a Radeon Sky produced by Advanced MicroDevices (AMD). In certain embodiments, for example, the GPU may be aworkstation GPU such as a Quadro produced by nVidia, a FirePro producedby AMD, or a Radeon Pro produced by AMD. In certain embodiments, forexample, the GPU may be a cloud workstation such as a Tesla produced bynVidia, or a FireStream produced by AMD. In certain embodiments, forexample, the GPU may be an artificial Intelligence cloud GPU such as aRadeon Instinct produced by AMD. In certain embodiments, for example,the GPU may be an automated/driverless car GPU such as a Drive PXproduced by nVidia.

In certain embodiments, for example, the CPU may comprise an AMD Am2900series processor, for example an Am2901 4-bit-slice ALU (1975), anAm2902 Look-Ahead Carry Generator, an Am2903 4-bit-slice ALU, an withhardware multiply, an Am2904 Status and Shift Control Unit, an Am2905Bus Transceiver, an Am2906 Bus Transceiver with Parity, an Am2907 BusTransceiver with Parity, an Am2908 Bus Transceiver with Parity, anAm2909 4-bit-slice address sequencer, an Am2910 12-bit addresssequencer, an Am2911 4-bit-slice address sequencer, an Am2912 BusTransceiver, an Am2913 Priority Interrupt Expander, or an Am2914Priority Interrupt Controller. In certain embodiments, for example, theCPU may comprise an AMD Am29000 series processor, for example, an AMD29000, an AMD 29027 FPU, an AMD 29030, an AMD 29050 with on-chip FPU, oran AMD 292xx embedded processor. In certain embodiments, for example,the processor may be an AMD Am9080, an AMD Am29X305, or an AMD OpteronA1100 Series.

In certain embodiments, for example, the CPU may be a Motorola 68451, aMC88100, a MC88110, a Motorola 6800 family, a Motorola 6809, a Motorola88000, a Motorola MC10800, or a Motorola MC14500B processor. In certainembodiments, for example, the CPU may be a Motorola PowerPC processor,for example a PowerPC 600, a PowerPC e200, a PowerPC 7xx, a PowerPC5000, a PowerPC G4, or a PowerQUICC processor.

In certain embodiments, for example, the one or plural nodes maycomprise one or more processors coupled to one or more other components,inclusive of one or more non-transitory memory, one or more userinput/output devices (for example a keyboard, a touchscreen, and/or adisplay), one or more data buses, and one or more physical interfaces tothe network. In certain embodiments, for example, the one or morephysical interfaces may comprise an Ethernet interface (for example acopper or fiber interface), a wireless interface (for example a wirelessinterface according to the IEEE 802.11 standard), a wireless broadbandinterface (for example a “Wi-Max” interface according to the IEEE 802.16standard), a wireless interface according to an IEEE 802.15.4-basedstandard (for example an interface according to the Zigbeespecification), a Bluetooth interface (for example a Bluetooth interfaceaccording to the IEEE 802.15.1 standard), a modem, or a combination oftwo or more of the foregoing interfaces. In certain embodiments, forexample, the one or more physical interfaces may comprise an FPGAprogrammed for high speed network processing. In certain embodiments,for example, the one or more physical interfaces (for example anEthernet interface or one of the aforementioned wireless interfaces) mayhave a data transfer rate of 10 Mbps, 100 Mbps, 1 Gbps, 10 Gbps, or 100Gbps. In certain embodiments, for example, the one or more physicalinterfaces may have a data transfer rate of at least 10 Mbps, forexample at least 100 Mbps, at least 1 Gbps, at least 10 Gbps, or the oneor more physical interfaces may have a data transfer rate of at least100 Gbps. In certain embodiments, for example, the one or more physicalinterfaces may have a data transfer rate of less than 100 Gbps, forexample less than 10 Gbps, less than 1 Gbps, less than 100 Mbps, or theone or more physical interfaces may have a data transfer rate of lessthan 10 Mbps.

In certain embodiments, for example, the one or plural nodes maycomprise computer-readable media configured to store information (forexample data or computer-readable instructions). In certain embodiments,for example, the computer-readable media may comprise non-transitorycomputer-readable storage media. In certain embodiments, for example,the non-transitory computer-readable storage media may comprise amagnetic disk, an optical disk, random access memory (RAM), read-onlymemory, a flash memory device, or phase-change memory. In certainembodiments, for example, the non-transitory computer-readable storagemedia may be a fixed memory device, such as a hard drive. In certainembodiments, for example, the non-transitory computer-readable storagemedia may comprise one or plural device drives. In certain embodiments,for example, one or plural device drives may be selective from the groupconsisting of a parallel IDE drive, a serial EIDE drive, a SCSI baseddrive (for example Narrow, UW, LVD, etc.), an external USB/Flash drive;an IOMEGA Zip drive, a Jazz drive, a CD/DVD, a CD-R/RW, a DVD-R/RWdrive, or a combination of two or more of the foregoing device drives.In certain embodiments, for example, the non-transitorycomputer-readable storage media may be a removable memory device, suchas a diskette or a Universal Serial Bus (USB) flash drive. In certainembodiments, for example, the one or plural nodes (for example all ofthe plural nodes) may be exclusive of removable computer-readable media.

In certain embodiments, for example, the methods, systems, modules, orproducts may be implemented in software that is stored in one or more ofthe aforementioned computer-readable media and, when ready to beutilized, loaded in part or in whole (for example, into RAM) andexecuted by a CPU.

In certain embodiments, for example, the one or plural nodes maycommunicate (for example internally, or for example with each of anotherone or more of the plural nodes over the network) using transitorycomputer-readable communication media. In certain embodiments, forexample, the transitory computer-readable communication media maycomprise a propagated signal, for example an electrical signal, anoptical signal, an acoustical wave, a carrier wave, an infrared signal,and/or a digital signal.

In certain embodiments, for example, the one or plural nodes maycomprise an operating system defining a kernel (for example the one orplural nodes may be plural nodes, wherein a first node of the pluralnodes comprises a first operating system and a second node of the pluralnodes comprises a second operating system, the first operating systemthe same or different from the second operating system). In certainembodiments, for example, the operating system may be selected from thegroup consisting of 2K, 86-DOS, A/UX, Acados, ACP (Airline ControlProgram), AdaOS, ADMIRAL, Adrenaline, aerolitheOS, Aimos, AIOS, AIX,AIX/370, AIX/ESA, Aleris Operating System, Allegro, AllianceOS, AlphaOS, Alto OS, Amiga OS, Amoeba, Amstrad, AMX RTOS, AneedA, AngeIOS,Antarctica, AOS/VS, Aperios, Apollo Domain/OS, ApolloOS, Apostle,Archimedes OS, AROS, ARTOS, Asbestos, Athena, AtheOS, AtomsNet,Atomthreads, AuroraOS, AutoSense OS, B-Free, Bada, BAL, Banyan VINES,Basic Executive System, BelA, BeOS, Beowulf, BKY, BlueEyedOS, BOS,BOS1810, BoxOS, bpmk, BPMK, BRiX, BS600, BS2000, BSDi, BugOS, Calmira,CCP (Computer Control Program), CDOS, Cefarix, C Executive, Chaos,ChibiOS, Chimera, Chippewa OS, Choices, Chorus, Cinder OS, Cisco IOS,Clicker32, CMW+(SCO), COBRA, Coherent, CONSENSYS, Contiki, ConvexOS,Cos, Cosy, Counterpoise, CP/K, CP/M, CP/NET, CP/Z, CPF (Control ProgramFacility), Cromix, Cronus, CSOC, CTOS, CTSS, CX/SX, Cygnus, DAC, Darwin,Data General, DC/OSx, DCP, Degenerate OS, Delitalk, DELL UNIX, DemingOS, DEMOS, DesktopBSD, DESKWORK, DG/UX, DIGITAL UNIX, dingOS, DK/DOS,DLD, DNIX, Domain OS, DOS, DOS2, DOS 50, Dosket, dr′ex, DR-DOS, Drops,Drywell OS, DS-OS, DTOS, DVIX, DYNIX Unix (Sequent), ECL-3211,eComStation, eCos, EduOS, EGOS, ekkoBSD, Elate, ELKS, Elysium, EOS,EP/IX, EPOC, ERaMS, ERIKA, EROS, ESER, ESIX, ESKO, Eumel, EuNIX, Exopc,ExOS, Express, Famos, FDOS, Fiasco, Flamethrower, FlashOS, FlexOS,FlingOS, FLP-80 DOS, Flux, Flux-Fluke-Flask, FMS, Forth, FortiOS,FreeBSD, FreeDOS, FreeDOWS, FreeVMS, Frenzy, Fuchsia, FullPliant,FunatixOS, FxOS, GazOS, GCOS, GECOS, GeekOS, Gemini Nucleus, Genera,GEORGE, GEOS, GM OS, GNU Hurd, GNUstep, Go, Goah, Gould OS, Grasshopper,GUIDE, HA-MSP, Hactar, Harmony, Haiku, Helios, HES, Hive, HOPE, HP-87OS, HP-UX, HT-11, Hurd, Hurricane, HydrixOS, i5/OS, IBM PC-DOS, IBSYS,Icaros Desktop, ICL Unix, Immunix, Inferno, INMOS, INTEGRITY RTOS,Iridium OS, IRIX, iRMX, IRTS, ISC (Interactive), ISIS, ISSL, ITRON, ITS,JAMB, JavaOS, Jbed, JeniOS, Jeo-OS, Jibbed, JOS, JTMOS, JUNOS, JxOS,KAOS, Kaspersky OS, Katix, Kea, Kerberos, KeyKOS, KolibriOS, KOS,KRONOS, KROS, KRUD, Kylin, L4, L13Plus, LainOS, LAN Manager, LDOS,LegOS, leJOS, Linux, Lisa OS, LTSS, LynxOS, Mach, Mac OS 8, Mac OS 9,Mac OS X, MANOS, MaRTE OS, Maruti, Masix, Master, Maverick OS, MBOS, MCP(Master Control Program), MDOS, MenuetOS, Merlin, Micriμm, MICRODOS,MicroVMS, MidnightBSD, MikeOS, Minima, Minix, Minoca OS, Minux, Miranda,Miray μnOS, MITE 80/IOS, MK++, ML, ModuIOS, Monitor, MOPS, MorphOS, MOS,MOSIX, MPE/iX, MPE OS, MRT1700, MS-DOS, MSOS, MT809, Multics, Mungi,MUTOS, muVinix, MVS, Möbius, NachOS, NCR Unix, NEC DOS, NECUX, Nemesis,NeOS, NetBSD, Netware, NewDeal, NEWDOS, NewOS, NEWS-OS, Newton OS,NexentaOS, NeXTStep, NextworksOS, Nexus, Nimbus, NintendOS, Node OS,NOS, NOS/BE, NOS/VE, Nova, Novell DOS, NS/GDOS, NSK, NTDIOS, Nucleus,Oaesis, Oasis, Oberon, Objex, Odin, Omega 4, OnCore, On Time RTOS-32,Opal, OpenBeOS, OpenBSD, OpenDarwin, OpenRavenscar, OpenServer,OpenSolaris, OpenVision, OpenVMS, OppcOS, OS-2, OS-9, OS-C, OS/2, OS/2Warp, OS/9, OS/360, OS/390, OS/400, OS/ES, OS/M, OS4, osCAN, OSE, OSF/1,Osx, OSx16, OZONE, PAKOS, Palm OS, PAPL, Paramecium, ParixOS, Paros,PauIOS, P BASIC, PC-BSD, PC-DOS, PC-MOS/386, PC/M-System, PDOS, PEACE,Pebble, Pegasos, PETROS, Phantom OS, Phos, PikeOS, PIOS, PizziOS, Plan9, Plex86, PM_SZ_OS, PocketPC 2003, PowerMAX, PowerOS, PowerSX, PowerUX,ProDOS, Prologue, Proolix, ProOSEK, PSOS, pSOSystem, PSU, PTS DOS,PublicOS, PURE, QDOS, QNX, Quadros, RadiOS, RBASIC, RCOS, RCOSjava,RDOS, ReactOS, REAL-32, Realogy Real Time Architekt, REBOL-IOS, Redox,ReWin, REX-80/86, REXX/OS, RHODOS, RISC OS, RMOS, RMS 68k, Roadrunner,Rocket, Rome, ROME, RSTS/E, RSX-11, RT-11, RTEL, RTEMS, RT Mach NTT,rtmk, RTMX, RTOS-32, RTOS-UH, RTS-80, RTX, RTXDOS, RxDOS, S.Ha.R.K,Sanos, SCO OpenServer, SCOPE, ScorchOS, ScottsNewOS, Scout, SCP, SCP(System Control Program), SCP-IBE, Self-R, SeOS, Sequent, SEVMS VAX,Shark, SharpOS, ShawnOS, SIBO, Sinclair, Sinix, SINTRAN III, SkyOS,Slikware, sMultiTA, SOBS, Solaris, Solar_OS, Solbourne UNIX, SOS,SP6800, Spice, Spice/MT, SPIN, Spinix, SPDX, Spring, Squeak, SSP (SystemSupport Program), STAR-OS, STARCOS, Starplex II OS, Sting, StreamOS,Subsump, SUMO, SunMOS, SunOS, SunriseOS, SuperDOS, SVM, SVR, Switch OS,Syllable, Symbian OS, SymbOS, Symobi, Symphony OS, Synapse, System 6(Mac OS), System 7 (Mac OS), System V Release, Tabos, TABOS, TaIOS,TAOS, TENEX, THE, Thix, ThreadX, ThrilIOS, TI-99 4A, TinyOS, TIS APL,TNIX, TOPS-10, TOPS-20, Topsy, Tornado, Torsion, TOS, TPF (TransactionProcessing Facility), TriangleOS, Tripos, TRON, TRS-DOS, Tru64 UNIX,TSX-32, TUD:OS, TUNES, TurboDOS, UberOS, UCSD-p, UDOS, Ultrix, UMDS,UMN, UNI/OS, Unicos, UNICOS/Ic, Uni FLEX, Unisys U5000, Unix System,UnixWare, Unununium, USIX, UTS, UXP/V, V2 OS, Vapour, Veloce OS3,VERSAdos, VisiOn, Visopsys, Visual Network OS, VM/ESA, VM/VSE, VME, VMS,VRTX/8002, VRTX/OS, VSE, VSOS, VSTa, VTOS, VxWorks, WEGA, WildMagnolia,Windows 7, Windows 8, Windows 10, Windows 95, Windows 98, Windows 98 SE,Windows 2000, Windows Automotive, Windows CE, Windows ME, Windows NT,Windows Server 2003, Windows Server 2003 R2, Windows Server 2008,Windows Server 2008 R2, Windows Vista, Windows XP, WinMac, WIZRD,x-kernel, XAOS, XDOS, Xenix, Xinu, xMach, XOS, XTS, Yamit, Yaxic,Yoctix, z-VM, z/OS, Z9001-OS, ZeaIOS, Zephyr, Zeta, Zeus Zilog, zeVenOS,ZMOS, ZotOS, and ZRTS 8000. In certain embodiments, for example, theoperating system may be a Linux distribution consisting of the groupselected from 3Anoppix, 64 Studio, Absolute Linux, AbulEdu, Adamantix,ADIOS, Adler Linux, Admelix, Admiral Linux, AGNULA, Alcolix, Alinex,aLinux, AliXe, Alpine Linux, ALT Linux, amaroK Live, Amber, andLinux,Android, Android Things, Ankur, Annvix, AnNyung, Anonym.OS, ANTEMIUM,antiX, APODIO, Apricity OS, aquamorph, Arabian, ArcheOS, Archie, ArchLinux, Ark Linux, Armed Linux, ArtistX, Arudius, AsianLinux, Asianux,ASork, ASP Linux, Astaro, AsteriskNOW, Athene, ATMission, Atomix,Augustux, Aurora, Aurox, AUSTRUMI, B2D, BabelDisc, BackTrack, Baltix,Bayanihan, BearOps Linux, BeatrlX Linux, Beehive Linux, BeleniX, BentLinux, Berry Linux, BestLinux, BIG LINUX, BinToo, BioBrew, Bioknoppix,Black Cat Linux, blackPanther, BLAG, Blin Linux, Bloody Stupid, Blue CatLinux, BlueLinux, Bluewall, Bodhi Linux, Bonzai Linux, Bootable ClusterCD, Brillo, Buffalo, BugnuX, BU Linux, Burapha, ByzantineOS, CaixaMágica, Caldera Linux, cAos, Carl.OS, Catix, CCux, CDlinux, Censornet,CentOS, Chakra, Chrome OS, Chromium OS, c133n, ClarkConnect, ClearOS,cLIeNUX, Clonezilla Live, Clusterix, clusterKNOPPIX, Co-Create,CobaltOS, College, Commodore OS Vision, Condorux, Conectiva Linux, CoolLinux CD, CoreBiz, Coreboot, Corel Linux, CoreOS, Coyote, CraftworksLinux, CrunchBang, CrunchEee, CRUX, Cub Linux, Catix, Damn Small Linux,Damn Vulnerable Linux, Danix, DARKSTAR, Debian GNU/Linux, Debris Linux,Deep-Water, Deft Linux, DeLi, Delix Linux, Dell Networking OSIO, Denix,Devil, Dizinha, DLD, DNALinux, Draco Linux, Dragon Linux, Dragora, DRBLlive, Dreamlinux, Dualix, Dynabolic, dyne:bolic, Dzongkha, E/OS LXDesktop, Eadem, Eagle, eAR OS, easyLinux, Easy Peasy, easys, Edubuntu,eduKnoppix, EduLinux, Ehad, Eisfair, Elbuntu, ELE, eLearnix, elementaryOS, ELF, Elfstone Linux, ELinOS, Elive, ELP, ELX, Embedix, Endian,Endless OS, EnGarde, ERPOSS, ESware, Euronode, EvilEntity Linux, Evinux,EzPlanet One, FAMELIX, FaunOS, Feather, Featherweight, Fedora, Fermi,ffsearch-LiveCD, Finnix, Firefox OS, Fiubbix, Flash, FlightLinux,Flonix, Fluxbuntu, FluxFlux-Eee, Foresight, FoRK, Formilux, FoX Desktop,Freduc, free-EOS, Freedows, Freeduc, FreeNAS, Freepia, FreeSBIE,Freespire, FreevoLive, Freezy, Frugalware, FTOSX, FusionSphere,GalliumOS, GeeXboX, Gelecek, GenieOS, Gentoo, Gentoox, GEOLivre,Gibraltar, Ging, Giotto, Glendix, gNewSense, GNIX, Gnoppix, GNUbieLinux, gnuLinEx, GNUstep, GoblinX, GoboLinux, GoodGoat Linux, gOS(Google OS), GParted, Grafpup, Granular Linux, grml, Guadalinex, Guix,GuLIC-BSD, H3Knix, Haansoft, Hakin9, Halloween Linux, Hancom, Hedinux,Helix, Heretix, Hikarunix, Hiweed, Holon, HOLON Linux, Honeywall,How-Tux, Hubworx, iBox, ICE Linux, Icepack Linux, IDMS, Igelle, IgelLinux, Ignalum, Impi, Independence, IndLinux, Instant WebKiosk, IPCop,JBLinux, JeOS, Jolicloud, JoLinux, Joli OS, Julex, Jurix Linux, Juxlala,K-DEMar, K12LTSP, Kaboot, Kaella, Kaladix Linux, Kalango, Kali Linux,KANOTIX, Karamad, KateOS, Kinneret, Kiwi Linux, Klax, Klikit-Linux, KLinux, km Linux, knoplLS, Knoppel, Knopperdisk, Knoppix, Knoppix 64,KnoppiXMAME, KnoppMyth, KnoSciences, Kodibuntu, Komodo, Kongoni, Korora,KRUD, Kubuntu, Kuki Linux, Kurumin, Kwort, L.A.S., Leetnux, Lerntux,LFS, LG3D, LibraNet Linux, LibreCMC, LIIS, Lin-X, Linare, LindowsOS,Lineox, LinEspa, LinnexOS, Linpus, Linspire, Linux+Live, Linux-EduCD,Linux4One, Linux Antarctica, Linux by LibraNet, LinuxConsole, LinuxCentOS (for example Linux CentOS 7), Linux DA OS, LinuxMCE, Linux Mint,LINUXO, LinuxOne, LinuxPPC, LinuxTLE, Linux XP, Litrix, LiveCD Router,LiveKiosk, LiVux, LLGP, LliureX, LNX-BBC, Loco, Lormalinux, I OS, LSTLinux, LTSP, LUC3M, Luit, Lunar, LuteLinux, LXDEbian, LycorisDesktop/LX, m0n0wall, Mageia, Magic, Mandrake, Mandriva, Mangaka, MAX,MaxOS, Mayix, MCNLive, Mediainlinux, Media Lab, MeeGo, MEPIS, MicroOS,MiniKazit, Minislack, Miracle, MirOS, MkLinux, Moblin, Mockup, MoLinux,Momonga, Monoppix, Monte Vista Linux, MoonOS, Morphix, MostlyLinux,MoviX, MSC, Mulimidix, muLinux, Multi Distro, Muriqui, MURIX, Musix,Mutagenix, MX Linux, Myah OS, myLinux, NasgaIa, Nature's, Navyn OS,NepaLinux, NetMAX DeskTOP, NetSecL, Netstation Linux, Netwosix, Nexenta,Niigata, NimbleX, Nitix, NoMad Linux, Nonux, Nova, NST, nUbuntu,Nuclinux, NuxOne, O-Net, OcNOS, Ocularis, Ola Dom, Omega, Omoikane,Onebase Linux, OpenArtist, OpenLab, OpenLinux, OpenLX, OpenMamba,OpenMediaVault, OpenNA, Open ProgeX, Openwall, Operator, Oracle Linux,Oralux, Overclockix, Pltux, PAIPIX, paldo, Parabola, ParallelKnoppix,Pardus, Parsix, Parsix GNU/Linux, PC/OS, PCLinuxOS, Peanut Linux,PelicanHPC, Penguin Sleuth, Pentoo, Peppermint, Pequelin, pfSense,Phaeronix, Phantomix, Phat Linux, PHLAK, Pie Box, Pilot, Pingo,Pingwinek, Pioneer Linux, Plamo, PLD, PLoP Linux, Pocket Linux,Poseidon, POSTed, Power Desktop, Pozix Linux, pQui, Privatix, Progeny,ProteanOS, ProTech, PUD, Pulsar Linux, Puppy, Puredyne, QiLinux, Qimo,Qplus, Quantian, Qubes OS, Raidiator, Raspbian, Red Flag, Red Hat, RedHat Enterprise Linux (for example Red Hat Enterprise Linux version 7),RedHawk Linux, Redmond Linux, redWall Firewall, Remix OS, Repairlix,RIoT, RIP, ROCK, Rock Linux, Rocks Cluster, ROOT, ROSA, ROSLIMS, rPath,RR4 Linux, RTLinux, Rubix, Sabayon, Sabily, Sailfish OS, Salgix, SalixOS, Salvare, SAM, Samhain Linux, Santa Fe, Sauver, SaxenOS, SCI.Linux,Scientific Linux, SCO Linux, ScrudgeWare, Securepoint, Security-EnhancedLinux (“SELinux”), Sentry Firewall, Shift Linux, Shinux, SimplyMEPIS,Skolelinux, Slack/390, Slackintosh, Slackware, Slamd64, SLAMPP, slax,SliTaz GNU/Linux, SLS, SLYNUX, SME Server, SmoothWall, SnapGear EmbeddedLinux, SNAPPIX, Snøsfrix, SoL (Server optimized Linux), SONiC, Sorcerer,SOT Linux, Source Mage, Spectra Linux, SphinxOS, Splack, Splashtop,SprezzOS, Stampede, StartCom, STD, Stormix, StreamBOX, StressLinux,STUX, STX, Subgraph OS, Sugar On A Stick, SuliX, Sun Linux, Sun Wah,SuperGamer, SuSE, Symphony OS, SystemRescue, T2, TA-Linux, Tablix, Tails(The Amnesic Incognito Live System), Tao Live, Taprobane, TechLinux,Thinstation, Tilix, Tinfoil Hat Linux, Tiny Core Linux, Titan LEV,Tizen, tomsrtbt, Tomukas, Toophpix, Topologilinux, Toutou, Trinity,Trisquel GNU/Linux, Trixbox, Troppix, Trustix, Trustverse, Truva, TumiX,TupiServer, Tuquito, Turbolinux, Turkix, Ubuntu, UbuntuME, UbuntuNetbook Remix, Ubuntu Privacy Remix, uClinux, Ufficio Zero, UHU-Linux,uL, Ulteo, Ultima, Underground, Unifix Linux, uOS, Urli OS, UserLinux,UTILEX, Ututo, Ututo XS, Vector, Vidalinux, VideoLinux, Vine, VLOS,VNLinux, Voltalinux, Volumio, WarLinux, Wazobia, Webfish Linux, WHAX,White Box, Whitix, WIENUX, Wind River Linux, WinLinux 2001, WinSlack,Wolvix, WOMPI, X-evian, X/OS, Xandros, Xarnoppix, Xenoppix, Xfld, XimianDesktop, xPud, Xteam, XtreemOS, Xubuntu, Yellow Dog, YES, YggdrasilLinux, Ylmf OS, Yoper, YunOS, Zebuntu, Zentyal, Zenwalk, Zeroshell,ZoneCD, and Zorin OS.

In certain embodiments, for example, the operating system may beconfigured to enforce access control policies. In certain embodiments,for example, the access control policies may restrict execution ofcomputer programs (for example user-initiated processes, boot upprocesses, application programs and/or operating system programs) to apredetermined (for example preconfigured) list. In certain embodiments,for example, the access control policies may restrict access to filesand network resources to a predetermined (for example preconfigured)list. In certain embodiments, for example, the access control policiesmay be mandatory. In certain embodiments, for example, configuration ofthe access control policies may be non-discretionary. In certainembodiments, for example, the operating system may not provide for aroot user or a superuser. In certain embodiments, for example, theoperating system may be SELinux (or SE Linux or Linux SE). In certainembodiments, for example, the operating system may comprise a kernelsecurity module, for example the operating system may be a Linuxoperating system and the security module may be AppArmor.

In certain embodiments, for example, memory defined by thecomputer-readable media may comprise a kernel space memory and a user(or application) space memory. In certain embodiments, for example, thekernel space memory may comprise kernel RAM. In certain embodiments, forexample, the kernel space memory may be reserved for executing thekernel. In certain embodiments, for example, the user space memory maybe reserved for executing all non-kernel user processes (for exampleapplication programs) and program modules. In certain embodiments, forexample, the user space memory may comprise a portion of RAM.

In certain embodiments, for example, the one or plural nodes maycomprise a network stack (also termed a “protocol stack”). In certainembodiments, for example, at least a portion of the network stack mayform part of the operating system or part of the kernel of the node,processor, or computing device. In certain embodiments, for example, thenetwork stack may comprise one or more layers according to the OSImodel. In certain embodiments, for example, the network stack maycomprise a physical layer consisting of hardware (for example anEthernet interface) used to form a data connection. In certainembodiments, for example, the network stack may comprise a data linklayer configured to provide data transfer to and from a remote node ofthe plural nodes. In certain embodiments, for example, the network stackmay comprise a network layer configured to transferring variable lengthdata sequences (called datagrams) to and from a remote node of theplural nodes. In certain embodiments, for example, the network stack maycomprise a transport layer configured to transfer datagrams from asource to a destination host according to a specified protocol. Incertain embodiments, for example, the specified protocol may beTransmission Control Protocol (TCP). In certain embodiments, forexample, the specified protocol may be User Datagram Protocol (UDP). Incertain embodiments, for example, the network stack may comprise asession layer configured to establish, manage and terminate a connectionbetween an application executing on the node and an applicationexecuting on another node of the plural nodes. In certain embodiments,for example, the network stack may comprise a presentation layerconfigured to map syntax and semantics between applicationscommunicating via the network stack. In certain embodiments, forexample, the network stack may comprise an application layer configuredto provide a standardized communication interface to an applicationexecuting on the node, for example an network application programminginterface whereby a user process (for example a self-containeduser-application program) in user space may utilize portions of thenetwork stack.

In certain embodiments, for example, the one more of the plural nodesmay comprise software. In certain embodiments, for example, the softwaremay be an application program. In certain embodiments, for example, thesoftware may be an end-user application program (for example a programinvoked by an end-user such as a non-administrator or non-root user). Incertain embodiments, for example, an application executing in anapplication space of a node may be identified using a user-applicationidentifier, user-application identifier comprising an applicationidentifier (for example a process command) and a user (for example aprocess owner) of the application. In certain embodiments, for example,the software may be a program not invoked by an operating system, or aprogram that is not an operating system program. In certain embodiments,for example, the software may be a self-contained executable configuredto execute in an application space of a node of the each of one more ofthe plural nodes. In certain embodiments, for example, the software maybe a user mode program. In certain embodiments, for example, thesoftware may be a server. In certain applications, for example, thesoftware may be a client. In certain embodiments, for example, thesoftware may be a publisher. In certain applications, for example, thesoftware may be a subscriber. In certain embodiments, for example, thesoftware may be a publisher and/or a subscriber. In certain embodiments,for example, the software may comprise a component of a SupervisoryControl and Data Acquisition (SCADA) system. In certain embodiments, forexample, the software may be configured to transmit data (for examplesensor data, confidential data, and/or secret data). In certainembodiments, for example, the software may be configured to receive,transmit, create, handle, manipulate, and/or store data. In certainembodiments, for example, the software may be configured to receive,transmit, create, handle, manipulate, and/or store sensitive data (forexample confidential data and/or secret data). In certain embodiments,for example, the software may be configured to receive, transmit,create, handle, manipulate, and/or store sensor data. In certainembodiments, for example, the software may be updated (for exampleupdated one time, updated plural times, or periodically updated), forexample updated from a remote computer over the network. In certainembodiments, combinations of an identifier for the software and anidentifier for an authorized user may be present in a preconfigured listpresent on the node, processor, or computing device. In certainembodiments, for example, the preconfigured list may further compriseone or plural exclusive allowed network port numbers (and optionallyallowed network interface controllers) which may be associated with thesoftware. In certain embodiments, for example, the preconfigured listmay further comprise one or plural exclusive allowed network portnumbers (and optionally allowed network interface controllers) to whichthe software may transmit or from which the software may receive data.In certain embodiments, for example, the preconfigured list may furthercomprise a data type or data protocol descriptor authorized fortransmission or receipt by the software. In certain embodiments, forexample, the preconfigured list may further comprise one or pluraltunnel port numbers for a network security program adapted tocommunicate with the software. In certain embodiments, for example, thepreconfigured list may comprise a private key (or a cryptographicparameter or primitive) configured for establishment of an encryptednetwork tunnel having a port of the network security program as anendpoint, the port referencing one of the one or plural tunnel portnumbers (for example a private key used for cryptographic key exchange).In certain embodiments, for example, the software may be non-secure. Incertain embodiments, for example, the software may not be passwordprotected. In certain embodiments, for example, the software may beconfigured for packet data communication with a remote applicationpresent on a remote node but not configured for secure communication(for example not configured for secure communication of packet data byan encrypted communication protocol such as TLS).

In certain embodiments, for example, the software may comprise networksecurity software. In certain embodiments, for example, the networksecurity software may comprise middleware (or the software may comprisemiddleware which comprises the network security software) configured toexecute between an application software and at least a portion of thenetwork (for example all of the network). In certain embodiments, forexample, the network security software may be resident on a common nodewith the application software. In certain embodiments, for example, thenetwork security software may communicate (for example by an encryptednetwork tunnel between a node on which the network security software isresident and a remote node) with remote network security softwarepresent on a remote node, processor, or computing device. In certainfurther embodiments, for example, the remote network security softwaremay be middleware interposed between a remote application software onthe remote node and the network. In certain embodiments, for example,the network security software may be present on a first node of theplural nodes and the application software may be present on a secondnode of the plural nodes. In certain embodiments, for example, the firstnode may be a network security broker. In certain embodiments, forexample, the first node may be a controller for a software-definedperimeter. In certain embodiments, for example, the first node may be acontroller for a black cloud. In certain embodiments, for example, thenetwork security software may be exclusively invoked by a root user. Incertain embodiments, for example, the network security software may befirst invoked by a kernel. In certain embodiments, for example, at leasta portion (for example all) of the network security software may beexecuted with kernel priority. In certain embodiments, for example, aportion of the network security software may comprise one or pluralmodules executing in an application space with less than kernelpriority. In certain embodiments, for example, at least one of the oneor plural modules may be invoked from a shim in a network stack. Incertain embodiments, execution of the network security software maycomprise a single execution thread. In certain embodiments, for example,execution of the network security software may be distributed. Incertain embodiments, for example, execution of the network securitysoftware may comprise plural execution threads. In certain embodiments,for example, execution of the network security software may comprise twothreads, three threads, or four threads. In certain embodiments, forexample, execution of the network security software may comprise atleast two execution threads, for example at least three executionthreads, at least four execution threads, or execution of the networksecurity software may comprise at least ten execution threads. Incertain embodiments, for example, execution of the network securitysoftware may comprise less than twenty execution threads, less than tenexecution threads, less than eight execution threads, less than fourexecution threads, or execution of the network security software maycomprise less than three execution threads. In certain embodiments, forexample a first execution thread of the network security software maycommunicate data to and/or receive data from a second execution threadof the network security software.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with acamera. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor provisioned to manage communicationswith a network camera. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with a networked camera. In certain embodiments,for example, the network security software may be embodied in one ormore non-transitory computer-readable media for execution by an embeddedprocessor on a camera.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with avideo encoder. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on a video encoder.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with avideo recorder. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with a network video recorder. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with a networked videorecorder. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on a video recorder.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anedge storage device for a video recorder. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processorprovisioned to manage communications with an edge storage device for anetwork video recorder. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with an edge storage device for a networked videorecorder. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on an edge storage devicefor a video recorder.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anaudio system. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on an audio system. Incertain embodiments, for example, the network security software may beembodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with aninput/output accessory of an audio system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by an embeddedprocessor on an input/output accessory or module of an audio system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with asystem device, for example a network system device or a networked systemdevice. In certain embodiments, for example, the system device may be asurveillance device. In certain embodiments, for example, the systemdevice may be a radar-based detector.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by an embedded processor on a system device (for example on aradar-based detector or a surveillance device). In certain embodiments,for example, the network security software may be embodied in one ormore non-transitory computer-readable media for execution by a processorprovisioned to manage communications with video management software. Incertain embodiments, for example, the network security software may beembodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications withsurveillance software.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications withsecurity analytics. In certain embodiments, for example, the securityanalytics may comprise people counter software, queue monitor software,store data software, occupancy estimating software, demographicidentification software, tailgate detection software, directiondetection software, perimeter security software, motion detection and/ormonitoring software, cross like detection software, digital autotrackingsoftware, or a combination of two or more of the foregoing.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anaccess control device. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by an embedded processor on anaccess control device. In certain embodiments, for example, the accesscontrol device of one or more of the foregoing embodiments may comprisea network door controller, a network door station, a card reader, anetwork I/O relay module, or a combination of two or more of theforegoing.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with orwithin a communications kit (for example an executive communicationskit). In certain embodiments, for example, the network security softwaremay be embodied in one or more non-transitory computer-readable mediafor execution by a processor in a communications kit (for example anexecutive communications kit).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with orwithin a cellular base station (for example a portable and/or deployablecellular base station). In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor in a cellular basestation (for example a portable and/or deployable cellular basestation).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a combined router and cellular gateway. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with or within a combinedrouter and cellular gateway. In certain embodiments, for example, therouter and/or cellular gateway of one or more of the foregoingembodiments may be deployable. In certain embodiments, for example, therouter and/or cellular gateway of one or more of the foregoingembodiments may be for use in a rail transportation system. In certainembodiments, for example, the router and/or cellular gateway of one ormore of the foregoing embodiments may be mounted in a bulkhead of a railcar.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with orwithin a flyaway communications system (for example a deployable flyawaycommunications system). In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor in a flyawaycommunications system (for example a deployable flyaway communicationssystem).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with an IPrecorder (for example a network IP recorder or a networked IP recorder).In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by an embedded processor on an IP recorder.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with ahybrid network video recorder (for example a network hybrid networkvideo recorder or a networked hybrid network video recorder). In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution byan embedded processor on a hybrid network video recorder.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with acamera. In certain embodiments, for example, the camera may benetworked. In certain embodiments, for example, the camera may be anetwork camera. In certain embodiments, for example, the camera may be apan-tilt-zoom camera. In certain embodiments, for example, the cameramay be a dome camera. In certain embodiments, for example, the cameramay be a 360 degree camera. In certain embodiments, for example, thecamera may be a bullet and box camera. In certain embodiments, forexample, the camera may be a mobile camera. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by an embeddedprocessor on a camera.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an aircraft control system, an aircraftnavigation system, an air data system, an automatic direction findingsystem, or two or more of the foregoing systems. In certain embodiments,for example, the network security software may be embodied in one ormore non-transitory computer-readable media for execution by a processorof an avionics system. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a flightmanagement system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an airport baggage control system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of pipeline system (for example a pipelinecommand and control system). In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a mixed realitysystem. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor of an identity management system. Incertain embodiments, for example, the network security software may beembodied in one or more non-transitory computer-readable media forexecution by a processor of an image generation system. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of a geopositioning system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor ofan express check-in system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an integrated targeting system. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of a helmet mounted system (for example a helmet mounteddisplay system). In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a satellitecommunications transceiver. In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of an offsitecheck-in system. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a service kiosk.In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of a software-defined radio. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of an in-flight television system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor of acabin management system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of a video door station.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an automotive infotainment system. Incertain embodiments, for example, the network security software may beembodied in one or more non-transitory computer-readable media forexecution by a processor of a telemedicine system. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of a cardiohealth station. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor of amedical imaging system. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a buildingautomation system (for example at a building automation hub).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anidentity management device. In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by an embedded processor on anidentity management device (for example a credentialing, permissioning,and/or provisioning device). In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with an identity authentication device (forexample a credentialing, permissioning, and/or provisioning device). Incertain embodiments, for example, the network security software may beembodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anidentity authentication device (for example a credentialing,permissioning, and/or provisioning device). In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by an embeddedprocessor on an identity authorization device (for example acredentialing, permissioning, and/or provisioning device).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anaccess control device (for example a logical or physical access controldevice). In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on an access control device(for example a logical or physical access control device).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with aSCADA device. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor provisioned to manage communicationswith a logic processor. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by an embedded processor on aSCADA device. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by an embedded processor on a logic processor.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor used to operate and/or control digital signage.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an energy management system. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of a home energy management system. In certain embodiments,for example, the network security software may be embodied in one ormore non-transitory computer-readable media for execution by a processorof a standalone energy management system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor ofan industrial energy management system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor of acommercial energy management system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor of apower plant energy management system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor of asolar energy management system. In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor of a photovoltaicenergy management system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with athermostat. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor provisioned to manage communicationswith an alarm system. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with a smoke alarm. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processorprovisioned to manage communications with a carbon monoxide alarmsystem.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with aremote keyless entry system. In certain embodiments, for example, thenetwork security software may be embodied in one or more non-transitorycomputer-readable media for execution by an embedded processor on aremote keyless entry system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications. Incertain embodiments, for example, the communications may be bankingcommunications. In certain embodiments, for example, the communicationsmay be global payments communications. In certain embodiments, forexample, the communications may be financial crime compliancecommunications. In certain embodiments, for example, the communicationsmay be custodian communications. In certain embodiments, for example,the communications may be fund distribution communications. In certainembodiments, for example, the communications may be transfer agentcommunications. In certain embodiments, for example, the communicationsmay be supply chain finance communications. In certain embodiments, forexample, the communications may be mandate management communications. Incertain embodiments, for example, the communications may be securitiesmarket communications. In certain embodiments, for example, thecommunications may be Treasury market communications. In certainembodiments, for example, the communications may be payment marketcommunications. In certain embodiments, for example, the communicationsmay be investment manager communications. In certain embodiments, forexample, the communications may be Fed wire communications. In certainembodiments, for example, the communications may be investment clientcommunications. In certain embodiments, for example, the communicationsmay be client reporting communications. In certain embodiments, forexample, the communications may be financial reporting communications.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage cable TV communications.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of an elevator control system. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor of an elevator management system. In certain embodiments, forexample, the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processor ofan elevator reporting system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor of a voting machine. In certain embodiments,for example, the network security software may be embodied in one ormore non-transitory computer-readable media for execution by aprocessor, the processor in Ethernet communication with a votingmachine. In certain embodiments, for example, the voting machine may beat least 10 years old. In certain embodiments, for example, the votingmachine may run a Windows XP or a Windows 2000 operating system. Incertain embodiments, for example, the network security software may beinstalled relative to a voting machine to satisfy the requirements of atleast part of a state and/or federal certification (for example anElection Assistance Commission certification) process and/or testingprogram. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor of a voter registration database.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by critical infrastructure, for example criticalinfrastructure of a city, county, and/or nation.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with awater management and/or control facility (for example a water supplymanagement and/or control facility).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with awaste management and/or control facility (for example a hazardous wastemanagement and/or control facility).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications for a lawenforcement activity. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with a law enforcement database. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with a city, county,state, or federal government function.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with aneducational facility. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with an educational facility. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with an informationrepository (for example a library).

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with autility. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor provisioned to manage communicationswith a power generation facility. In certain embodiments, for example,the network security software may be embodied in one or morenon-transitory computer-readable media for execution by a processorprovisioned to manage communications with a nuclear plant. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with a hydroelectricplant.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with avirtual power plant. In certain embodiments, for example, the networksecurity software may be embodied in one or more non-transitorycomputer-readable media for execution by a processor provisioned tomanage communications with an energy arbitrage platform. In certainembodiments, for example, the network security software may be embodiedin one or more non-transitory computer-readable media for execution by aprocessor provisioned to manage communications with a smart grid.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with asmart home. In certain embodiments, for example, the network securitysoftware may be embodied in one or more non-transitory computer-readablemedia for execution by a processor provisioned to manage communicationswith a building automation device. In certain further embodiments, forexample, the building automation device may comprise a temperaturemanagement system, ventilation system, air conditioning system, securitysystem, perimeter security system, home appliance, or a combination oftwo or more of the foregoing.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communication pathways ina building, the communication pathways configured according to X10,Ethernet, RS-485, 6LoWPAN, Bluetooth LE (BLE), ZigBee, Z-Wave, or two ormore of the foregoing protocol.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage packet-basedcommunications with or within an automobile.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with aperimeter security system.

In certain embodiments, for example, the network security software maybe embodied in one or more non-transitory computer-readable media forexecution by a processor provisioned to manage communications with anaccess control component of a security system (for example a perimetersecurity system). In certain embodiments, for example, the accesscontrol component may be a surveillance appliance. In certainembodiments, for example, the access control component may be a videocamera. In certain embodiments, for example, the access controlcomponent may be an alarm. In certain embodiments, for example, theaccess control component may be a notification system.

In certain embodiments, for example, the authorized communication maycomprise transmission of data. During at least a portion of thetransmission, for example, the data or a portion thereof may be presentin a data packet. Unless further specified, the term “data packet” mayrefer to a packaged unit of data, wherein the particular packaging mayvary depending on the location of the unit of data during itstransmission. Transmission of a data packet may refer to end-to-end (forexample application-to-application) communication of data by one or moreport-to-port connections through one or plural network stacks andoptionally over a network, wherein the data packet may include a varietyof protocol headers at different stages of the transmission. In certainembodiments, for example, the term “data packet” may refer to a networkpacket present in the network and the network packet may comprise aframe, a network protocol header (for example an IP header), a transportlayer header (for example a TCP or UDP header), and a payload. Incertain embodiments, for example, the term “data packet” may refer to aunit of data present in a transport layer of the network stack, the datapacket comprising a transport layer header and a payload, but exclusiveof a frame header and a network protocol header. In certain embodiments,for example, the data packet may comprise a unit of data ready forconsumption by an application, the data packet exclusive of a transportlayer header.

In certain embodiments, for example, authorized communication maycomprise communication between an application program on a first node ofthe plural nodes and an application program on a second node of theplural nodes. In certain embodiments, for example, the first node andthe second node may be different nodes. In certain embodiments, forexample, the first node and the second node may be the same node,processor, or computing device. In certain embodiments, for example, thefirst node and the second node may be virtual nodes (for example thefirst node may be a first virtual node on a machine and the second nodemay be a second virtual node on the machine or a different machine).

In certain embodiments, for example, authorized communication maycomprise communication between a first application and a secondapplication wherein the communication passes through one or pluralnetwork security software. In certain embodiments, for example, thesoftware may be a middleware. In certain embodiments, for example, theauthorized communication may pass through one network security software.In certain embodiments, for example, the authorized communication maypass through plural network security software (for example, two networksecurity software, three network security software, or four networksecurity software), wherein at least two (for example two, or forexample each) of the plural network security software are cooperativelyconfigured to authorize the authorized communication. In certainembodiments, for example, a first network security software may beexecute in a kernel of a node and a second network security software mayexecute in a virtual machine on the node, processor, or computingdevice.

In certain embodiments, for example, at least one of the one or pluralnetwork security software may be middleware positioned between the firstapplication and the second application. In certain embodiments, forexample, the authorized communication may comprise a first communicationfrom the first application to first network security software on thefirst node, a second communication from the first network securitysoftware to second network security software on the second node, and athird communication from the second network security software to thesecond application.

In certain embodiments, for example, the first communication maycomprise communication from a port of the first application program to aport of the first network security software by a loopback interface in anetwork stack of the first node, processor, or computing device. Incertain embodiments, for example, the first communication may comprisecommunication from the first application to the first network securitysoftware by a procedure call. In certain embodiments, for example, thefirst communication may comprise a kernel function call (for example akernel read and/or a kernel write call). In certain embodiments, forexample, the second communication may comprise communication over anetwork tunnel having a port of the first network security software anda port of the second network security software as endpoints. In certainembodiments, for example, at least a portion of the second communicationmay be encrypted. In certain embodiments, for example, a metadataportion of the second communication may be encrypted. In certainembodiments, for example, the metadata portion may be encrypted by thefirst network security software and decrypted by the second networksecurity software. In certain embodiments, for example, the payloadportion of the communication may be encrypted. In certain embodiments,for example, the payload portion may be encrypted by the first networksecurity software and decrypted by the second network security software.In certain embodiments, for example, contiguous metadata and payloaddata may be encrypted to form a contiguous segment of encryptedinformation. In certain embodiments, for example, the contiguous segmentmay be encrypted by the first network security software and decrypted bythe second network security software. In certain embodiments, forexample, a metadata portion of the communication may be encrypted by thefirst network security software and decrypted by the second networksecurity software while a payload portion of the communication may beencrypted by a third software present on the first node and decrypted bya fourth software present on the second node, processor, or computingdevice. In certain embodiments, for example, the third software may bethe first application and/or the fourth software may be the secondapplication. In certain embodiments, for example, the third software maybe a security layer software present on the first node (for example SSL,TLS or IPsec software) and/or the fourth software may be a securitylayer software present on the second application. In certainembodiments, for example, the third communication may comprisecommunication from a port of the second network security software to aport of the second application program by a loopback interface of thesecond node, processor, or computing device. In certain embodiments, forexample, the first communication may comprise communication from thesecond network security software to the second application program by aprocedure call. In certain embodiments, for example, the secondcommunication may be transparent to the first application and the secondapplication. In certain embodiments, for example, the first applicationand the second application may not be aware of the second communication.In certain embodiments, for example, the first communication may beunencrypted. In certain embodiments, for example, the secondcommunication may be unencrypted. In certain embodiments, for example,the first communication and/or the second communication may beunencrypted. In certain embodiments, for example, the firstcommunication may be encrypted. In certain embodiments, for example, thesecond communication may be encrypted. In certain embodiments, forexample, the first communication and/or the second communication may beencrypted. In certain embodiments, for example, the first communicationmay result from an attempt by the first application to establish adirect port-to-port connection with the second application. In certainembodiments, for example, the second communication may result from anattempt by the second application to bind a port to a physical interfaceof the second node, processor, or computing device. In certainembodiments, for example, the second communication may result from anattempt by the second application to establish a listening port (forexample a listening port bound to a physical interface) on the secondnode, processor, or computing device. In certain embodiments, forexample, the authorized communication may comprise communication to orfrom one or more ports having a pre-selected port number. In certainembodiments, for example, the authorized communication may comprisecommunication to or from one or more ephemeral ports. In certainembodiments, for example, port endpoints for the first communication maybe ephemeral. In certain embodiments, for example, a source port for thesecond communication may be ephemeral and destination port for thesecond communication may be pre-selected (for example a fixed portnumber specified to network security software responsible forestablishing the second connection). In certain embodiments, forexample, a source port of the third communication may be ephemeral and adestination port of the third communication may be pre-selected. Incertain embodiments, for example, the source and destination ports ofeach of the first communication, second communication, and thirdcommunication may be pre-selected.

In certain embodiments, for example, the first connection may be aconnection according to TCP protocol. In certain embodiments, forexample, the first connection may be a connection according to UDP. Incertain embodiments, for example, the first connection may be aconnection according to a mid-weight UDP protocol.

In certain embodiments, for example, the second connection may be aconnection according to TCP protocol. In certain embodiments, forexample, the second connection may be a connection according to UDPprotocol. In certain embodiments, for example, the second connection maybe a connection according to a mid-weight UDP protocol.

In certain embodiments, for example, the third connection may be aconnection according to TCP protocol. In certain embodiments, forexample, the third connection may be a connection according to UDPprotocol. In certain embodiments, for example, the third connection maybe a connection according to a mid-weight UDP protocol.

In certain embodiments, for example, each of the first connection, thesecond connection, and the third connection may be a connectionaccording to TCP protocol. In certain embodiments, for example, each ofthe first connection, the second connection, and the third connectionmay be a connection according to UDP protocol. In certain embodiments,for example, each of the first connection, the second connection, andthe third connection may be a connection according to a mid-weight UDPprotocol. In certain embodiments, for example, each of the firstconnection, the second connection, and the third connection may beaccording to the same connection protocol. In certain embodiments, forexample, each of the first connection and the second connection may beaccording to the same connection protocol and the third connection maybe according to a different communication protocol. In certainembodiments, for example, each of the first connection, the secondconnection, and the third connection may be according to differentcommunication protocol.

In certain embodiments, for example, the authorized communication maycomprise communication over an encrypted tunnel having, as endpoints, aport of the first application and a port of the second application. Incertain embodiments, for example, the first application and the secondapplication may each comprise one or plural network security modules forauthorized communication between the applications. In certainembodiments, for example, the encrypted tunnel may be authorized basedon communication between the first node and a third node, the third nodehosting network security middleware, and further based on communicationbetween the second node and a fourth node, the fourth node hostingnetwork security middleware. In certain embodiments, for example, thethird node and the fourth node may be the same node (wherein therespective network security middleware may be the same or different). Incertain embodiments, for example, the third node and the fourth node maybe different nodes. In certain embodiments, for example, the third nodeand the first node may be the same node while the fourth node and thesecond node may be different nodes. In certain embodiments, for example,the first node, third node, and fourth node may be the same node,processor, or computing device. In certain embodiments, for example, thesecond node, third node, and fourth node may be the same node,processor, or computing device.

In certain embodiments, for example, the authorized communication maypass through a third node hosting network security software, the thirdnode disposed, for purposes of the communication, between the first nodeand the second node, processor, or computing device. In certainembodiments, for example, the authorized communication may comprise anetwork tunnel between the first node and the third node (for example anetwork tunnel such as an encrypted network tunnel having the firstapplication (or a shim in the network stack application programminginterface) and network security software present on the third node asendpoints and a different network tunnel between the third node and thesecond node, processor, or computing device.

In certain embodiments, for example, a first node of the plural nodesand a second node of the plural nodes may form a secure connection. Incertain embodiments, for example, the secure connection may comprise anetwork tunnel. In certain embodiments, for example, the network tunnelmay be a packet network tunnel. In certain embodiments, for example, thenetwork tunnel may be formed according to an encrypted communicationprotocol, whereby each data packet transmitted through the networktunnel may be encrypted at a first endpoint of the network tunnelpresent on the first node, passed through the network tunnel, and thendecrypted at a second endpoint of the network tunnel present on thesecond node, processor, or computing device. In certain embodiments, forexample, the encrypted communication protocol may be implemented in theOSI transport layer. In certain further embodiments, for example, thetransport layer encrypted communication protocol may be selected fromthe group consisting of Secure Socket Layer (SSL) protocol, TransportLayer Security (TLS), Secure Shell (SSH) protocol, and a combination oftwo or more of the foregoing protocols. In certain embodiments, forexample, the encrypted communication protocol may be implemented in theOSI network layer or data link layer. In certain further embodiments,for example, the encrypted communication protocol may be selected fromthe group consisting of IPsec, Layer 2 Tunneling Protocol (L2TP) overIPsec, or Ethernet over IPsec.

In certain embodiments, for example, encryption and decryption may usean encryption key wherein the key is established by executing a keyexchange algorithm between software executing on the first node andsoftware executing on the second node, processor, or computing device.In certain embodiments, for example, the key exchange algorithm may beselected from the group consisting of Rivest, Shamir, Adleman (RSA),Diffie-Hellman (DH), Diffie-Hellman Ephemeral (DHE), Elliptic-CurveDiffie-Hellman (ECDH), Kerberos (KRB5), Secure Remote Password Protocol(SRP), Pre-shared key (PSK), Digital Signature Algorithm (DSA), EllipticCurve Digital Signature Algorithm (ECDSA), and Digital SignatureStandard (DSS).

In certain embodiments, for example, the encryption and decryption maybe performed using a symmetric encryption algorithm. In certainembodiments, for example, the symmetric encryption algorithm may beselected from the group consisting of Triple Data Encryption Algorithm(3DES), Advanced Encryption Standard (AES), Camelia (Block cipherdeveloped by Mitsubishi and NTT), Data Encryption Standard (DES),Fortezza (Security token based cipher), GOST (Block cipher developed inUSSR), International Data Encryption Algorithm (IDEA), Rivest Cipher 2(RC2), Rivest Cipher 4 (RC4), and SEED (Block cipher developed by KoreanInformation Security Agency).

In certain embodiments, for example, each data packet passed through thenetwork tunnel may contain a message authentication code, comprising ahashed value for a portion of the data packet. In certain embodiments,for example, the hashed value may be obtained by passing the portion ofthe data packet through a hashing algorithm. In certain embodiments, forexample, the hashing algorithm may be selected from the group consistingof BLAKE-256, BLAKE-512, BLAKE2s, BLAKE2b, Elliptic Cuve Only Hash(ECOH), the Fast Syndrome-based (FSB) hash, GOST, Grøstl, HAS-160,HAVAL, JH, the Message Digent-2 (MD2) algorithm, MD4, MD5, MD6,RadioGatún, the RACE Integrity Primitives Evaluation Message Digest(RIPEMD), RIPEMD-128, RIPEMD-160, RIPEMD-320, the Secure HashAlgorithm-1 (SHA-1), SHA-2, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3,Skein, Snefru, Spectral Hash, Streebog, SWIFFT, Tiger, Whirlpool-0,Whirlpool-T, and Whirlpool.

In certain embodiments, for example, authorized communication maycomprise transmission of metadata-containing data packets over a networktunnel. In certain embodiments, for example, the metadata-containingpackets may conform to Internet Protocol version 4 (IPv4). In certainembodiments, for example, the metadata-containing packets may conform toInternet Protocol version 6 (IPv6). In certain embodiments, for example,the metadata may be positioned at a predetermined location (for examplestart at a predetermined location) in a data packet. In certainembodiments, for example, the metadata may be positioned after (forexample immediately after, after a predetermined buffer, or at apredetermined offset from) a transport layer header of the data packet.In certain embodiments, for example, the metadata may be positionedbetween the transport layer header and payload data of the networkpacket.

In certain embodiments, for example, the metadata may be encryptedaccording to an encryption scheme of the network tunnel (for example oneof the encryption schemes described herein). In certain embodiments, forexample, the metadata may be encrypted with data packet payload data toform single ciphertext. In certain embodiments, for example, themetadata be encrypted separately from data packet payload data (or themetadata may be encrypted and payload data may not be encrypted). Incertain embodiments, for example, the metadata be encrypted by a firstnetwork security software and data packet payload data may be encryptedby a second network security software.

In certain embodiments, for example, the metadata may be built andinserted into a data packet by a first network security software presenton a first node of the plural nodes. In certain embodiments, forexample, the first node may coincide with a source node (ornode-of-origin) for the data packet (for example the first node may be anode containing first application software transmitting data containedin a payload of the data packet such as from program memory of the firstapplication software). In certain embodiments, for example, the firstnode may be a waypoint node (or intermediate node) disposed between asource node for the data packet and a final destination node for thedata packet. In certain embodiments, for example, the first node may bedirectly connected by an Ethernet connection to a source node for thedata packet. In certain embodiments, for example, the second node may bedirectly connected by an Ethernet connection to a final destination nodefor the data packet.

In certain embodiments, for example, the metadata may be encrypted bysoftware present in an encryption layer (for example TLS, SSL, orIPsec). In certain embodiments, for example, the metadata may beencrypted by an encryption module, subroutine, function, or the like. Incertain embodiments, for example, the metadata may be encrypted using asingle-use cryptographic key (for example an ECDH-derived key which isrotated with each packet transmission through the network tunnel),whereby the same metadata would appear different in different datapackets due to use of a different cryptographic key in each instance. Incertain embodiments, for example, the first network security softwaremay comprise the encryption layer software. In certain embodiments, forexample, the first network security software may invoke (for examplecall) the encryption layer software. In certain embodiments, forexample, the first network security software may invoke the encryptionmodule, subroutine, or function. In certain embodiments, for example,the encryption layer software or encryption module may be present in anOSI application layer of the first node, processor, or computing device.In certain embodiments, for example, the encryption layer software orencryption module may be present in a kernel layer (for example a kernelportion of a network stack) of the first node, processor, or computingdevice.

In certain embodiments, for example, the metadata may be extracted andparsed from a data packet by a second network security software presenton a second node of the plural nodes. In certain embodiments, forexample, the second node may coincide with a final destination node forthe data packet (for example a final destination node comprising asecond application configured to receive payload data present in thedata packet such as in program memory of the second application). Incertain embodiments, for example, the second node may be a waypoint node(or intermediate node) disposed between a source node for the datapacket and a final destination node for the data packet. In certainembodiments, for example, the second node may be directly connected byan Ethernet connection to the source node for the data packet. Incertain embodiments, for example, the second node may be directlyconnected by an Ethernet connection to the final destination node forthe data packet.

In certain embodiments, for example, the metadata extracted from thedata packet may be encrypted (as discussed herein). In certainembodiments, for example, the metadata may be decrypted by encryptionlayer software (for example TLS, SSL, or IPsec). In certain embodiments,for example, the metadata may be decrypted by an encryption module,subroutine, function, or the like (collectively referred to as “module”for purposes herein). In certain embodiments, for example, thedecrypting may be performed prior to the parsing. In certainembodiments, for example, the decrypting may be performed subsequent tothe parsing. In certain embodiments, for example, the second networksecurity software may comprise the encryption layer software. In certainembodiments, for example, the second network security software mayinvoke (for example call) the encryption layer software. In certainembodiments, for example, the second network security software mayinvoke the encryption module. In certain embodiments, for example, theencryption layer software or encryption module may be present in an OSIapplication layer of the second node, processor, or computing device. Incertain embodiments, for example, the encryption layer software orencryption module may be present in a kernel layer (for example a kernelportion of a network stack) of the second node, processor, or computingdevice.

In certain embodiments, for example, the metadata may comprise one orplural parameters. In certain embodiments, for example, the one orplural parameters may comprise a packet type identification code. Incertain embodiments, for example, the packet type identification codemay be interpreted by network security software to indicate the datapacket is configured to be used for negotiation (for exampleauthentication and/or authorization) of a network tunnel. In certainembodiments, for example, the packet type identification code may beinterpreted by network security software to indicate the data packet isconfigured to be transmitted through an existing network tunnel (forexample an authenticated and/or authorized network tunnel). In certainembodiments, for example, the packet type identification code may beinterpreted by network security software to indicate the data packetcontains application payload data. In certain embodiments, for example,the packet type identification code may be interpreted by networksecurity software to determine a connection state for a network tunnel.In certain embodiments, for example, the packet type identification codemay be positioned at a predetermined location (for example start at apredetermined location) in the data packet. In certain embodiments, forexample, the packet type identification code may be positioned after(for example immediately after, after a predetermined buffer, or at apredetermined offset from) a transport layer header of the data packet.In certain embodiments, for example, the packet type identification codemay occupy a predetermined location of the metadata. In certainembodiments, for example, the packet type identification code may bepositioned at one end (for example at the beginning or the end closestto a transport layer header of the data packet) of the metadata. Incertain embodiments, for example, the packet type identification code(prior to encryption) may be an integer in the range of 0-2³² (i.e.,0-4,294,967,295).

In certain embodiments, for example, the one or plural parameters maycomprise one or plural node descriptors. In certain embodiments, forexample, the one or plural parameters may be a node descriptor for asource node of the data packet. In certain embodiments, for example, theone or plural parameters may be a node descriptor for a source node ofpayload data (for example payload data that will be transmitted in asubsequent data packet by an application resident on the source nodeidentified by the node descriptor). In certain embodiments, for example,the one or plural parameters may be a node descriptor for a destinationnode of payload data (for example payload data that will be transmittedin a subsequent data packet to an application resident on thedestination node identified by the node descriptor). In certainembodiments, for example, the one or plural node descriptors may benonpublic. In certain embodiments, for example, the one or plural nodedescriptors may be a shared secret among at least two of the pluralnodes. In certain embodiments, for example, the one or plural nodedescriptors may be a shared secret among less than all of the pluralnodes. In certain embodiments, for example, the one or plural nodedescriptors may have a size of at least 64 bits, for example at least128 bits, at least 256 bits, at least 512 bits, at least 1024 bits, atleast 2048 bits, at least 4096 bits, at least 8192 bits, at least 16384bits, at least 32768 bits, or the one or plural node descriptors mayhave a size of at least 65536 bits. In certain embodiments, for example,the one or plural node descriptors may have a size of 64 bits, 128 bits,256 bits, 512 bits, 1024 bits, 2048 bits, 4096 bits, 8192 bits, 16384bits, 32768 bits, or the one or plural node descriptors may have a sizeof 65536 bits. In certain embodiments, for example, the one or pluralnode descriptors may have a size of less than 8192 bits, for exampleless than 4096 bits, less than 2048 bits, less than 1024 bits, or theone or plural node descriptors may have a size of less than 256 bits. Incertain embodiments, for example, a portion of the one or plural nodedescriptors may comprise a company identifier. In certain embodiments,for example, a portion of the one or plural node descriptors maycomprise a device-type identifier. In certain embodiments for example, aportion of the one or plural node descriptors may comprise a randomnumber produced by a random number generator. In certain embodiments,for example, the random number may comprise at least 90% of the bits ofthe one or plural node descriptors, for example at least 95%, at least96%, at least 97%, at least 98%, at least 98.5%, at least 99%, at least99.5%, at least 99.9% or the random number may comprise at least 99.9%of the bits of the one or plural node descriptors. In certainembodiments, for example, the random number may comprise less than 99%of the bits of the one or plural node descriptors, for example less than98%, or the random number may comprise less than 95% of the bits of theone or plural node descriptors. In certain embodiments, for example, therandom number may comprise in the range of 95-99.9% of the bits of theone or plural node descriptors, for example in the range of 98-99% ofthe bits of the one or plural node descriptors. In certain embodiments,for example, the sum of digits of the one or plural node descriptors maybe a prime number. In certain embodiments, for example, the one orplural node descriptors may accompany an application data payload in thedata packet. In certain embodiments, for example, the one or plural nodedescriptors may be present in a data packet that does not contain anapplication data payload (for example a data packet used for negotiationof a network tunnel prior to the transmission of application data). Incertain embodiments, for example, the metadata may comprise a packettype identification code and the one or plural node descriptors. Incertain embodiments, for example, the one or plural node descriptors maybe positioned at a predetermined location (for example start at apredetermined location) in the data packet. In certain embodiments, forexample, the one or plural node descriptors may be positioned after (forexample immediately after, after a predetermined buffer, or at apredetermined offset from) a transport layer header of the data packet.In certain embodiments, for example, the one or plural node descriptorsmay occupy a predetermined location of the metadata. In certainembodiments, for example, the one or plural node descriptors may bepositioned after a packet type identification code at one end (forexample at the beginning or the end closest to a transport layer headerof the data packet) of the metadata.

In certain embodiments, for example, the one or plural parameters maycomprise one or plural parameters for payload data. In certainembodiments, for example, the one or plural payload data parameters maycomprise an application identification code. In certain embodiments, forexample, the application identification code may have a length of atleast 8 bits, for example at least 16 bits, at least 32 bits, or atleast 64 bits. In certain embodiments, for example, the applicationidentification code may have a length of no more than 64 bits, forexample no more than 32 bits, no more than 16 bits, or no more than 8bits. In certain embodiments, for example, the applicationidentification code may have a length in the range of 8-64 bits, forexample in the range of 8-32 bits, or in the range of 8-16 bits. Incertain embodiments, for example, the one or plural payload dataparameters may comprise an application user identification code. Incertain embodiments, for example, the application user identificationcode may have a length of at least 8 bits, for example at least 16 bits,at least 32 bits, or at least 64 bits. In certain embodiments, forexample, the application user identification code may have a length ofno more than 64 bits, for example no more than 32 bits, no more than 16bits, or no more than 8 bits. In certain embodiments, for example, theapplication user identification code may have a length in the range of8-64 bits, for example in the range of 8-32 bits, or in the range of8-16 bits. In certain embodiments, for example, the applicationidentification code may be shorter than the application useridentification code. In certain embodiments, for example, theapplication user identification code may be at least twice as long asthe application identification code. In certain embodiments, forexample, the one or plural payload data parameters may comprise anapplication identification code for a source application for the payloaddata. In certain embodiments, for example, the one or plural payloaddata parameters may comprise an application user identification code fora user of the source application for the payload data. In certainembodiments, for example, the one or plural payload data parameters maycomprise an application identification code for a destinationapplication for the payload data. In certain embodiments, for example,the combined length of the application identification code and theapplication user identification code may be least 8 bits, for example atleast 16 bits, at least 32 bits, or at least 64 bits. In certainembodiments, for example, the combined length of the applicationidentification code and the application user identification code may beno more than 128 bits, for example no more than 64 bits, no more than 48bits, no more than 32 bits, no more than 16 bits, or no more than 8bits. In certain embodiments, for example, the combined length of theapplication identification code and the application user identificationcode may have a length in the range of 8-64 bits, for example in therange of 24-64 bits, or in the range of 36-64 bits. In certainembodiments, for example, the one or plural payload data parameters maycomprise an application user identification code for a user of thedestination application for the payload data. In certain embodiments,for example, the one or plural payload data parameters may comprise adata type descriptor. In certain embodiments, for example, the data typedescriptor may comprise a data type protocol. In certain embodiments,for example, the data type descriptor may comprise a data topic. Incertain embodiments, for example, the data type descriptor may comprisea file size (for example a total size of a file being transmitted by oneor more payload data). In certain embodiments, for example, the datatype descriptor may comprise a maximum file size (for example a maximumsize of a file being transmitted by one or more payload data). Incertain embodiments, for example, the data type descriptor may comprisea file name. In certain embodiments, for example, the data typedescriptor may comprise a command type. In certain embodiments, forexample, the command type may be selected from the group consisting ofSQLread, SQLwrite, AND/OR, ALTER TABLE, AS (alias), BETWEEN, CREATEDATABASE, CREATE TABLE, CREATE INDEX, CREATE VIEW, DELETE, DROPDATABASE, DROP INDEX, DROP TABLE, EXISTS, GROUP BY, HAVING, IN, INSERTINTO, INNER JOIN, LEFT JOIN, RIGHT JOIN, FULL JOIN, LIKE, ORDER BY,SELECT, SELECT*, SELECT DISTINCT, SELECT INTO, SELECT TOP, TRUNCATETABLE, UNION, UNION ALL, UPDATE, WHERE, and a combination of two or moreof the foregoing command types. In certain embodiments, for example, thedata type descriptor may comprise a date/time (for example atransmission date/time or a deadline). In certain embodiments, forexample, the data type descriptor may comprise a time-to-live of thepayload data. In certain embodiments, for example, the data typedescriptor may have a size of at least 64 bits, for example at least 128bits, at least 256 bits, at least 512 bits, at least 1024 bits, at least2048 bits, at least 4096 bits, at least 8192 bits, at least 16384 bits,at least 32768 bits, or the data type descriptor may have a size of atleast 65536 bits. In certain embodiments, for example, the data typedescriptor may have a size of less than 8192 bits, for example less than4096 bits, less than 2048 bits, less than 1024 bits, or the data typedescriptor may have a size of less than 256 bits.

In certain embodiments, for example, the metadata may comprise a packettype identification code and the one or plural payload data parameters.In certain embodiments, for example, the one or plural payload dataparameters may be positioned in a data packet at a location where apacket type identification code would be present (for example, the datapacket may contain the one or plural payload data parameters instead ofthe packet type identification code). In certain embodiments, forexample, the one or plural payload data parameters may be positioned ata predetermined location (for example start at a predetermined location)in the data packet. In certain embodiments, for example, the one orplural payload data parameters may be positioned after (for exampleimmediately after, after a predetermined buffer, or at a predeterminedoffset from) a transport layer header of the data packet. In certainembodiments, for example, the one or plural payload data parameters mayoccupy a predetermined location of the metadata. In certain embodiments,for example, the one or plural payload data parameters may be positionedafter a packet type identification code at one end (for example at thebeginning or the end closest to a transport layer header of the datapacket) of the metadata.

In certain embodiments, for example, the authorized communication maycomprise transmission of a network tunnel connection request packet (forexample a request packet arising from a client connection request suchas a request transmitted by a network security software), the requestpacket comprising encrypted metadata containing a packet typeidentification code, the packet type identification code a connectionrequest identification code. In certain embodiments, for example, theconnection request packet may conform to a protocol. In certain furtherembodiments, for example, the protocol may be UDP or TCP.

In certain embodiments, for example, the authorized communication maycomprise transmission of a network tunnel connection request replypacket (for example a request packet from a server such as a reply froma network security software responding to a client connection requestsuch as a request transmitted by a different network security software),the request reply packet comprising encrypted metadata containing apacket type identification code, the packet type identification codecomprising a connection request reply identification code (for example acode having a different value from the connection request identificationcode). In certain embodiments, for example, the connection request replypacket may conform to a protocol. In certain further embodiments, forexample, the protocol may be UDP or TCP.

In certain embodiments, for example, the authorized communication maycomprise transmission of a node authentication and authorization packet.In certain embodiments, for example, the node authentication andauthorization packet may comprise encrypted metadata containing a nodevalidation packet type indicator and a node descriptor. In certainembodiments, for example, establishing authorized payload datacommunication may comprise: (a) transmitting a first node authenticationand authorization packet from a first node network security softwareresident on a first node to second network security software present ona second node, followed by (b) transmitting a second node authenticationand authorization packet from the second network security software tothe first network security software.

In certain embodiments, for example, the authorized communication maycomprise transmission of a payload data authorization and authenticationpacket. In certain embodiments, for example, the payload dataauthentication and authorization packet may comprise encrypted metadatacontaining a payload data validation packet type indicator and a payloaddata parameter. In certain embodiments, for example, the payload dataparameter may comprise an application identification code for anapplication resident on a node transmitting the payload dataauthorization and authentication packet, an application useridentification code for a user of the resident application, and a datatype or data protocol for payload data to be transmitted by a networktunnel configured according to the payload data authorization andauthentication packet. In certain embodiments, for example, establishingauthorized payload data communication may comprise: (a) transmitting afirst payload data authentication and authorization packet from a firstnode network security software resident on a first node to secondnetwork security software present on a second node, followed by (b)transmitting a second payload data authentication and authorizationpacket from the second network security software to the first networksecurity software.

In certain embodiments, for example, authorized communication maycomprise transmission of a payload data packet. In certain embodiments,for example, the payload data packet may comprise encrypted payload dataauthentication and authorization metadata and payload data. In certainembodiments, for example, the metadata may be exclusive of a packet typeidentification code.

In certain embodiments, for example, authorized communicationscomprising transfer of data packets across the network may comprisecommunications between a first node of the plural nodes and a furthernode (for example a second node) of the plural nodes. In certainembodiments, for example, establishment and coordination of theauthorized communications may be performed by a first network securitysoftware cooperatively configured with a second network securitysoftware (for example a first network security software resident on thefirst node and a second network security software resident on the secondnode). In certain further embodiments, for example, the first networksecurity software and the second network security software may bedifferent copies of the computer-readable program code (for examplecopies obtained from different copies of the at least one component).

In certain embodiments, for example, the first network security softwaremay have access to a first preconfigured list, for example a firstpreconfigured list stored in non-transitory storage media present on thesame node as the first network security software, or otherwiseaccessible to the first network security software. In certainembodiments, for example, the second network security software may haveaccess to a second preconfigured list, for example a secondpreconfigured list stored in non-transitory storage media present on thesame node as the second network security software, or otherwiseaccessible to the second network security software. In certainembodiments, for example, the first preconfigured list and the secondpreconfigured list may be aligned to enable the first network securitysoftware and the second security software to cooperatively negotiateconnections for authorized communications. In certain embodiments, forexample, the first preconfigured list and the second preconfigured listmay together exclusively define the authorized communications permittedbetween an application (for example a user-application) on the firstnode and an application (for example a user-application) on the secondnode, or may exclusively define the authorized port-to-portcommunications. In certain embodiments, for example, the first networksecurity software may terminate any attempt by an application residenton the first node to transmit packet data to the second node, or maydrop (or quarantine) any packets received at the first node sent fromthe second node, that are not in conformance with the firstpreconfigured list. Similarly, in certain embodiments, for example, thesecond network security software may terminate any attempt by anapplication resident on the second node to transmit packet data to thefirst node, or may drop any packets received at the second node sentfrom the first node, that are not in conformance with the secondpreconfigured list. In certain further embodiments, for example, thenon-conformance may comprise failure of a portion of the destinationport numbers and/or the metadata to match expected values, theexpectation regarding the expected values based on parameters present inthe second preconfigured list.

In certain embodiments, for example, each of the first preconfiguredlist and/or a further (or second) preconfigured list may comprise aseries of records, each record in the form of an n-tuple. In certainembodiments, for example, the record length may be not fixed, i.e., itmay vary from record to record. In certain embodiments, for example,each of the first preconfigured list and/or the second preconfiguredlist may be a binary file. In certain embodiments, for example, each ofthe first preconfigured list and/or the second preconfigured list may beencrypted. In certain embodiments, for example, each of the firstpreconfigured list and/or the second preconfigured list may beread-only. In certain embodiments, for example, the first preconfiguredlist may be read only by a single first network security software moduleof the first network security software having access (for example havingsole access) to a first preconfigured list decryption key. In certainembodiments, for example, the first preconfigured list decryption keymay be stored in a memory location (for example a volatile memorylocation) known only to the first network security software module. Incertain embodiments, for example, the memory location may be specific,unique to, and/or set during compilation of the first network securitysoftware module (i.e., recompilation of the first network securitysoftware module would result in a different memory location). In certainembodiments, for example, the first preconfigured list decryption keymay be specific to the compilation of the first network securitysoftware module. In certain embodiments, for example, the secondpreconfigured list may be read only by a single second network securitysoftware module of the second network security software having access(for example having sole access) to a second preconfigured listdecryption key. In certain embodiments, for example, the secondpreconfigured list decryption key may be stored in a memory location(for example a volatile memory location) known only to the secondnetwork security software module. In certain embodiments, for example,the memory location may be specific, unique to, and/or set duringcompilation of the second network security software module (i.e.,recompilation of the second network security software module wouldresult in a different memory location). In certain embodiments, forexample, the second preconfigured list decryption key may be specific,unique to, and/or set during compilation of the second network securitysoftware module.

In certain embodiments, for example, each record of the each of thefirst preconfigured list and a further (for example, the second)preconfigured list may be interpretable by the first network securitysoftware and the second network security software, respectively, to forman authorized connection for authorized communication. In certainembodiments, for example, the first preconfigured list may contain afirst record interpretable by the first network security software andthe second preconfigured list may contain a second record interpretableby the second network security software for forming an authorizedconnection for authorized communication between the first node and thesecond node, processor, or computing device.

In certain embodiments, for example, each of the first record and afurther record (for example, the second record) may contain a nodeidentifier or a node identification code for the source node (the sourcenode may be the first node or the second node) from which packet datawill be transmitted in the authorized communication. In certainembodiments, for example, each of the first record and the second recordmay contain a node identification code for the destination node (thedestination node may be the first node or the second node different fromthe source node) to which packet data will be transmitted in theauthorized communication. In certain embodiments, for example, the firstnetwork security software and the second network security software mayeach exchange with one another the node identification code thatcorresponds to their status (source or destination). In certain furtherembodiments, for example, the mutual exchange may occur over anencrypted tunnel having the first network security software and thesecond network security software as endpoints. In certain furtherembodiments, for example, the exchanged node identification codes may bevalidated by the receiving network security software by reference to therespective first record or second record. In certain embodiments, forexample, the mutual validating may be used to partially authorize theaforementioned encrypted tunnel. In certain embodiments, for example,each of the node identification codes may have a size of at least 64bits, for example at least 128 bits, at least 256 bits, at least 512bits, at least 1024 bits, at least 2048 bits, at least 4096 bits, atleast 8192 bits, at least 16384 bits, at least 32768 bits, or each ofthe node identification codes may have a size of at least 65536 bits. Incertain embodiments, for example, each of the node identification codesmay have a size of 64 bits, 128 bits, 256 bits, 512 bits, 1024 bits,2048 bits, 4096 bits, 8192 bits, 16384 bits, 32768 bits, or each of thenode identification codes may have a size of 65536 bits. In certainembodiments, for example, each of the node identification codes may havea size of less than 8192 bits, for example less than 4096 bits, lessthan 2048 bits, less than 1024 bits, or each of the node identificationcodes may have a size of less than 256 bits. In certain embodiments, forexample, a portion of each of the node identification codes may comprisea company identifier. In certain embodiments, for example, a portion ofeach of the node identification codes may comprise a device-typeidentifier. In certain embodiments for example, a portion of each of thenode identification codes may comprise a random number produced by arandom number generator. In certain embodiments, for example, the randomnumber may comprise at least 90% of the bits of each of the nodeidentification codes, for example at least 95%, at least 96%, at least97%, at least 98%, at least 98.5%, at least 99%, at least 99.5%, atleast 99.9% or the random number may comprise at least 99.9% of the bitsof each of the node identification codes. In certain embodiments, forexample, the random number may comprise less than 99% of the bits ofeach of the node identification codes, for example less than 98%, or therandom number may comprise less than 95% of the bits of each of the nodeidentification codes. In certain embodiments, for example, the randomnumber may comprise in the range of 95-99.9% of the bits of each of thenode identification codes, for example in the range of 98-99% of thebits of each of the node identification codes. In certain embodiments,for example, the sum of digits of each of the node identification codesmay be a prime number.

In certain embodiments, for example, each of the first record and thesecond record may contain a source universal application identifier forthe source application program (corresponding to the first applicationor the second application) generating the packet data in an authorizedcommunication. In certain embodiments, for example, the applicationidentifier and the user for the application may correspond to or bebased on values obtained by a process status check command. Similarly,in certain embodiments, for example, each of the first record and thesecond record may contain a destination universal application identifierfor the destination application program (corresponding to the firstapplication or the second application) receiving the packet data in anauthorized communication. In certain embodiments, for example, thesource universal application identifier may comprise an applicationidentifier and a user for the application. In certain embodiments, forexample, the first network security software and the second networksecurity software may each exchange with one another the universalapplication identifier that corresponds to their status (source ordestination). In certain further embodiments, for example, the mutualexchange may occur over an encrypted tunnel having the first networksecurity software and the second network security software as endpoints.In certain further embodiments, for example, the exchanged universalapplication identifiers may be validated by the receiving networksecurity software by reference to the respective first record or secondrecord. In certain embodiments, for example, the mutual validating maybe used to partially authorize the aforementioned encrypted tunnel. Incertain embodiments, for example, a source universal applicationidentifier may be included in a data packet and validated against therespective record (the first record or the second record) of thedestination node in order to authenticate and authorize the data packet.In certain embodiments, for example, each of the source and destinationapplication identifiers may have a length of at least 8 bits, forexample at least 16 bits, at least 32 bits, or at least 64 bits. Incertain embodiments, for example, the application identifier may have alength of no more than 64 bits, for example no more than 32 bits, nomore than 16 bits, or no more than 8 bits. In certain embodiments, forexample, the application identifier may have a length in the range of8-64 bits, for example in the range of 8-32 bits, or in the range of8-16 bits. In certain embodiments, for example, the application user mayhave a length of at least 8 bits, for example at least 16 bits, at least32 bits, or at least 64 bits. In certain embodiments, for example, theeach of the source and destination application user may have a length ofno more than 64 bits, for example no more than 32 bits, no more than 16bits, or no more than 8 bits. In certain embodiments, for example, theapplication user may have a length in the range of 8-64 bits, forexample in the range of 8-32 bits, or in the range of 8-16 bits. Incertain embodiments, for example, the universal application identifiermay be least 8 bits, for example at least 16 bits, at least 32 bits, orat least 64 bits. In certain embodiments, for example, the each of thesource and destination universal application identifier may be no morethan 128 bits, for example no more than 64 bits, no more than 48 bits,no more than 32 bits, no more than 16 bits, or no more than 8 bits. Incertain embodiments, for example, the universal application identifiermay have a length in the range of 8-64 bits, for example in the range of24-64 bits, or in the range of 36-64 bits.

In certain embodiments, for example, each of the first record and thesecond record may contain a code for a network interface controller ofthe source node (the source node may be the first node or the secondnode) from which packet data will be transmitted in the authorizedcommunication. In certain embodiments, for example, each of the firstrecord and the second record may contain a code for the networkinterface controller for the destination node (the destination node maybe the first node or the second node different from the source node) towhich packet data will be transmitted in the authorized communication.In certain embodiments, for example, each of the codes may be processedto obtain corresponding network addresses (for example IP addresses). Incertain embodiments, for example, the corresponding network addressesmay define an authorized source network address and an authorizeddestination network address in one or plural packet headers. In certainembodiments, for example, each of the network interface controller codesmay have a size of at least 64 bits, for example at least 128 bits, atleast 256 bits, at least 512 bits, at least 1024 bits, at least 2048bits, at least 4096 bits, at least 8192 bits, at least 16384 bits, atleast 32768 bits, or each of the network interface controller codes mayhave a size of at least 65536 bits. In certain embodiments, for example,each of the network interface controller codes may have a size of 64bits, 128 bits, 256 bits, 512 bits, 1024 bits, 2048 bits, 4096 bits,8192 bits, 16384 bits, 32768 bits, or each of the network interfacecontroller codes may have a size of 65536 bits. In certain embodiments,for example, each of the network interface controller codes may have asize of less than 8192 bits, for example less than 4096 bits, less than2048 bits, less than 1024 bits, or each of the network interfacecontroller codes may have a size of less than 256 bits.

In certain embodiments, for example, each of the first record and thesecond record may contain a destination port number associated with thedestination application (the first application or the secondapplication). In certain embodiments, for example, the destination portnumber associated with the destination application may be used to directpacket data from the network security software resident on thedestination node (the destination node may be the first node or thesecond node and the network security software may be the first networksecurity software or the second network security software) to thedestination application. In certain embodiments, for example, thedestination port number associated with the destination application maybe used as an index by the network security software resident on thesource node (the source node may be the first node or the second nodedifferent from the destination node and the network security softwaremay be the first network security software or the second networksecurity software) to identify the appropriate record in thecorresponding first preconfigured list.

In certain embodiments, for example, each of the first record and thesecond record may contain a destination port number (or an identifierassociated with the destination port number) associated with the networksecurity software resident on the destination node (the destination nodemay be the first node or the second node and the network securitysoftware may be the first network security software or the secondnetwork security software). In certain embodiments, for example, thedestination port number associated with the network security softwareresident on the destination node may be used by the network securitysoftware resident on the source node as a destination address for anetwork packet. In certain embodiments, for example, the destinationport number associated with the network security software resident onthe destination node may be used as an endpoint for an encryptedcommunication pathway (for example an encrypted network tunnel) betweenthe first network security software and the second network securitysoftware.

In certain embodiments, for example, each of the first record and thesecond record may comprise one or plural data description fields (ordata description values or data description identifiers). In certainembodiments, for example, one or plural data description fields maydesignate or be an identifier for a data protocol. In certainembodiments, for example, the data protocol may be a machine-to-machineprotocol. In certain embodiments, for example, the data protocol may bean IoT protocol. In certain embodiments, for example, the data protocolmay comprise an MQ Telemetry Transport (MQTT) protocol. In certainembodiments, for example, the data protocol may comprise an AdvancedMessage Queuing Protocol (AMQP). In certain embodiments, for example,the data protocol may comprise a Simple/Streaming Text OrientedMessaging Protocol (STOMP). In certain embodiments, for example, thedata protocol may comprise a Data Distribution Service DDS. In certainembodiments, for example, the data protocol may comprise a ConstrainedApplication Protocol (CoAP). In certain embodiments, for example, thedata protocol may comprise an Open Platform Communications UnifiedArchitecture (OPC UA) protocol. In certain embodiments, for example, thedata protocol may comprise a Java Message Service (JMS) protocol. Incertain embodiments, for example, the data protocol may comprise aneXtensible Messaging and Presence Protocol (XMPP). In certainembodiments, for example, the data protocol may comprise aRepresentational State Transfer (REST) protocol. In certain embodiments,for example, the data protocol may comprise an Open Mobile AllianceLight Weight Machine-to-Machine (OMA LWM2M) protocol. In certainembodiments, for example, the data protocol may comprise a JavaScriptObject Notation (JSON) protocol. In certain embodiments, for example,the data protocol may comprise a Simple Network Management Protocol(SNMP). In certain embodiments, for example, the data protocol maycomprise a protocol conforming to Technical Report 069: CPE WANManagement Protocol (TR-069—CWMP). In certain embodiments, for example,the data protocol may comprise Hypertext Transfer Protocol (HTTP). Incertain embodiments, for example, the data protocol may conform to theAlljoyn framework. In certain embodiments, for example, the dataprotocol may comprise Modbus protocol (for example Modbus over TCP andUDP). In certain embodiments, for example, the data protocol may conformto VITA 49 radio transport packet specification. In certain embodiments,for example, the data protocol may conform to Edgent protocol. Incertain embodiments, for example, the data protocol may comprise a filetransfer protocol. In certain embodiments, for example, the dataprotocol may comprise a domain name server protocol. In certainembodiments, for example, the data protocol may comprise an InternetControl Message Protocol (ICMP). In certain embodiments, for example,the data protocol may comprise a structured query language protocol. Incertain embodiments, for example, the data protocol may comprise apublish-subscribe messaging pattern protocol. In certain embodiments,for example, the data protocol may comprise a data distribution serviceprotocol. In certain embodiments, for example, the data protocol maycomprise a data structure identifier. In certain embodiments, forexample, the data protocol may comprise a data topic. In certainembodiments, for example, the data protocol may comprise a data type(for example “string”, “integer”, “unsigned integer”, “Boolean”,“floating point”, “double precision”, etc.). In certain embodiments, forexample, the data protocol may indicate an allowed range (for example acontinuous range or a list of allowed values) of values for a datapayload. In certain embodiments, for example, the data protocol maycomprise a data definition identifier.

In certain embodiments, for example, the one or plural data descriptionfields may comprise a file size or file size identifier (for example atotal size of a file being transmitted by one or more payload data). Incertain embodiments, for example, the one or plural data descriptionfields may comprise a maximum file size (for example a maximum size of afile being transmitted by one or more payload data). In certainembodiments, for example, the one or plural data description fields maycomprise a file name or file name identifier. In certain embodiments,for example, the one or plural data description fields may comprise acommand syntax, command type, and/or command type identifier. In certainembodiments, for example, the command type may comprise a SQL commandand/or statement, for example the command type may comprise SQLread,SQLwrite, AND/OR, ALTER TABLE, AS (alias), BETWEEN, CREATE DATABASE,CREATE TABLE, CREATE INDEX, CREATE VIEW, DELETE, DROP DATABASE, DROPINDEX, DROP TABLE, EXISTS, GROUP BY, HAVING, IN, INSERT INTO, INNERJOIN, LEFT JOIN, RIGHT JOIN, FULL JOIN, LIKE, ORDER BY, SELECT, SELECT*,SELECT DISTINCT, SELECT INTO, SELECT TOP, TRUNCATE TABLE, UNION, UNIONALL, UPDATE, WHERE, or a combination of two or more of the foregoingcommands. In certain embodiments, for example, the command type maycomprise a DNS command, for example the command type may compriseIPCONFIG, TRACE ROUTE, NETSTAT, ARP, ROUTE, HOSTNAME, CONTROLNETCONNECTIONS, or a combination of two or more of the foregoingcommands. In certain embodiments, for example, the command type maycomprise an FTP command, for example the command type may comprise !, $,?, ACCOUNT, APPEND, ASCII, BEEP, BINARY, BYE, CASE, CD, CDUP, CHMOD,CLOSE, CR, DEBUG, DELETE, DIR, DISCONNECT, EXIT, FORM, GET, GLOB, HASH,HELP, IDLE, IMAGE, IPANY, IPV4, IPV6, LCD, LS, MACDEF, MDELETE, MDIR,MGET, MKDIR, MLS, MODE, MODTIME, MPUT, NEWER, NLIST, NMAP, NTRANS, OPEN,PASSIVE, PROMPT, PROXY, PUT, PWD, QC, QUIT, QUOTE, RECV, REGET, RENAME,RESET, RESTART, RHELP, RMDIR, RSTATUS, RUNIQUE, SEND, SENDPORT, SITE,SIZE, STATUS, STRUCT, SUNIQUE, SYSTEM, TENEX, TICK, TRACE, TYPE, UMASK,USER, VERBOSE, or a combination of two or more of the foregoingcommands. In certain embodiments, for example, the command type maycomprise a Telnet, a Rlogin, a Rsh, or a Secure Shell command. Incertain embodiments, for example, the command type may comprise an ICMPcommand, for example the command type may comprise PING, TRACEROUTE,ICMP PERMIT, ICMP DENY, or a combination of two or more of the foregoingcommands. In certain embodiments, for example, the command type maycomprise an MQTT command. In certain embodiments, for example, the oneor plural data description fields may comprise a date/time (for examplea transmission date/time or a deadline). In certain embodiments, forexample, the one or plural data description fields may comprise atime-to-live of the payload data. In certain embodiments, for example,the one or plural data description fields may have a size of at least 64bits, for example at least 128 bits, at least 256 bits, at least 512bits, at least 1024 bits, at least 2048 bits, at least 4096 bits, atleast 8192 bits, at least 16384 bits, at least 32768 bits, or the one orplural data description fields may have a size of at least 65536 bits.In certain embodiments, for example, the one or plural data descriptionfields may have a size of less than 8192 bits, for example less than4096 bits, less than 2048 bits, less than 1024 bits, or the one orplural data description fields may have a size of less than 256 bits. Incertain embodiments, for example, one or plural data type descriptorspresent in a data packet may be compared with the one or plural datafields to at least partially determine whether the destinationapplication is authorized to receive data from the data packet.

In certain embodiments, for example, each of the first record and thesecond record may comprise a private key (or a cryptographic parameteror primitive) for establishing the encrypted communication pathway (forexample an encrypted network tunnel), for example by cryptographic keyexchange as described herein.

In certain embodiments, for example, a first application being used by afirst user and executing on the first node may attempt to establish alistening first port on the first node (for example the firstapplication may open a port and attempt to bind the port to a physicalor virtual interface). In certain embodiments, for example, the attemptto establish the listening port may conform to a UDP or a TCP connectionprotocol. In certain embodiments, for example, the attempt to establishthe listening port may conform to a network security protocol, forexample an SSL or TLS protocol for a UDP or TCP connection. In certainembodiments, for example, the first network security software (ormiddleware) may detect the attempt and, in response, the first networksecurity software may form a first network security software listeningfirst port. In certain embodiments, for example, the first networksecurity software listening first port may form a connection with aremote host to become a secure connection endpoint, and data to or fromthe first application may be transmitted through the secure connectionendpoint. In certain embodiments, for example, the first networksecurity software may detect the attempt and allow the first applicationto establish the listening port, followed by the first network securitysoftware forming a connection between a port of the first networksecurity software and the listening port. In certain embodiments, forexample, the first network security software may be present on the firstnode, processor, or computing device. In certain embodiments, forexample, the first network security software may comprise a networkstack application programming interface function called by the firstapplication. In certain embodiments, for example, the network stackapplication programming interface function may be, for example, a bindfunction. In certain embodiments, for example, the network stackapplication programming interface function may be a listen function. Incertain embodiments, for example, the first network security softwaremay be present on the second node, processor, or computing device. Incertain embodiments, for example, the first network security softwaremay be present on a third node of the plural nodes. In certainembodiments, for example, the first network security software may detectthe attempt and prevent the first port from binding to the physicalinterface. In certain embodiments, for example, the first networksecurity software may redirect the first application to establish alistening port on the loopback interface, followed by the first networksecurity software forming a connection by the loopback interface withthe first application. In certain embodiments, for example, the firstnetwork security software may prevent the first application from bindingthe first port to any interface. In certain embodiments, for example,the first network security software may form a connection (for example adirect connection) with the first application without using the loopbackinterface. In certain embodiments, for example, the first networksecurity software may form a connection (for example a directconnection) with the first application only after at least one otherconnection is established (for example a connection between the firstnetwork security software and the second network security software, suchas a connection between the first network security software and thesecond network security software dedicated to transmitting data having aspecified protocol between the first application and the secondapplication).

In certain embodiments, for example, prior to forming the connectionwith the first application software or opening the dedicated listeningport, the first network security middleware may inspect the firstapplication and the first user making the request to open a listeningport. In certain embodiments, for example, the first network securitysoftware may obtain one or plural parameters (for example processparameters) for inspection and validate the one or plural parametersagainst a first preconfigured list (for example a list having the formatof a preconfigured list as described herein) prior to allowing thecombination of the first user and the first application to transmit orreceive data (for example to transmit or to receive data according to anetwork protocol). In certain embodiments, for example, the one orplural parameters may comprise identifiers for the first user and thefirst application, and these parameters may be compared with a list ofallowed 2-tuple values present in the first preconfigured list (forexample in a record of the first preconfigured list). If the 2-tuple isnot present in the first preconfigured list, for example, the firstnetwork security software may prevent the combination of the firstapplication and the first user from receiving or transmitting data. Incertain embodiments, for example, the one or plural parameters maycomprise identifiers for the first user, the first application, and therequested port number (i.e., the port number associated with thelistening port), and these parameters may be compared with a list ofallowed 3-tuple values present in the first preconfigured list. Incertain embodiments, for example, the identifiers for the first user,the first application, and the requested port number may correspond to auser of a destination application, the destination application, and adestination port number in a record of the first preconfigured list. Ifthe 3-tuple is not present in the first preconfigured list, for example,the first network security software may prevent the combination of thefirst application and the first user from receiving or transmittingdata.

In certain embodiments, for example, a second application being used bya second user and executing on the second node may attempt to form aconnection with the combination of the first application and the firstuser over the listening first port (for example by attempting to send aconnection request through a network stack of the second node). Incertain embodiments, for example, the attempt to establish theconnection may conform to a UDP or a TCP connection protocol. In certainembodiments, for example, the attempt to establish the connection mayconform to a network security protocol, for example an SSL or TLSprotocol for a UDP or TCP connection. In certain embodiments, forexample, in response to detecting the attempt to establish a connection,a second network security software may form a connection with the firstnetwork security software listening first port for the purpose oftransmitting data to and/or from the second application from and/or tothe first application via the first network security program. In certainembodiments, for example, the second network security software maydetect the second application attempt and allow the second applicationto connect to the second network security software, followed by thesecond network security software forming a connection with the firstnetwork security software. In certain embodiments, for example, thesecond network security software may be present on the second node,processor, or computing device. In certain embodiments, for example, thesecond network security software may comprise a network stackapplication programming interface function called by the secondapplication. In certain embodiments, for example, the network stackapplication programming interface function may be a bind function (forexample bind( )). In certain embodiments, for example, the network stackapplication programming interface function may be, for example, aconnect function (for example connect( )). In certain embodiments, forexample, the network stack application programming interface functionmay be, for example, a function which puts a software port into alistening state (for example listen( )). In certain embodiments, forexample, the network stack application programming interface functionmay be, for example, a close function (for example close( )). In certainembodiments, for example, the second network security software may bepresent on the first node, processor, or computing device. In certainembodiments, for example, the second network security software may bepresent on a third node of the plural nodes. In certain embodiments, forexample, the second network security software may be the same softwareas the first network security software (for example the first networksecurity software and the second network security software may bedifferent copies of the computer-readable program code (for examplecopies obtained from different copies of the at least one component)).In certain embodiments, for example, the second network securitysoftware may detect the second application attempt and prevent a portassociated with the combination of the second application and the seconduser (the “second port”) from binding or connecting to a physicalinterface. In certain embodiments, for example, the second networksecurity software may redirect the second application to connect withthe second network security software via a loopback interface. Incertain embodiments, for example, the second network security softwaremay prevent the second application from binding or connecting the secondport to any physical interface. In certain embodiments, for example, thesecond network security software may form a connection (for example adirect connection) with the second application without use of a loopbackinterface. In certain embodiments, for example, the second networksecurity software may communicate with the second application by kernelread and/or write commands. In certain embodiments, for example, thefirst network security software may form a connection (for example adirect connection) with the first application only after at least oneother connection is established (for example a connection between thefirst network security software and the second network securitysoftware, such as a connection between the first network securitysoftware and the second network security software dedicated totransmitting data having a specified protocol between the firstapplication and the second application).

In certain embodiments, for example, prior to forming the connectionwith the second application or forming a connection with the firstnetwork security software, the second network security software mayinspect a combination of the second application and the second user. Incertain embodiments, for example, the second network security softwaremay obtain one or plural parameters for the inspection and validate theone or plural parameters against a second preconfigured list prior toallowing the combination of the second user and the second applicationto transmit or receive data. In certain embodiments, for example, theone or plural parameters may comprise identifiers for the second userand the second application, and these parameters may be compared with alist of allowed 2-tuple values present in the second preconfigured list.If the 2-tuple is not present in the second preconfigured list, forexample, the second network security software may prevent thecombination of the second application and the second user from receivingor transmitting data. In certain embodiments, for example, the one orplural parameters may comprise identifiers for the second user, thesecond application, and a destination port number for the requestedconnection (for example a destination port number associated with thefirst application), and these parameters may be compared with a list ofallowed 3-tuple values present in the second preconfigured list. Incertain embodiments, for example, the second user, the secondapplication, and a destination port number for the requested connectionmay correspond to a user of a source application, the sourceapplication, and a port number associated with the destinationapplication present in a record of the second preconfigured list. If the3-tuple is not present in the second preconfigured list, for example,the second network security software may prevent the combination of thesecond application and the second user from receiving or transmittingdata.

In certain embodiments, for example, the second network securitysoftware may use at least the aforementioned destination port number ora destination port identifier (and also optionally an identifier for thesource application, an identifier for a user of the source application,or a combination of the identifier for the source application and theidentifier for the user of the source application) to identify adifferent destination port number corresponding to a listening port ofthe first network security software. In certain embodiments, forexample, the second network security software may use at least theaforementioned destination port number or destination port identifier(and also optionally an identifier for the source application, anidentifier for a user of the source application, or a combination of theidentifier for the source application and the identifier for the user ofthe source application) for the requested connection as an index intothe second preconfigured list to identify a record containing the portnumber for the listening port of the first network security software. Incertain embodiments, for example, said port number for the listeningport may be stored in the second preconfigured list.

In certain embodiments, for example, the second network securitysoftware may construct or assemble, as described herein, a connectionrequest packet comprising a packet header and metadata. In certainembodiments, for example, the packet header may comprise a destinationnetwork address specified by the connection request of the secondapplication. In certain embodiments, for example, the packet header maycomprise a destination network address obtainable from (for examplespecified by or computable from) the second configuration file (forexample the destination network address may be specified by orcomputable from the record identified by at least the destination portnumber associated with the first application). In certain embodiments,for example, the packet header may comprise destination port numbercorresponding to the listening port established by the first networksecurity software. In certain embodiments, for example, the packetheader may comprise a source network address specified by the connectionrequest of the second application. In certain embodiments, for example,the packet header may comprise a source network address obtainable from(for example specified by or computable from) the second configurationfile (for example specified by or computable from the record identifiedby at least the destination port number associated with the firstapplication). In certain embodiments, for example, the packet header maycomprise a source port number associated with the second networksecurity software that has been dynamically assigned (for example by akernel of the second node). In certain embodiments, for example, thepacket header may comprise a non-ephemeral source port number associatedwith the second network security software, wherein the non-ephemeralsource port number is obtained from the second preconfigured list (forexample the non-ephemeral source port number is specified in the recordidentified by at least the destination port number associated with thefirst application). In certain embodiments, for example, the metadatamay comprise a packet type indicator. In certain embodiments, forexample, the connection request packet may comprise cipher suiteparameters according to a security protocol (for example securityprotocol such as SSL or TLS).

In certain embodiments, for example, first network security software maydrop (or quarantine) the connection request packet if the packet typeindicator does not correspond to an expected connection request packettype indicator. In certain embodiments, for example, in response to athreshold number of dropped or rejected connection requests (for examplein response to a threshold number of dropped or rejected connectionrequest packets received) from a node (for example connection requestsfrom the second node or another of the plural nodes or a node notpresent in the plural nodes) the first network security software may addthe node to a blacklist. In certain embodiments, for example, thethreshold number may be less than 30 connection requests, for exampleless than 20, less than 15, less than 10, less than 5, less than 4, lessthan 3, or the threshold number may be less than 2 dropped or rejectedconnection requests. In certain embodiments, for example, the thresholdnumber may be in the range of 2-10 connection requests, for example inthe range of 2-8, in the range of 2-5, or the threshold number may be inthe range of 2-4 connection requests. In certain embodiments, forexample, the first network security software may drop (for examplewithout attempting to verify) any further connection requests from thesending port of the blacklisted node, processor, or computing device. Incertain embodiments, for example, the first network security softwaremay drop (for example without attempting to verify) any furtherconnection requests from any port of the blacklisted node, processor, orcomputing device. In certain embodiments, for example, the first networksecurity software may terminate all connections (for example inclusiveof network tunnels) with the blacklisted node, processor, or computingdevice. In certain embodiments, for example, the first network securitysoftware may drop (for example without attempting to verify) any furtherconnection requests from the sending port after 2 dropped or rejectedconnection requests, and the network security software may terminate allconnections (for example inclusive of network tunnels) after 10 droppedor rejected connection requests.

In certain embodiments, for example, the first network security softwareand the second network security software may negotiate an encryptedcommunication pathway (for example an encrypted network tunnel)according to an agreed-to cipher suite, the negotiating based at leaston a first private key present in the first preconfigured list and asecond private key present in a second preconfigured list. In certainembodiments, for example, the agreed-to choice of cipher suite may bepreconfigured. In certain embodiments, for example, the agreed-to choiceof cipher suite may be mandatory (i.e., the first node may not select analternative cipher suite in a connection request reply packet). Incertain embodiments, for example, the first private key and the secondprivate key may be different. In certain embodiments, for example, thefirst private key and the second private key may be the same. In certainembodiments, for example, the first network security software and thesecond network security software may each execute a key exchangealgorithm to generate a symmetric encryption key for encryption ofmetadata and optionally for encryption of payload data present innetwork packets transmitted through the negotiated encryptedcommunication pathway. In certain embodiments, for example, rather thannegotiating an encrypted communication pathway, metadata may beprotected by passing the metadata through a hash function to form hashedmetadata for inclusion in a network packet for transmission over acommunication pathway extending between the first network securitysoftware and the second network security software. In certain furtherembodiments, for example, the metadata may be combined with a randomnumber and passed through a hash function to form a salted hashedmetadata prior to insertion by the second network security software intoa network packet. In certain embodiments, for example, the first networksecurity software may know the hash function used (and, if used, therandom number) in order to verify the contents of the metadata.

In certain embodiments, for example, following negotiation of theencrypted communication pathway, the first network security software mayconstruct a first node authentication and authorization packet havingthe structure of a node authentication and authorization packet asdescribed herein, and transmit the first node authentication andauthorization packet to the second node, processor, or computing device.In certain embodiments, for example, the first network security softwaremay obtain a first node authentication code for inclusion in metadata ofthe first node authentication and authorization packet from a firstrecord of the first configuration file, the first record identified atleast based the destination port number of the first network securitysoftware. In certain embodiments, for example, upon receipt of the firstnode authentication and authorization packet, the second networksecurity software may decrypt (or, if applicable, check the hash valueof) the first node authentication code and compare the value of thefirst node authentication code with a value obtained from a secondrecord of the second preconfigured list, the second record identified atleast based on the destination port number of the first network securitysoftware. In certain embodiments, for example, the constructing(inclusive of encrypting or forming a hash value for the metadata) andthe obtaining may be performed by a portion of the first networksecurity software executing in an application space (for example in anapplication space of the first node). In certain embodiments, forexample, the decrypting and comparing may be performed by a portion ofthe second network security software executing in an application space(for example in an application space of the second node). In certainembodiments, for example, the constructing (inclusive of encrypting orforming a hash value for the metadata) and the obtaining may beperformed by a portion of the first network security software executingin kernel space (for example in a kernel space of the first node). Incertain embodiments, for example, the decrypting and comparing may beperformed by a portion of the second network security software executingin a kernel space (for example in a kernel space of the second node).

In certain embodiments, for example, network security software residenton one of the plural nodes may drop (or quarantine) a received nodeauthentication and authorization packet if the value of a nodeauthentication code extracted from the received packet does not match anexpected value. In certain embodiments, for example, in response to athreshold number of dropped or rejected node authentication andauthorization packets from a different node (for example another one ofthe plural nodes or a node not one of the plural nodes), the networksecurity software may add the node to a blacklist. In certainembodiments, for example, the threshold number may be less than 30 nodeauthentication and authorization packets, for example less than 20, lessthan 15, less than 10, less than 5, less than 4, less than 3, or thethreshold number may be less than 2 dropped or rejected nodeauthentication and authorization packets. In certain embodiments, forexample, the threshold number may be in the range of 2-10 nodeauthentication and authorization packets, for example in the range of2-8, in the range of 2-5, or the threshold number may be in the range of2-4 node authentication and authorization packets. In certainembodiments, for example, the network security software may drop (forexample without attempting to verify) any further node authenticationand authorization packets from the sending port of the blacklisted node,processor, or computing device. In certain embodiments, for example, thenetwork security software may drop (for example without attempting toverify) any further node authentication and authorization packets fromany port of the blacklisted node, processor, or computing device. Incertain embodiments, for example, the network security software mayterminate all connections (for example inclusive of encryptedcommunication pathways) with the blacklisted node, processor, orcomputing device. In certain embodiments, for example, the first networksecurity software may drop (for example without attempting to verify)any further node authentication and authorization packets from thesending port after 2 dropped or rejected node authentication andauthorization packets, and the network security software may terminateall connections (for example inclusive of encrypted communicationpathways) after 10 dropped or rejected node authentication andauthorization packets.

In certain embodiments, for example, following negotiation of theencrypted communication pathway the second network security software mayconstruct a second node authentication and authorization packet havingthe structure of a node authentication and authorization packet asdescribed herein, and transmit the second node authentication andauthorization packet to the first node, processor, or computing device.In certain embodiments, for example, the second node authentication andauthorization packet may be transmitted prior to the transmission of thefirst node authentication and authorization packet. In certainembodiments, for example, the second node authentication andauthorization packet may be transmitted after the transmission of thefirst node authentication and authorization packet. In certainembodiments, for example, the second node authentication andauthorization packet may be transmitted after the decrypting andcomparing the first node authentication and authorization packet. Incertain embodiments, for example, the first node authentication andauthorization packet may be transmitted after the decrypting andcomparing the second node authentication and authorization packet. Incertain embodiments, for example, the second node authentication andauthorization packet may not be transmitted if the first nodeauthentication and authorization packet is dropped (or quarantined). Incertain embodiments, for example, the first node authentication andauthorization packet may not be transmitted if the second nodeauthentication and authorization packet is dropped. In certainembodiments, for example, the second network security software mayobtain a second node authentication code for inclusion in metadata ofthe second node authentication and authorization packet from a secondrecord of the second configuration file, the second record identified atleast based the destination port number of the second network securitysoftware. In certain embodiments, for example, upon receipt of thesecond node authentication and authorization packet, the first networksecurity software may decrypt (or, if applicable, check the hash valueof) the second node authentication code and compare the value of thesecond node authentication code with a value obtained from a firstrecord of the first preconfigured list, the first record identified atleast based on the destination port number of the second networksecurity software. In certain embodiments, for example, the constructing(inclusive of encrypting or forming a hash value for the metadata) andthe obtaining may be performed by a portion of the second networksecurity software executing in an application space (for example in anapplication space of the second node). In certain embodiments, forexample, the decrypting and comparing may be performed by a portion ofthe first network security software executing in an application space(for example in an application space of the first node). In certainembodiments, for example, the constructing (inclusive of encrypting orforming a hash value for the metadata) and the obtaining may beperformed by a portion of the second network security software executingin kernel space (for example in a kernel space of the second node). Incertain embodiments, for example, the decrypting and comparing may beperformed by a portion of the first network security software executingin a kernel space (for example in a kernel space of the first node).

In certain embodiments, for example, following negotiation of theencrypted communication pathway the first network security software mayconstruct a first payload data authorization and authentication packethaving the structure of a payload data authorization and authenticationpacket as described herein, and transmit the first payload dataauthorization and authentication packet to the second node, processor,or computing device. In certain embodiments, for example, the firstpayload data authorization and authentication packet may be constructedand transmitted following construction and transmission of the firstnode authentication and authorization packet. In certain embodiments,for example, the first network security software may obtain payload dataauthorization and authentication parameters for inclusion in metadata ofthe first payload data authorization and authentication packet from thefirst record of the first configuration file. In certain embodiments,for example, upon receipt of the first payload data authorization andauthentication packet, the second network security software may decrypt(or, if applicable, check the hash value of) the payload dataauthorization and authentication parameters and compare the values withvalues obtained from the second record of the second preconfigured list.In certain embodiments, for example, the constructing (inclusive ofencrypting or forming a hash value for the metadata) and the obtainingmay be performed by a portion of the first network security softwareexecuting in an application space (for example in an application spaceof the first node). In certain embodiments, for example, the decryptingand comparing may be performed by a portion of the second networksecurity software executing in an application space (for example in anapplication space of the second node). In certain embodiments, forexample, the constructing (inclusive of encrypting or forming a hashvalue for the metadata) and the obtaining may be performed by a portionof the first network security software executing in kernel space (forexample in a kernel space of the first node). In certain embodiments,for example, the decrypting and comparing may be performed by a portionof the second network security software executing in a kernel space (forexample in a kernel space of the second node).

In certain embodiments, for example, network security software residenton one of the plural nodes may drop a received payload dataauthorization and authentication packet if the value of payload dataauthorization and authentication parameters extracted from the receivedpacket do not match an expected value. In certain embodiments, forexample, in response to a threshold number of dropped or rejectedpayload data authorization and authentication packets from a differentnode (for example another one of the plural nodes or a node not one ofthe plural nodes), the network security software may add the node to ablacklist. In certain embodiments, for example, the threshold number maybe less than 30 payload data authorization and authentication packets,for example less than 20, less than 15, less than 10, less than 5, lessthan 4, less than 3, or the threshold number may be less than 2 droppedor rejected payload data authorization and authentication packets. Incertain embodiments, for example, the threshold number may be in therange of 2-10 payload data authorization and authentication packets, forexample in the range of 2-8, in the range of 2-5, or the thresholdnumber may be in the range of 2-4 payload data authorization andauthentication packets. In certain embodiments, for example, the networksecurity software may drop (for example without attempting to verify)any further payload data authorization and authentication packets fromthe sending port of the blacklisted node, processor, or computingdevice. In certain embodiments, for example, the network securitysoftware may drop (for example without attempting to verify) any furtherpayload data authorization and authentication packets from any port ofthe blacklisted node, processor, or computing device. In certainembodiments, for example, the network security software may terminateall connections (for example inclusive of encrypted communicationpathways) with the blacklisted node, processor, or computing device. Incertain embodiments, for example, the first network security softwaremay drop (for example without attempting to verify) any further nodepayload data authorization and authentication packets from the sendingport after 2 dropped or rejected payload data authorization andauthentication packets, and the network security software may terminateall connections (for example inclusive of encrypted communicationpathways) after 10 dropped or rejected payload data authorization andauthentication packets.

In certain embodiments, for example, following negotiation of theencrypted communication pathway the second network security software mayconstruct a second payload data authorization and authentication packethaving the structure of a payload data authorization and authenticationpacket as described herein, and transmit the second payload dataauthorization and authentication packet to the first node, processor, orcomputing device. In certain embodiments, for example, the secondpayload data authorization and authentication packet may be transmittedprior to transmission of the first payload data authorization andauthentication packet. In certain embodiments, for example, the secondpayload data authorization and authentication packet may be transmittedafter transmission of the first payload data authorization andauthentication packet. In certain embodiments, for example, the secondpayload data authorization and authentication packet may be constructedand transmitted following construction and transmission of the secondnode authentication and authorization packet. In certain embodiments,for example, the second payload data authorization and authenticationpacket may be transmitted after the decrypting and comparing the firstpayload data authorization and authentication packet. In certainembodiments, for example, the first payload data authorization andauthentication packet may be transmitted after the decrypting andcomparing the second payload data authorization and authenticationpacket. In certain embodiments, for example, the second payload dataauthorization and authentication packet may not be transmitted if thefirst payload data authorization and authentication packet is dropped.In certain embodiments, for example, the first payload dataauthorization and authentication packet may not be transmitted if thesecond payload data authorization and authentication packet is dropped.In certain embodiments, for example, the second network securitysoftware may obtain payload data authorization and authenticationparameters for inclusion in metadata of the second payload dataauthorization and authentication packet from the second record of thesecond configuration file. In certain embodiments, for example, uponreceipt of the second payload data authorization and authenticationpacket, the first network security software may decrypt (or, ifapplicable, check the hash value of) the payload data authorization andauthentication parameters and compare the values with values obtainedfrom the first record of the first preconfigured list. In certainembodiments, for example, the constructing (inclusive of encrypting orforming a hash value for the metadata) and the obtaining may beperformed by a portion of the second network security software, saidportion executing in an application space (for example in an applicationspace of the second node). In certain embodiments, for example, thedecrypting and comparing may be performed by a portion of the firstnetwork security software, said portion executing in an applicationspace (for example in an application space of the first node). Incertain embodiments, for example, the constructing (inclusive ofencrypting or forming a hash value for the metadata) and the obtainingmay be performed by a portion of the second network security software,said portion executing in kernel space (for example in a kernel space ofthe second node). In certain embodiments, for example, the decryptingand comparing may be performed by a portion of the first networksecurity software, said portion executing in a kernel space (for examplein a kernel space of the first node).

In certain embodiments, for example, if the first node authenticationand authorization packet, second node authentication and authorizationpacket, first payload data authorization and authentication packet, andsecond payload data authorization and authentication packet aresuccessfully validated, the first application and the second applicationmay transmit payload data packets that the first network securitysoftware and the second network security software will allow to betransported across the encrypted communication pathway. In certainembodiments, for example, the destination port number of the firstnetwork security software may be recorded in a list of authorized openconnections on the first node upon successful validation of the firstnode authentication and authorization packet, second node authenticationand authorization packet, first payload data authorization andauthentication packet, and second payload data authorization andauthentication packet. In certain embodiments, for example, if any oneof the first node authentication and authorization packet, second nodeauthentication and authorization packet, first payload dataauthorization and authentication packet, and second payload dataauthorization and authentication packet are not successfully validated,whichever of the first network security software and the second networksecurity software detect the unsuccessful validation may terminate theencrypted communication pathway (and optionally remove the terminatedencrypted communication pathway from a list of authorized openconnections and/or change the connection status of the encryptedcommunication pathway). In certain embodiments, for example, terminatingthe encrypted communication pathway may comprise releasing thedestination port. In certain embodiments, for example, in addition toterminating the encrypted communication pathway, the first networksecurity software may terminate the connection formed between the firstnetwork security software and the first application. In certainembodiments, for example, in addition to terminating the encryptedcommunication pathway, the second network security software mayterminate the connection formed between the second network securitysoftware and the second application.

In certain embodiments, for example, the source port number of thesecond network security software may be recorded in a list of authorizedopen connections on the second node upon successful validation of thefirst node authentication and authorization packet, second nodeauthentication and authorization packet, first payload dataauthorization and authentication packet, and second payload dataauthorization and authentication packet. In certain embodiments, forexample, a source port number of the second network security software ofeach payload packet may be compared to the authorized list of openconnections on the second node prior to transmitting the payload packetto the first network security software. In certain embodiments, forexample, a payload packet may be dropped if said source port does notappear on the authorized list of open connections on the second node,processor, or computing device.

In certain embodiments, for example, a destination port number of eachpayload packet received by the first network security software may becompared to the authorized list of open connections on the first node,processor, or computing device. In certain embodiments, for example, apayload packet may be dropped if the destination port does not appear inthe authorized list of open connections. In certain embodiments, forexample, each payload packet received by the first network securitysoftware from the network tunnel may be checked to verify that themetadata contains the required second payload data authorization andauthentication parameters. In certain embodiments, for example, if saidverification fails then the payload packet may be dropped. In certainembodiments, for example, if more than a threshold number of payloadpackets received by the first network security software from theencrypted communication pathway fail to be verified, then the encryptedcommunication pathway may be terminated. In certain embodiments, forexample, if more than 1 payload packet received by the first networksecurity software from the encrypted communication pathway fails to beverified, for example more than 5, more than 10, more than 15, more than30, more than 50, or if more than 100 payload packets received by thefirst network security software from the encrypted communication pathwayfail to be verified, then the encrypted communication pathway may beterminated. In certain embodiments, for example, if more than athreshold number of payload packets received by the first networksecurity software in a continuous sequence from the encryptedcommunication pathway fail to be verified, then the encryptedcommunication pathway may be terminated. In certain embodiments, forexample, if more than 2 payload packets received in a continuoussequence by the first network security software from the encryptedcommunication pathway fail to be verified, for example more than 4, morethan 8, more than 12, more than 18, more than 24, or if more than 48payload packets received by the first network security software in acontinuous sequence from the encrypted communication pathway fail to beverified, then the encrypted communication pathway may be terminated. Incertain embodiments, for example, if a rolling counter defined as (a) amultiplier times (b) the number of payload packets received by the firstnetwork security software from the encrypted communication pathwayfailing to be verified, minus (c) another multiplier times (d) thenumber of payload packets received by the first network securitysoftware from the encrypted communication pathway successfully verifiedexceeds a threshold number, then the encrypted communication pathway maybe terminated. In certain embodiments, for example, the multiplier maybe 1 and the another multiplier may be 1. In certain embodiments, forexample, the multiplier may be larger than the another multiplier. Incertain embodiments, for example, the multiplier may be less than theanother multiplier. In certain embodiments, for example, the anothermultiplier may be 1 and the multiplier may be greater than 1, forexample the multiplier may be at least 1.25 (for example 1.25), at least1.5 (for example 1.5), at least 2 (for example 2), at least 2.5 (forexample 2.5), or the multiplier may be at least 3 (for example 3). Incertain embodiments, for example, the threshold number may be less than2, for example less than 4, less than 8, less than 10, less than 20,less than 30, less than 50, or the threshold number may be less than100. In certain embodiments, for example, the threshold number may be inthe range of 10-50, for example in the range of 20-40, or the thresholdnumber may be in the range of 25-35. In certain embodiments, forexample, the multiplier may be 1, the another multiplier may be 1, andthe threshold number may be less than 30, for example less than 20, orless than 10. In certain embodiments, for example, the multiplier may be3, the another multiplier may be 1, and the threshold number may be lessthan 60, for example less than 40, less than 30, less than 20, or lessthan 10.

In certain embodiments, for example, each payload packet received by thesecond network security software from the encrypted communicationpathway may be checked to verify that the metadata contains the requiredfirst payload data authorization and authentication parameters. Incertain embodiments, for example, if said verification fails then thepayload packet may be dropped. If more than a threshold number ofpayload packets received by the second network security software fromthe encrypted communication pathway fail to be verified, then theencrypted communication pathway may be terminated. In certainembodiments, for example, if more than 1 payload packet received by thefirst network security software from the encrypted communication pathwayfails to be verified, for example more than 5, more than 10, more than15, more than 30, more than 50, or if more than 100 payload packetsreceived by the first network security software from the encryptedcommunication pathway fail to be verified, then the encryptedcommunication pathway may be terminated. In certain embodiments, forexample, if more than a threshold number of payload packets received bythe second network security software in a continuous sequence from theencrypted communication pathway fail to be verified, then the encryptedcommunication pathway may be terminated. In certain embodiments, forexample, if more than 2 payload packets received in a continuoussequence by the first network security software from the encryptedcommunication pathway fail to be verified, for example more than 4, morethan 8, more than 12, more than 18, more than 24, or if more than 48payload packets received by the first network security software in acontinuous sequence from the encrypted communication pathway fail to beverified, then the encrypted communication pathway may be terminated. Incertain embodiments, for example, if a rolling counter defined as (a) amultiplier times (b) the number of payload packets received by the firstnetwork security software from the encrypted communication pathwayfailing to be verified, minus (c) another multiplier times (d) thenumber of payload packets received by the first network securitysoftware from the encrypted communication pathway successfully verifiedexceeds a threshold number, then the encrypted communication pathway maybe terminated. In certain embodiments, for example, the multiplier maybe 1 and the another multiplier may be 1. In certain embodiments, forexample, the multiplier may be larger than the another multiplier. Incertain embodiments, for example, the multiplier may be less than theanother multiplier. In certain embodiments, for example, the anothermultiplier may be 1 and the multiplier may be greater than 1, forexample the multiplier may be at least 1.25 (for example 1.25), at least1.5 (for example 1.5), at least 2 (for example 2), at least 2.5 (forexample 2.5), or the multiplier may be at least 3 (for example 3). Incertain embodiments, for example, the threshold number may be less than2, for example less than 4, less than 8, less than 10, less than 20,less than 30, less than 50, or the threshold number may be less than100. In certain embodiments, for example, the threshold number may be inthe range of 10-50, for example in the range of 20-40, or the thresholdnumber may be in the range of 25-35. In certain embodiments, forexample, the multiplier may be 1, the another multiplier may be 1, andthe threshold number may be less than 30, for example less than 20, orless than 10. In certain embodiments, for example, the multiplier may be3, the another multiplier may be 1, and the threshold number may be lessthan 60, for example less than 40, less than 30, less than 20, or lessthan 10.

In certain embodiments, for example, the each of the plural nodes maycomprise network security software, wherein the network securitysoftware may treat any network packet received by a port of the networksecurity software as a malicious packet unless it is a connectionrequest packet, a verified node authentication and authorization packet,a verified payload data authorization and authentication packet, or averified payload packet as described herein.

In certain embodiments, for example, prior to transmission of a networkpacket by a first execution thread of the first network securitysoftware, a second execution thread (for example of the first networksecurity software) may verify that the user of the first executionthread is an authorized user (for example by determining the user is theroot user of a node on which the first execution thread is executing).In certain embodiments, for example, prior to transmission of a networkpacket by a first execution thread of the second network security, asecond execution thread of the second network security software mayverify that the user of the first execution thread is an authorizeduser, for example the root user of a node on which the first executionthread is executing.

In certain embodiments, for example, payload data may be translated bynetwork security software from a native format (for example a nativeformat associated with an application) into a common format prior toinsertion in the payload data packet. In certain embodiments, forexample, the common format may conform to a machine-to-machine protocol.In certain embodiments, for example, the format may conform to an IoTprotocol. In certain embodiments, for example, the common format mayconform to an MQ Telemetry Transport (MQTT) protocol. In certainembodiments, for example, the common format may conform to an AdvancedMessage Queuing Protocol (AMQP). In certain embodiments, for example,the common format may conform to a Simple/Streaming Text OrientedMessaging Protocol (STOMP). In certain embodiments, for example, thecommon format may conform to a Data Distribution Service DDS. In certainembodiments, for example, the common format may conform to a ConstrainedApplication Protocol (CoAP). In certain embodiments, for example, thecommon format may conform to a Java Message Service (JMS). In certainembodiments, for example, the common format may conform to an eXtensibleMessaging and Presence Protocol (XMPP). In certain embodiments, forexample, the common format may conform to a Representational StateTransfer (REST) protocol. In certain embodiments, for example, thecommon format may conform to an Open Mobile Alliance Light WeightMachine-to-Machine (OMA LWM2M) protocol. In certain embodiments, forexample, the common format may conform to an Open PlatformCommunications Unified Architecture (OPC UA) protocol. In certainembodiments, for example, the common format may conform to a JavaScriptObject Notation (JSON) protocol. In certain embodiments, for example,the common format may conform to an instant messaging protocol. Incertain embodiments, for example, the common format may be a proprietaryformat (for example may conform to a proprietary protocol). In certainembodiments, for example, the translation may be performed in anapplication space of node where the network security software isresident. In certain embodiments, for example, network security softwaremay translate received payload data from a common format to a nativeformat according to a receiving application.

In certain embodiments, for example, first network security softwareresident on a first node may translate data (or a portion thereof) froma first native format to a common format, followed by inclusion of thetranslated data in a network packet. In certain embodiments, forexample, the network packet may be transmitted from the first node to asecond node, processor, or computing device. In certain embodiments, forexample, second network software resident on the second node maytranslate the translated data (or translated portion thereof) from thecommon format into a second native format. In certain embodiments, forexample, the data in the second native format may be transmitted to anapplication resident on the second node, processor, or computing device.

In certain embodiments, for example, prior to the second networksecurity software performing said translating, the second networksecurity software may treat incoming data as translated data and inspectthe incoming data based on a predetermined policy (for example a policybased on a data type of the translated data). In certain furtherembodiments, for example, the inspecting may comprise determining thesize(s) (or length(s)) of a portion, portions, or all the incoming data(for example checking using a command such as a rangeCheck command( )),and comparing the determined size(s) with minimum and/or maximum allowedsize(s). In certain embodiments, for example, the minimum and/or maximumallowed size(s) may be obtained from the predetermined policy. Incertain embodiments, for example, the inspecting may be followed bydiscarding the incoming data if the data does not conform to thepredetermined policy. In certain embodiments, for example, thediscarding may be effective to defeat a return-oriented programmingexploit. In certain embodiments, for example, the discarding may preventan attacker from gaining control of a program call stack running on thesecond node, processor, or computing device.

In certain embodiments, for example, the first native format and thesecond native format may be the same. In certain embodiments, forexample, the first native format and the second native format may bedifferent. In certain embodiments, for example, the translation of thedata (or a portion thereof) from the first native format to the commonformat may chop malware contained in the data (or a portion thereof)into two or more discontiguous segments. In certain embodiments, forexample, the translation of the data (or a portion thereof) from thefirst native format to the common format may render malware contained inthe data (or a portion thereof) inoperable. In certain embodiments, forexample, the translation of the data (or a portion thereof) from thecommon format to the second native format may chop (or shred) malwarecontained in the data (or a portion thereof) into two or morediscontiguous segments. In certain embodiments, for example, thetranslation of the data (or a portion thereof) from the common format tothe second native format may not reassemble malware originally containedin the data (or a portion thereof) in its first native format into acontiguous executable code (for example the first native format may bedifferent from the second native format). In certain embodiments, forexample, the translation of the data (or a portion thereof) from thecommon format to the second native format may render malware containedin the data (or a portion thereof) inoperable.

In certain embodiments, for example, the second node of the plural nodesmay be a gateway server to different nodes than the plural nodes. Incertain embodiments, for example, the second node of the plural nodesmay be configured to receive network packet communications byconnections which are not negotiated by the second network securitysoftware, followed by transmitting at least a portion of the receivednetwork packet communications through an authorized encryptedcommunication pathway that is negotiated by the first network securitysoftware and the second network security software. In certainembodiments, for example, the at least a portion of the received networkpacket communications may be passed through a trusted application toform trusted at least a portion of the received network packetcommunications, followed by passing the trusted at least a portion ofthe received network packet communications through the authorizedencrypted communication pathway. In certain embodiments, for example,the at least a portion of the received network packet communications maybe modified to render any executable computer code present in thereceived network packet communications nonexecutable. In certainembodiments, for example, the at least a portion of the received networkpacket communications may be modified, chopped, or shredded to renderany executable code present in the received network packetcommunications nonexecutable. In certain embodiments, for example, theat least a portion of the received network packet communications may bepadded to render any executable code present in the received networkpacket communications nonexecutable. In certain embodiments, forexample, the at least a portion of the received network packetcommunications may be converted to a nonexecutable format. In certainembodiments, for example, the at least a portion of the received networkpacket communications may be converted to an ASCII text format. Incertain embodiments, for example, the at least a portion of the receivednetwork packet communications may be passed through a function (forexample a bitwise function or a cryptographic function) to render itnonexecutable. In certain embodiments, for example, the ratio of thedifferent nodes to the plural nodes may be less than 1:1, for exampleless than 1:2, less than 1:3, less than 1:4, less than 1:5, less than1:8, less than 1:9, less than 1:10, less than 1:20, or the ratio of thedifferent nodes to the plural nodes may be less than 1:50.

Certain embodiments may provide, for example, use of any of theforegoing systems, methods, or apparatuses to defeat an attack over anetwork (for example an attack by malware resident on the node or on aremote node). In certain embodiments, for example, the attack maycomprise a port scan attack whereby the malware detects an open port(for example a port in listening mode) on the node, processor, orcomputing device.

In certain embodiments, for example, malware may use a compromisedpassword (for example a weak administrator password that has beencompromised) to gain access to one or plural nodes, followed bytransmitting data from the one or plural nodes.

In certain embodiments, for example, spyware present on a node maytransmit keystrokes from a keyboard to a remote machine in order toobtain confidential information (for example a password for the machineor one or plural applications.

In certain embodiments, for example, the attack may comprise the malwarespoofing a second node with which the first node is authorized tocommunicate. In certain embodiments, for example, the malware maymonitor network traffic between the node and the further node todetermine, for example, a node address, a node port number, acommunication session ID, and a network packet sequence numberassociated with a communication session. In certain further embodiments,for example, the malware may modify Address Resolution Protocol (ARP)caches present on the node and on a router, causing network packets tobe routed through the malware. Alternatively, in certain embodiments,for example, the malware may trigger a connection reset between the nodeand the router. In certain further embodiments, for example, the malwaremay spoof the node by registering with the router using the determinedaddress and port number, and highjack the communication session with thefurther node, processor, or computing device. In certain furtherembodiments, for example, the node may redirect the node traffic to passthrough the malware when the node reconnects with the router.

In certain embodiments, for example, the attack may comprise negotiatingan encrypted tunnel with a network security agent resident on the node(and, in the case of a man-in-the-middle attack, negotiating a furtherencrypted tunnel with a second node). In certain embodiments, forexample, the malware may obtain one or plural private keys from thenode, enabling key exchange between the malware and the node, decryptionof encrypted network packets, network packet payloads, and/or networkpacket metadata. In certain embodiments, for example, the malware mayobtain the one or plural private keys based on a flaw in securitysoftware. By way of example, certain versions of OpenSSL (publiclyavailable secured socket layer encryption software) contain a bug (theso-called “Heartbleed” bug) that has been exploited malware to read nodememory. According to the Heartbleed bug, a malware client may send a“heartbeat” network packet to a server node, the packet containing apayload size parameter. Exploiting the fact that the OpenSSL versionsrequire the server node respond to the heartbeat network packet in kindwith the same heartbeat request, the malware may submit a payload sizeparameter much larger than the actual payload, which may cause theserver to send random data from its memory to meet the lengthrequirements of specified by the payload size parameter. By inspectingthe random bits of data, in certain instances the malware may be able toidentify sufficient cryptographic data to compromise a securityprotocol.

In certain embodiments, for example, the network attack may comprise aside-channel attack. In certain embodiments, for example, the networkattack may comprise a challenge ACK side channel attack. In certainembodiments, for example, the side channel attack may be renderedineffective by requiring, according to the methods described herein, theexchange and authorization of encrypted device, application, user,and/or data protocol parameters across an encrypted communicationpathway prior to authorizing port-to-port communication (or higher thanOSI layer three communication) across the encrypted communicationpathway and, once port-to-port communication is authorized, furtherrequiring, according to the methods described herein, that each payloadpassed to an application port is obtained from a network packetcontaining an expected application, user, and/or data protocolidentifier.

In certain embodiments, for example, the network attack may comprise adenial-of-service attack, whereby one or plural remote nodes attempt totemporarily or indefinitely render node resources unavailable to itsintended users. In certain embodiments, for example, thedenial-of-service attack may comprise a distributed denial of serviceattack, whereby incoming network packets from plural sources flood thenode, processor, or computing device. In certain embodiments, forexample, the denial-of-service attack may comprise an OSI applicationlayer attack whereby network packet data may flood application layermemory. In certain further embodiments, for example, the OSI applicationlayer attack may trigger buffer overflow on the node, processor, orcomputing device. Buffer overflow may result in consumption of allavailable CPU memory (or in the introduction of malware into anexecutable region of node memory). In certain embodiments, for example,the denial-of-service attack may comprise a so-called “banana attack”whereby outgoing network packets are redirected to the client, therebyimpairing incoming network traffic from reaching the node (andpotentially flooding node memory with the redirected network packets).In certain embodiments, for example, the denial-of-service attack may bea so-called “Smurf” attack, whereby malware may spoof the source addressof the node in network packets and exploit one or plural misconfigurednetwork devices to cause the network packets to be broadcast to eachmember of a network. The resulting network traffic may use up thenetwork's bandwidth. In certain embodiments, for example, thedenial-of-service attack may comprise the so-called “ping flood”,whereby the node may receive an overwhelming number of ping packets overthe network. In the so-called “Ping of death” attack, for example, themalware may provide a malformed ping packet that may consume noderesources. In the so-called “BlackNurse attack”, for example, malwaremay transmit packets indicating that a destination port is unreachable.In certain embodiments, for example, the denial-of-service attack maycomprise the so-called “shrew attack”, whereby short synchronized burstsof traffic may disrupt TCP connections on the same link, by exploiting aweakness in TCP's retransmission timeout mechanism. In certainembodiments, for example, the denial-of-service attack may comprise theso-called “Slow Read” attack whereby malware sends properly formedapplication layer requests but reads responses very slowly, thus tryingto exhaust the nodes connection pool. In certain embodiments, forexample, the denial-of-service attack may comprise the so-called“teardrop attack”, whereby malformed network fragments with overlapping,oversized payloads are transmitted to the node, processor, or computingdevice. In certain embodiments, for example, the teardrop attack maycompromise certain kernels (for example Windows 3.1x, Windows 95 andWindows NT operating systems, as well as versions of Linux prior toversions 2.0.32 and 2.1.63) due to a bug in their TCP/IP fragmentationre-assembly code. In certain embodiments, for example, the networkattack may comprise a malicious file list object (for example acompromised file) configured to be executed by software that isostensibly not malicious (for example an authorized application softwareprogram or an operating system program).

A schematic view of an exemplary data flow for data transmission betweena first node 800 and a second node 802 across a network 804 isillustrated in FIG. 8. According to this embodiment, a first application806 executing on the first node 800 and a second application 808executing on the second node 802 attempt to form a communication pathway(or channel) A (the communication pathway (or channel) is shown by theidentifier A only for reference, and it is not part of the exemplarydata flow managed by network security agent as described below),comprising attempting to associate a first port 810 of the firstapplication 806 with a first physical interface 812 of the first node800 and attempting to associate a second port 814 of the secondapplication 808 with a second physical interface 816 of the second node802. Of note, the first port 810 and/or the second port 814 may havepredefined port numbers or may have ephemeral port numbers that areassigned at some point before, during, or subsequent to the attempt toform the communication pathway (or channel) A. According to thisembodiment, a first network security agent 818 and a second networksecurity agent 820 are cooperatively configured to prevent the attemptedcommunication pathway (or channel) A from being formed. The firstnetwork security agent 818 intercepts the attempt to associate the firstport 810 with the first physical interface 812 and redirects the firstport 810 to associate with a first loopback interface 822 of the firstnode 800. Furthermore, the first network security agent 818 causes athird port 824 of the first network security agent 818 to associate withthe first loopback interface 822 and a fourth port 826 of the firstnetwork security agent to associate with the first physical interface812. The second network security agent 820 intercepts the attempt toassociate the second port 814 with the second physical interface 816 andredirects the second port 814 to associate with a second loopbackinterface 828 of the second node 802. Furthermore, the second networksecurity agent 820 causes a fifth port 830 of the second networksecurity agent 820 to associate with the second loopback interface 828and a sixth port 832 of the second network security agent to associatewith the second physical interface 816. The first application 806 andthe first network security agent 818 negotiate a first communicationpathway (or channel) 834, the first network security agent 818 and thesecond network security agent 820 negotiate a second communicationpathway (or channel) 836, and the second network security agent 820 andthe second application 808 negotiate a third communication pathway (orchannel) 838, whereby data may be transmitted by a data path comprisingthe first communication pathway (or channel) 834, the secondcommunication pathway (or channel) 836, and the third communicationpathway (or channel) 838.

A schematic view of an exemplary translated data flow between a firstnode 900 and a second node 902 across a network 904 is illustrated inFIG. 9. According to this embodiment, a sensor 906 transmits a sensorreading across a physical interface 908 of the first node 900 to sensorsoftware 910, which may include a driver for the sensor 906. The sensorsoftware 910 transmits a first packet 912 containing the sensor readingin a payload 914 of the first packet 912 to a first network securitysoftware 916 via a loopback interface 918 of the first node 900 (i.e.,the first packet 912 is passed through a network stack via the loopbackinterface 918 and the payload 914 passed to the first network securitysoftware 916). The first packet payload 914 has a first native dataformat A, the first native data format A including an offset, the sensorreading, a fixed-width sensor identifier, and a fixed-width data typeidentifier. The offset provides an index to the start of the fixed-widthsensor identifier in the payload. The sensor reading in the first nativedata format may be provided in first native units (for example atemperature value may be provided in degrees Celsius, as shown) or maybe unitless. The first network security software 916 includes atranslator, the translator configured to convert the sensor data payload914 from the first native data format A to a translated format B (toform a translated sensor data payload 920), the translated format Bconsisting of the sensor identifier, the data type, and a translatedsensor reading, wherein a forward slash (“/”) delimits the sensoridentifier and the data type, and a colon (“:”) delimits the data typeand the translated sensor data value. The translated sensor reading maybe provided in translated units (for example a translated temperaturevalue may be provided in degrees Kelvin, as shown) or may be unitless.The first network security software transmits a second data packet 922containing the translated sensor data payload 920 via a physicalinterface 924 across the network 904 to the second node 902 via aphysical interface 926 where the second data packet 922 is received bysecond network security software 928. The second network securitysoftware 928 includes a translator, the translator configured to convertthe sensor data payload 920 from the translated format B to a secondnative data format C expected by a database application, the secondnative data format C consisting of the sensor identifier, the data type,and a sensor reading in comma delimited format and enclosed inparenthesis. The sensor reading, following conversion from thetranslated format C by the second network security software 928, may beprovided according to second native units (for example a temperaturevalue may be provided in degrees Fahrenheit, as shown) or may beunitless. The second network security software 928 transmits a thirdpacket 930 containing the sensor data payload 932 having the secondnative data format C to a database application 934 via a loopbackinterface 936 of the second node 902.

A schematic view of an exemplary network configuration is illustrated inFIG. 10. The network comprises a first node 1000, a second node 1002,and a third node 1004 exchanging data over network 1006 through a firstencrypted bidirectional connection (for example network tunnel) 1008, asecond encrypted unidirectional connection (for example network tunnel)1010, a third encrypted unidirectional connection (for example networktunnel) 1012, a fourth encrypted unidirectional connection (for examplenetwork tunnel) 1014, and a fifth encrypted bidirectional connection(for example network tunnel) 1016. The first node 1000 comprises a firstapplication program 1018, a second application program 1020, and a firstnetwork security software 1022. The second node 1002 comprises a thirdapplication program 1024 and a second network security software 1026.The third node 1004 comprises a fourth application program 1028 and athird network security software 1030. Each of the application programs(1018, 1020, 1024, and 1028) communicate data to and from theirrespective network security software (1022, 1026, or 1030) bybidirectional connections 1032, 1034, 1036, 1038, 1040, 1042, 1044,1046, 1048, 1050 as indicated. The first network security software 1022is configured to (a) transmit data conforming exclusively to a firstdata protocol received from the first application program 1018 bybidirectional connection 1032 to the first encrypted bidirectionalconnection (for example network tunnel) 1008; and (b) transmit dataconforming exclusively to the first data protocol received from thefirst encrypted bidirectional connection (for example network tunnel)1008 to the first application program 1018 by bidirectional connection1032. The first network security software 1022 is also configured totransmit data conforming exclusively to a second data protocol receivedfrom the first application program 1018 by bidirectional connection 1034to the second encrypted unidirectional connection (for example networktunnel) 1010. The first network security software 1022 is furtherconfigured to transmit data conforming exclusively to a third dataprotocol received from the third encrypted unidirectional connection(for example network tunnel) 1012 to the second application program 1020by bidirectional connection 1036. The second network security software1026 is configured to (a) transmit data conforming exclusively to thefirst data protocol received from the third application program 1024 bybidirectional connection 1038 to the first encrypted bidirectionalconnection (for example network tunnel) 1008; and (b) transmit dataconforming exclusively to the first data protocol received from thefirst encrypted bidirectional connection (for example network tunnel)1008 to the third application program 1024 by bidirectional connection1038. The second network security software 1026 is also configured totransmit data conforming exclusively to a fourth data protocol receivedfrom the fourth encrypted unidirectional connection (for example networktunnel) 1014 to the third application program 1024 by bidirectionalconnection 1040. The second network security software 1026 is furtherconfigured to (a) transmit data conforming exclusively to a fifth dataprotocol received from the third application program 1024 bybidirectional connection 1042 to the fifth encrypted bidirectionalconnection (for example network tunnel) 1016; and (b) transmit dataconforming exclusively to the fifth data protocol received from thefifth encrypted bidirectional connection (for example network tunnel)1016 to the third application program 1024 by bidirectional connection1042. The third network security software 1030 is configured to transmitdata conforming exclusively to the second data protocol received fromthe second encrypted unidirectional connection (for example networktunnel) 1010 to the fourth application program 1028 by bidirectionalconnection 1048. The third network security software 1030 is alsoconfigured to transmit data conforming exclusively to the third dataprotocol received from the fourth application program 1028 bybidirectional connection 1050 to the third encrypted unidirectionalconnection (for example network tunnel) 1012. The third network securitysoftware 1030 is further configured to transmit data conformingexclusively to the fourth data protocol received from the fourthapplication program 1028 by bidirectional connection 1044 to the fourthencrypted unidirectional connection (for example network tunnel) 1014.The third network security software 1030 is additionally configured to(a) transmit data conforming exclusively to a fifth data protocolreceived from the fourth application program 1028 by bidirectionalconnection 1046 to the fifth encrypted bidirectional connection (forexample network tunnel) 1016; and (b) transmit data conformingexclusively to the fifth data protocol received from the fifth encryptedbidirectional connection (for example network tunnel) 1016 to the fourthapplication program 1028 by bidirectional connection 1046.

A schematic view of an exemplary node 1100 transmitting data to anetwork 1102 is illustrated in FIG. 11. A data packet sent from aprogram port 1104 by a user 1106 of a program 1108 executing in anapplication space 1110 to a network stack 1112 is routed to a firstdriver (or module, for example a kernel loadable module) 1114 of anetwork security layer 1116 in a kernel space 1118. Based on a list 1120of allowed network connections (which list is stored in kernel spacememory as shown or alternatively stored in application space memory, andat least a portion of the contents of the list may optionally be loadedfrom an kernel-only readable file or from an application space readablefile and optionally passed via an interface to the kernel space 1110),the first driver (or module, for example a kernel loadable module) 1114verifies that the user 1106 and the program 1108 are permissible, andobtains a network tunnel port number and data protocol for the datapacket. The first driver (or module, for example a kernel loadablemodule) 1114 further verifies that the network tunnel port number isassociated with a network tunnel that is in a valid state fortransmitting data (for example having an open connection status). Abuilder module 1122 is invoked to assemble descriptors for the user1106, the program 1108, and the data protocol into packet metadata. Adata portion of the data packet is passed to a translator module 1124 toencode the data into translated data for transmission across the networktunnel. The packet metadata and optionally the translated data areencrypted by an encryption module 1126 using cryptographic keys specificto the network tunnel obtained from a file 1128 and an encrypted resultis passed to an assembler module 1130 to form a modified data packet. Ifthe translated data is not encrypted, it may bypass the encryptionmodule 1128 and instead be passed directly to the assembler module 1130as shown. The modified data packet is communicated to the network stack1112 and a frame containing the modified data packet transmitted to thenetwork tunnel by a physical interface 1132. Prior to communicating themodified data packet to the network tunnel, the first driver (or module,for example a kernel loadable module) 1114 verifies that the networktunnel is in a valid state for transmitting data. For illustrativepurposes only, and not as part of the embodiment, path A shows that datapacket sent from the program port 1104 would pass through the networkstack 1112 and the physical interface 1132 to the network 1102 were thefirst driver (or module, for example a kernel loadable module) 1114 notpresent.

A schematic view of an exemplary node 1200 transmitting data to anetwork 1202 is illustrated in FIG. 12. A data packet sent from aprogram port 1204 by a user 1206 of a program 1208 in an applicationspace 1210 to a network stack 1212 is routed to a first driver (ormodule, for example a kernel loadable module) 1214 of a network securitylayer 1216 in a kernel space 1218. Based on a list 1220 of allowednetwork connections (which list is stored in kernel space memory asshown or alternatively stored in application space memory, and at leasta portion of the contents of the list may optionally be loaded from ankernel-only readable file or from an application space readable file andoptionally passed via an interface to the kernel space 1210), the firstdriver (or module, for example a kernel loadable module) 1214 verifiesthat the port 1204 corresponds to a valid port for the user 1206 and theprogram 1208, and obtains a network tunnel port number and data protocolfor the data packet. The first driver (or module, for example a kernelloadable module) 1214 further verifies that the network tunnel portnumber is associated with a usable network tunnel. A builder module 1222is invoked to assemble descriptors for the user 1206, the program 1208,and the data protocol into packet metadata. A data portion of the datapacket is passed to a translator module 1224 to encode the data intotranslated data for transmission across the network tunnel. The packetmetadata and translated data are encrypted by an encryption module 1226using cryptographic keys specific to the network tunnel obtained from afile 1228 and an encrypted result is passed to an assembler module 1230to form a modified data packet. The modified data packet is communicatedto the network stack 1212 and a frame containing the modified datapacket transmitted to the network tunnel by a physical interface 1232.Prior to communicating the modified data packet to the network tunnel,the first driver (or module, for example a kernel loadable module) 1214verifies that the network tunnel is in a valid state for transmittingdata. The list 1220 of allowed network connections is loaded into kernelaccess memory by a second driver (or module, for example a kernelloadable module) 1234 having sole permission to read a cryptographicallysigned, read-only, kernel access-only file 1236 (in an alternativeembodiment, the file 1236 may be an application space file and thesecond driver (or module, for example a kernel loadable module) 1234 maybe an application space program). For illustrative purposes only, andnot as part of the embodiment, path A shows that data packet sent fromthe program port 1204 would pass through the network stack 1212 and thephysical interface 1232 to the network 1202 were the first driver (ormodule, for example a kernel loadable module) 1214 not present.

A schematic view of an exemplary node 1200 receiving data from a network1202 is illustrated in FIG. 13. A data packet containing translated datareceived from a network tunnel over the network 1202 and sent from aremote program port by a remote user passes through a physical interface1232 and a network stack 1212. The data packet is received (orintercepted) by a first driver (or module, for example a kernel loadablemodule) 1214 of a network security layer 1216 in kernel space 1218 anddirected to assembler 1230, where it is disassembled into encryptedmetadata and the translated data (if the translated data is encryptedthe encrypted translated data is passed with the encrypted metadata toan encryption module 1226, otherwise the unencrypted translated data isrouted directly to a translation module 1224). Decrypted metadataobtained by passing the encrypted metadata through the encryption module1226 is inspected by a validation module 1300 to verify that adescriptor comprising a remote application code, a remote user code, anda data protocol code match an expected value for the network tunnel. Ifthe match is verified, the translated data is decrypted (if necessary)by encryption module 1226 and in any event the unencrypted/decryptedtranslated data is passed to a translator module 1224 for conversioninto native format data and transmitted via a loopback interface to alocal port 1204 associated with a resident program 1208.

A schematic view of an unsecure node 1400 transmitting data 1402 over anetwork 1404 to an exemplary secure node 1406 via an exemplary gatewayserver 1408 is illustrated in FIG. 14. The transmitted data 1402 passesthrough a physical interface 1410 into a network stack 1412 in a kernelspace 1414 of the gateway server 1408 and to a trusted application 1416in an application space 1418 of the gateway server. Trusted data istransmitted from trusted application 1416 through a loopback interfaceof the network stack 1412 to a network security software 1420, a portionof which executes in the kernel space 1414 and a portion in a secondapplication space 1418. The network security software 1420 routes thetrusted data across the network 1404 through a pre-authorized encryptednetwork tunnel 1422 to a physical interface 1424 of the secure node1406. Once in the secure node 1406, the trusted data is passed through anetwork stack 1426 in a kernel space 1428 of the secure node 1406 andnetwork security software 1430 and directed to a recipient application1432 in an application space 1434 of the secure node 1406. The networksecurity software 1420 and the network security software 1430 managedata traffic through the encrypted network tunnel 1422 based onparameters (1436 and 1438, respectively) loaded from encrypted,read-only files (1440 and 1442, respectively) by computer programs (1444and 1446, respectively). The parameters include, inter alia, sharedsecret node identification codes for the secure node 1406 and thegateway server 1408, a port number of the network security software1430, a port number of the recipient application 1432, a processidentification code and a process owner code associated with therecipient application 1432, and a data protocol associated with thetransmitted data 1402. The encrypted, read-only files (1440 and 1442,respectively) are maintained by security configuration server 1448,which transmits updated encrypted configuration data (1450 and 1452,respectively) through encrypted network tunnels (1454 and 1456,respectively) to file update programs (1458 and 1460, respectively) asshown. In another embodiment, the computer programs (1444 and 1446,respectively) responsible for loading the encrypted, read-only files(1440 and 1442, respectively) may be positioned in the applicationspaces (1418 and 1434, respectively) rather than the kernel spaces (1414and 1428, respectively).

A schematic view of an unsecure node 1500 transmitting data 1502 over anetwork 1504 to an exemplary secure node 1506 via an exemplary gatewayserver 1508 executing a separation kernel 1510 is illustrated in FIG.15. The transmitted data 1502 passes through a physical interface 1512into a first network stack 1516 of a first kernel space 1514 and to atrusted application 1518 in a first application space 1520. Trusted data1522 is transmitted from trusted application 1518 through the separationkernel 1510 to a second network stack 1524 in a second kernel space 1526and network security software 1528, a portion of which executes in thesecond kernel space 1526 and a portion in a second application space1530. The network security software 1528 routes the trusted data 1522across the network 1504 through a pre-authorized encrypted networktunnel 1532 to a physical interface 1534 of the secure node 1506. Oncein the secure node 1506, the trusted data 1522 is passed through anetwork stack 1536 in a kernel space 1538 of the secure node 1506 andnetwork security software 1540 and directed to a recipient application1542 in an application space 1544 of the secure node 1506. Networksecurity software 1528 and network security software 1540 manage datatraffic through the encrypted network tunnel 1532 based on parameters(1546 and 1548, respectively) loaded from encrypted, read-only files(1550 and 1552, respectively) by kernel mode programs (1554 and 1556,respectively). The encrypted, read-only files (1550 and 1552,respectively) are maintained by security configuration server 1558,which transmits updated encrypted configuration data (1560 and 1562,respectively) through encrypted network tunnels (1564 and 1566,respectively) to file update programs (1568 and 1570, respectively) asshown.

FIG. 20 depicts data processing steps according to an exemplary securecommunication protocol. A server security middleware detects 2000 aserver bind request by a server application to open a port of the server(the “server port”) and accesses a server lookup table to validate 2002the authority of the server to open a port having the port number (the“server port number”) assigned to the server port. Following successfulvalidation 2002, the server port is opened and enters 2004 listeningmode. A client security middleware detects 2006 a connection requestfrom a client application and accesses a client lookup table to validate2008 the authority of the client to form a data pathway to the serverport. Following successful validation 2008, the client securitymiddleware opens a client port and constructs and transmits 2010 anencrypted tunnel connection request packet 2012, comprising formingclient authentication metadata 2014 and inserting the clientauthentication metadata into the packet 2012, the client authenticationmetadata comprising a connection state code. The connection state codeis configured to be interpreted by the server security middleware thatformation of an encrypted tunnel between the client security middlewareand the server security middleware is in process. The destination portof the connection request packet 2012 is obtained from the client lookuptable based on the server port number, and may be the same or differentfrom the server port number. Upon receipt of the connection requestpacket 2012 at the server port, the server security middleware inspects2016 the metadata 2014 and confirms 2016 the connection state. Followingthe inspecting and confirming 2016, the server security middlewareconstructs and transmits 2018 an encrypted tunnel reply packet 2020,comprising forming server authentication metadata 2022 and inserting theserver authentication metadata into the packet 2020, the serverauthentication metadata comprising a connection state code. Upon receiptof the reply packet 2020, the client security middleware inspects 2024the metadata 2022 and confirms 2024 that the connection state codematches an expected connection state (i.e., that formation of anencrypted tunnel between the client security middleware and the serversecurity middleware is in process). Further steps are taken to completeformation of the encrypted tunnel between the client security middlewareand the server security middleware, and upon completion both the clientsecurity middleware and the server security middleware note that theencrypted tunnel has been formed. Following the comparing and confirming2024 and formation of the encrypted tunnel, the client securitymiddleware constructs and transmits 2026 a client node identificationpacket 2028, comprising obtaining a client node identification code fromthe client lookup table, encrypting the client node identification codeand a connection state code, and inserting the encrypted client nodeidentification code 2030 and the encrypted connection state code 2032(the connection state code indicating that the client and server areauthenticating and authorizing one another following establishment ofthe encrypted network tunnel) into the client node identification packet2028. Upon receipt of the client node identification packet 2028 at theserver, the server security middleware verifies 2034 that the clientnode identification code is uniquely assigned to the data pathway,comprising successfully decrypting the encrypted client nodeidentification code 2030 and the connection state code 2032 andverifying that the decrypted client node identification code matches anexpected value in the server lookup table for the destination portnumber of the packet. Following the verification 2034, the serversecurity middleware constructs and transmits 2036 a server nodeidentification packet 2038, comprising obtaining a server nodeidentification code from the server lookup table, encrypting the servernode identification code and a connection state code (the connectionstate code indicating that the client and server are authenticating andauthorizing data protocol transmitted over the data pathway as well asusers and applications that are parties to the data pathway followingestablishment of the encrypted network tunnel), and inserting theencrypted server node identification code 2040 and the encryptedconnection state code 2042 into the server node identification packet2038. Upon receipt of the server node identification packet 2038 at theclient, the client security middleware verifies 2044 that the servernode identification code is uniquely assigned to the data pathway,comprising successfully decrypting the encrypted server nodeidentification code 2040 and the connection state code 2042 andverifying that the decrypted server node identification code matches anexpected value in the client lookup table. Following the verification2044, the client security middleware constructs and transmits 2046 aclient authorization packet 2048, comprising obtaining clientauthentication metadata from the client lookup table, encrypting theclient authentication metadata and a connection state code, andinserting the encrypted client authentication metadata 2050 and theconnection state code 2052 into the client authorization packet 2048,the client authentication metadata comprising a client identifier, auser identifier, and a data protocol descriptor obtained from the clientlookup table. Upon receipt of the client authorization packet 2048 atthe server, the server security middleware verifies 2054 that the serverapplication is authorized to form a data pathway to receive data fromthe client application, comprising decrypting the encrypted clientauthentication metadata 2050 and verifying that the decrypted clientauthentication metadata matches an expected value in the server lookuptable for the data pathway as determined from the server lookup tablebased on the destination port number of the packet. Following theverification 2054, the server security middleware constructs andtransmits 2056 a server authorization packet 2062, comprising obtainingserver authentication metadata from the server lookup table, encryptingthe server authentication metadata and a connection state code, andinserting the connection state code 2058 and the encrypted serverauthentication metadata 2060 into the server authorization packet 2062,the server authentication metadata comprising a server identifier, auser identifier, and a data protocol descriptor obtained from the clientlookup table. Upon receipt of the server authorization packet 2062 atthe client security middleware, the client security middleware verifies2064 that the client port is authorized to form a data pathway with theserver port, comprising decrypting the encrypted server authenticationmetadata 2060 and verifying that the decrypted server authenticationmetadata matches an expected value in the server lookup table. Followingthe verification 2064, the server and the client note that an openconnection state exists for transfer of data between the client securitymiddleware and the server security middleware, and the clientapplication transmits data to the client security middleware, and theclient security middleware constructs and transmits 2066 a client datapacket 2068 to the server, comprising encrypting client authenticationmetadata and data, and inserting the encrypted client authenticationmetadata 2070 and encrypted data 2072 into the client data packet 2068.Following receipt of the client data packet 2068 at the server, theserver security middleware verifies 2074 that the data is authorized tobe received by the server application, comprising successfullydecrypting the encrypted client authentication metadata 2070 andverifying that the decrypted client authentication metadata matches anexpected value in the server lookup table based on the server portnumber. Upon verification 2074, the server security middleware transmits2076 unencrypted data to the server port.

A schematic view of a network configuration first node identifier 2102and first data structure 2104 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on afirst node 2100 is depicted and a network configuration second nodeidentifier 2202 and second data structure 2204 stored in anon-transitory computer-readable storage medium (for example anonvolatile memory) on a second node 2200 is depicted in FIGS. 21 & 22.The data structures comprise records 2106 and 2206, each record composedof several fields that are interpreted by network security middleware todefine authorized network connections. Optional first fields 2108 and2208 contain identifiers for a network interface controller(s) of thefirst node and the second node, respectively. Second fields 2110 and2210 contain identifiers for application process owners of the firstnode and the second node, respectively. Third fields 2112 and 2212contain identifiers for application processes (corresponding to therespective application process owner identifiers) of the first node andthe second node, respectively. Fourth fields 2114 and 2214 containremote node identifiers (for example field 2114 might contain the secondnode identifier). Fifth fields 2116 and 2216 contain identifiers forremote application process owners. Sixth fields 2118 and 2218 containidentifiers for remote application processes (for example 2116 and 2118might contain a process owner identifier and an application processidentifier for a process on the second node). Optional seventh fields2120 and 2220 contain port number identifiers for correspondingapplication processes of the first node and the second node,respectively. As shown, the field may be blank, for example if a localport is dynamically assigned following a connection request. Optionaleighth fields 2122 and 2222 contain tunnel port number identifiers fornetwork security software of the first node and network securitysoftware of the second node, respectively. As shown, the field may beblank, for example if a local port is dynamically assigned following aconnection request. Ninth fields 2124 and 2224 contain port numberidentifiers for a server application process. The server applicationprocess port number identifier may correspond, as the case may be, toeither the local application process specified in fields 2110 and 2112(or 2210 and 2212) on the first node or second node, respectively, ormay correspond to a remote application process to which a connection maybe formed. Tenth fields 2126 and 2226 contain tunnel port numberidentifiers for network security software in communication with (and onthe same node as) the server application process. The first node 2100 isa source or a destination node for communication of packet data and/or adata stream (and hosts a client or a server) in each of the recordspresent in data structure 2104 (likewise, the second node is a source ora destination node for communication of packet data and/or a data streamin each of the records present in data structure 2204). The first record2130 of the first node 2100, for example, is used by first networksecurity software on the first node 2100 to configure a connection fromthe first node (having a node identifier 2102 “SID 1”) to transmit datahaving data type “0001” from client application process “APP 1” havingprocess owner “USER A” via port “7001” to port “8001” associated withserver application process “APP 4” having process owner “USER D” on thesecond node (having node identifier 2202 “SID 2”). Once a connection isformed, the client application process port “7001” is in communicationvia a loopback interface to first network security software present onthe first node 2200, and said first network security software havingopened a port “12001” which is bound to interface “NIC 001”. The firstnetwork security software has a further connection to port 13001associated with second network security software on the second node 2200(having second node identifier 2202 “SID 2”). The second networksecurity software at port “12001” is in communication via a loopbackinterface to process application “APP 4” at port “8001” on the secondnode 2200. On the second node 2200, the first record 2230 corresponds tothe first record 2130 of the first node 2100 because the local processand process owner identifiers (2212 and 2210) match the remote processand process owner identifiers (2118 and 2116) on the first node 2100 andbecause the destination port fields match (2124 and 2126 match 2224 and2226, respectively). Records 2132 and 2134 illustrate a scenario inwhich a common application “APP 2” can be used by two processes (the twoprocesses owned by “USER A” and “USER B”, respectively) on the firstnode 2100, which are configured to form connections to communicate datawith remote processes (application “APP 4” having owner “USER D” on thesecond node 2200 and “APP 5” having owner “USER F” on a third node (notshown) having an identifier “SID 3”). The second record 2232 of thesecond node 2200 illustrates a scenario in which a process runningapplication “APP 5” having a process owner “USER T” on the second node2200 is configured to forms a connection to communicate data with aprocess running application “APP 6” having process owner “USER U” on thethird node (not shown).

In addition to the fields 2108-2128 and the fields 2208-2228, in certainembodiments, for example, the data structures 2104 and/or 2204 maycontain additional fields. In certain embodiments, for example, the datastructure 2104 may be divided among two or more files (for example twofiles, three files, or four files). In certain embodiments, for example,the data structure 2204 may be divided among two or more files (forexample two files, three files, or four files). The ordering of fields2108-2128 and the ordering of fields 2208-2228 is a non-limiting examplecomprising certain embodiments of the present disclosure. Certainembodiments may comprise, for example, any of the other orderings whichmay be generated by permuting the orderings of fields 2108-2128 and/orthe orderings of fields 2208-2228, or a subset or all of the orderingswhich may be generated by permuting the orderings of fields 2108-2128and/or the orderings of fields 2208-2228.

A schematic view of a network configuration first node identifier 2302and third data structure 2304 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on afirst node 2300 is depicted and a network configuration second nodeidentifier 2402 and fourth data structure 2404 stored in anon-transitory computer-readable storage medium (for example anonvolatile memory) on a second node 2400 is depicted in FIGS. 23 & 24.The data structures comprise records 2306 and 2406, each record composedof several fields that are interpreted by network security middleware todefine authorized network connections. Optional first fields 2308 and2408 contain identifiers for a network interface controller(s) of thefirst node and the second node, respectively. Second fields 2310 and2410 contain identifiers for application process owners of the firstnode and the second node, respectively. Third fields 2312 and 2412contain identifiers for application processes (corresponding to therespective application process owner identifiers) of the first node andthe second node, respectively. Fourth fields 2314 and 2414 containremote node identifiers (for example field 2314 might contain the secondnode identifier). Fifth fields 2316 and 2416 contain identifiers forremote application process owners. Sixth fields 2318 and 2418 containidentifiers for remote application processes (for example 2316 and 2318might contain a process owner identifier and an application processidentifier for a process on the second node). Optional seventh fields2320 and 2420 contain port number identifiers for correspondingapplication processes of the first node and the second node,respectively. As shown, the field may be blank, for example if a localport is dynamically assigned following a connection request. Eighthfields 2324 and 2424 contain port number identifiers for a serverapplication process. The server application process port numberidentifier may correspond, as the case may be, to either the localapplication process specified in fields 2310 and 2312 (or 2410 and 2412)on the first node or second node, respectively, or may correspond to aremote application process to which a connection may be formed. Thefirst node 2300 is a source or a destination node for communication ofpacket data and/or a data stream (and hosts a client or a server) ineach of the records present in data structure 2304 (likewise, the secondnode is a source or a destination node for communication of packet dataand/or a data stream in each of the records present in data structure2404). The first record 2330 of the first node 2300, for example, isused by first network security software on the first node 2300 toconfigure a connection from the first node (having a node identifier2302 “SID 1”) to transmit data having data type “0001” from clientapplication process “APP 1” having process owner “USER A” via port“7001” (bound to “NIC 001”) to port “8001” associated with serverapplication process “APP 4” having process owner “USER D” on the secondnode (having node identifier 2402 “SID 2”). Once a connection is formed,packet data from the client application process port “7001” is receivedby first network security software present on the first node 2400, whichperforms first network security functions followed by releasing thepacket data for transmission to the second node 2400 where it isreceived by second network security software. The second networksecurity software performs second network security functions andreleases the packet to its destination of port “8001” associated with aprocess running application “APP 4” having process owner “USER D”. Onthe second node 2400, the first record 2430 corresponds to the firstrecord 2330 of the first node 2300 because the local process and processowner identifiers (2412 and 2410) match the remote process and processowner identifiers (2318 and 2316) on the first node 2300 and because thedestination port fields match (2324 matches 2424). Records 2332 and 2334illustrate a scenario in which a common application “APP 2” can be usedby two processes (the two processes owned by “USER A” and “USER B”,respectively) on the first node 2300, which are configured to formconnections to communicate data with remote processes (application “APP4” having owner “USER D” on the second node 2400 and “APP 5” havingowner “USER F” on a third node (not shown) having an identifier “SID3”). The second record 2432 of the second node 2400 illustrates ascenario in which a process running application “APP 5” having a processowner “USER T” on the second node 2400 is configured to forms aconnection to communicate data with a process running application “APP6” having process owner “USER U” on the third node (not shown). Inaddition to the fields 2308-2328 and the fields 2408-2428, in certainembodiments, for example, the data structures 2304 and 2404 may containadditional fields. In certain embodiments, for example, the datastructure 2304 may be divided among two or more files (for example twofiles, three files, or four files). In certain embodiments, for example,the data structure 2404 may be divided among two or more files (forexample two files, three files, or four files). The ordering of fields2308-2328 and the ordering of fields 2408-2428 is a non-limiting examplecomprising certain embodiments of the present disclosure. Certainembodiments may comprise, for example, any of the other orderings whichmay be generated by permuting the orderings of fields 2308-2328 and/orthe orderings of fields 2408-2428, or a subset or all of the orderingswhich may be generated by permuting the orderings of fields 2308-2328and/or the orderings of fields 2408-2428.

A schematic view of a network configuration fifth data structure 2500stored in a non-transitory computer-readable storage medium (for examplea nonvolatile memory) on a first node 2502 is depicted and a networkconfiguration sixth data structure 2600 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on asecond node 2502 is depicted in FIGS. 25 & 26. The data structurescomprise records 2504 and 2604, each record composed of several fields2506 and 2606 that are interpreted by network security middleware todefine authorized network connections. First fields 2508 and 2608contain node identification codes for a source node (i.e., a node havinga resident application that is configured to send data to a differentapplication that is resident on a destination node via a network).Second fields 2510 and 2610 contain codes for a network interfacecontroller of the source node, processor, or computing device. Thirdfields 2512 and 2612 contain unique identifiers for the applicationconfigured to send data, the unique identifiers comprising anapplication code and a user code (for example an application code and auser code obtained from a process status check). Fourth fields 2514 and2614 contain node identification codes for destination nodes (i.e.,nodes having a resident application configured to receive data from anapplication resident on a source node via a network). Fifth fields 2516and 2616 contain codes for network interface controllers of thedestination node, processor, or computing device. Sixth fields 2518 and2618 contain unique identifiers for applications configured to receivedata, each unique identifier comprising an application code and a usercode (for example an application code and a user code obtained from aprocess status check). Seventh fields 2520 and 2620 contain destinationport numbers for the applications configured to receive data. Eighthfields 2522 and 2622 contain port numbers for network security softwarepresent on the destination nodes. Ninth fields 2524 and 2624 containdescriptors for authorized data protocol for the connection. The firstnode is a source or a destination node in each of the records present indata structure 2500 (likewise, the second node is a source or adestination node in each of the records present in data structure 2600).For example, in a first record 2526, the source node identification codeis the node identification for the first node (designated “SID(1)”), thesource network interface controller code is a code for an interface “2”on the source node (designated “NIC(1,2)”), and the source applicationidentifier names an application “A” resident on the first node and user“T” (designated “APP(A,T)”). The first record 2526 defines a connectionfor transmitting data having an authorized data protocol descriptor“0001” from application “A” having user “T” on the first node to adestination at the second node, specifically a destination application“B” having a user “U” and a destination port having a port number “7001”via a network tunnel having a port number “12001” (i.e., networksecurity middleware present on the second node will be associated with aport having a port number “12001”, the port forming a destinationendpoint of the network tunnel). In order for the connection to formbetween the first node and the second node, the data structure 2600 mustcontain an identical entry 2626—otherwise network security middlewarepresent on the first node and/or the second node will prevent formationof the connection. In addition, the source application identifier ofeach data packet is verified by network security middleware present onthe source node and included as metadata in each network packettransmitted over the network tunnel to the destination node, processor,or computing device. Any network packet containing inconsistentapplication and/or user information will be dropped by network securitymiddleware resident on the destination node before being transmitted tothe destination application. In addition, the network securitymiddleware resident on the destination node will terminate theconnection if more than a threshold number erroneous packets isdetected. A second record 2528 of the first data structure illustrates acase where an application “D” and user “T” resident on the first nodeare configured to receive data having a protocol descriptor “0002” at anassociated port having a port number “8001” via a tunnel port having aport number “13001” (i.e., port number “13001” is associated with orassigned to security middleware resident on the first node) from anapplication “C” and user “V” resident on a third node (not shown). It isnoted that each tunnel port and each destination port are dedicated to asingle connection—i.e., the same ports may not be used for differentconnections even if data is being transmitted between the sameapplications/users. For example, a third record 2530 (and a matchingrecord 2628 present in the second data structure) differs from the firstrecord only due to a difference in the protocol of the data transmitted,requiring different port numbers as shown.

In addition to the fields 2508-2524 and the fields 2608-2624, in certainembodiments, for example, the data structures 2504 and 2604 may containadditional fields. In certain embodiments, for example, the datastructure 2504 may be divided among two or more files (for example twofiles, three files, or four files). In certain embodiments, for example,the data structure 2604 may be divided among two or more files (forexample two files, three files, or four files). The ordering of fields2508-2524 and the ordering of fields 2608-2624 is a non-limiting examplecomprising certain embodiments of the present disclosure. Certainembodiments may comprise, for example, any of the other orderings whichmay be generated by permuting the orderings of fields 2508-2524 and/orthe orderings of fields 2608-2624, or a subset or all of the orderingswhich may be generated by permuting the orderings of fields 2508-2524and/or the orderings of fields 2608-2624.

A schematic view of a network configuration seventh data structure 2700stored in a non-transitory computer-readable storage medium (for examplea nonvolatile memory) on a first node 2702 is depicted and a networkconfiguration eighth data structure 2800 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on asecond node 2802 is depicted in FIGS. 27 & 28. The data structurescomprise records 2704 and 2804, each record composed of several fields2706 and 2806 that are interpreted by network security middleware todefine authorized network connections. First fields 2708 and 2808contain an identifier for a user of an application. Second fields 2710and 2810 contains an identifier for the application. Third fields 2712and 2812 contain a descriptor for an authorized data protocol for theconnection. Fourth fields 2714 and 2814 contain a port number for alocal application. Fifth fields 2716 and 2816 contain a port number forlocal network security middleware. Sixth fields 2718 and 2818 contain aport number for a remote application. Seventh fields 2720 and 2820contain a port number for remote network security middleware. Eachrecord in the seventh data structure 2700 is a unique n-tuple andlikewise in the eighth data structure 2800. Furthermore, the fourthfield 2714 and the fifth field 2716 of each record in the seventh datastructure 2700 form a unique 2-tuple, and likewise in the eighth datastructure 2800. In addition, the sixth field 2718 and the seventh field2718 of each record in the seventh data structure 2700 form a unique2-tuple, and likewise in the eighth data structure 2800. The first node2702 and the second node 2802 are constrained by their respectivenetwork security middleware to form only those network connections withport numbers and data protocol according to the seventh data structure2700 and the eighth data structure 2800. For instance, based on thefirst record 2722 of the seventh data structure 2700 and the firstrecord 2822 of the eighth data structure 2800, “USER A” of “APP 1” maycommunicate data with “USER D” of “APP 4” between port 6001 associatedwith “APP 1” and port “11001” associated with “APP 4” because, interalia, the local application port number 2714 of the first record 2722 ofthe seventh data structure 2700 matches the remote application portnumber 2818 of the first record 2822 of the eighth data structure 2800,and vice versa; and because the data protocol descriptor 2712 of thefirst record 2722 of the seventh data structure 2700 matches the dataprotocol descriptor 2812 of the first record 2822 of the eighth datastructure 2800. However, a “USER B” running application “APP 1” on thefirst node 2702 would not be able to form a connection based on localport “6002” with “USER D” running “APP 4” at least because the dataprotocol descriptor 2812 according to second record 2824 of the eighthdata structure 2800 (i.e., “V”) differs from the data protocoldescriptor 2712 of the second record 2724 of the seventh data structure2700 (i.e., “W”). Of further note, communication with the same userrunning the same application but with a different data protocol requiredifferent sets of local and remote ports (compare, for example, a thirdrecord 2726 and a fourth record 2728 of the seventh data structure2700). In addition to the fields 2708-2720 and the fields 2808-2820, incertain embodiments, for example, the data structures 2704 and 2804 maycontain additional fields. In certain embodiments, for example, the datastructure 2704 may be divided among two or more files (for example twofiles, three files, or four files). In certain embodiments, for example,the data structure 2804 may be divided among two or more files (forexample two files, three files, or four files). The ordering of fields2708-2720 and the ordering of fields 2808-2820 is a non-limiting examplecomprising certain embodiments of the present disclosure. Certainembodiments may comprise, for example, any of the other orderings whichmay be generated by permuting the orderings of fields 2708-2720 and/orthe orderings of fields 2808-2820, or a subset or all of the orderingswhich may be generated by permuting the orderings of fields 2708-2720and/or the orderings of fields 2808-2820.

A schematic view of an exemplary node 2900 transmitting data to anetwork 2902 is illustrated in FIG. 29. A data packet sent from aprogram port 2904 by a user 2906 of a program 2908 to a network stack2912 is routed to a first driver (or module, for example a kernelloadable module) 2914 of a network security layer 2916 (which securitylayer may operate in a kernel space, an application space, or acombination thereof). Based on a list 2920 of allowed networkconnections, the first driver (or module, for example a kernel loadablemodule) 2914 verifies that the user 2906 and the program 2908 arepermissible, and obtains a network tunnel port number and data protocolfor the data packet. The first driver (or module, for example a kernelloadable module) 2914 further verifies that the network tunnel portnumber is associated with a network tunnel that is in a valid state fortransmitting data (for example having an open connection status). Abuilder module 2922 is invoked to assemble descriptors for the user2906, the program 2908, and the data protocol into packet metadata. Adata portion of the data packet is passed to a translator module 2924 toencode the data into translated data for transmission across the networktunnel. The packet metadata and optionally the translated data areencrypted by an encryption module 2926 using cryptographic keys specificto the network tunnel obtained from a file 2928 and an encrypted resultis passed to an assembler module 2930 to form a modified data packet. Ifthe translated data is not encrypted, it may bypass the encryptionmodule 2928 and instead be passed directly to the assembler module 2930as shown. The modified data packet is communicated to the network stack2912 and a frame containing the modified data packet transmitted to thenetwork tunnel by a physical interface 2932. Prior to communicating themodified data packet to the network tunnel, the first driver (or module,for example a kernel loadable module) 2914 verifies that the networktunnel is in a valid state for transmitting data. For illustrativepurposes only, and not as part of the embodiment, path A shows that datapacket sent from the program port 2904 would pass through the networkstack 2912 and the physical interface 2932 to the network 2902 were thefirst driver (or module, for example a kernel loadable module) 2914 notpresent.

A schematic view of an exemplary node 3000 receiving data from a network3002 is illustrated in FIG. 30. A data packet containing translated datareceived from a network tunnel over the network 3002 and sent from aremote program port by a remote user passes through a physical interface3032 and a network stack 3012. The data packet is received (orintercepted) by a first driver (or module, for example a kernel loadablemodule) 3014 (which may optionally be in a kernel space (for example anetwork API) or an application space) of a network security layer 3016and directed to assembler 3030, where it is disassembled into encryptedmetadata and the translated data (if the translated data is encryptedthe encrypted translated data is passed with the encrypted metadata toan encryption module 3026, otherwise the unencrypted translated data isrouted directly to a translation module 3024). Decrypted metadataobtained by passing the encrypted metadata through the encryption module3026 is inspected by a validation module 3001 to verify that adescriptor comprising a remote application code, a remote user code, anda data protocol code match an expected value for the network tunnel. Ifthe match is verified, the translated data is decrypted (if necessary)by encryption module 3026 and in any event the unencrypted/decryptedtranslated data is passed to a translator module 3024 for conversioninto native format data and transmitted via a loopback interface to alocal port 3004 associated with a resident program 3008.

A schematic view of an unsecure node 3100 transmitting data 3102 over anetwork 3104 to an exemplary secure node 3106 via an exemplary gatewayserver 3108 is illustrated in FIG. 31. The transmitted data 3102 passesthrough a physical interface 3110 into a network stack 3112 of thegateway server 3108 and to a trusted application 3116 of the gatewayserver (for example a trusted application running in an applicationspace of the gateway server). Trusted data is transmitted from trustedapplication 3116 through a loopback interface of the network stack 3112to a network security software 3120, (in certain embodiments, forexample, a portion of the network security software may execute inkernel space and a further portion may execute in application space, or,in certain other embodiments, the network security software may executeonly in kernel space or application space). The network securitysoftware 3120 routes the trusted data across the network 3104 through apre-authorized encrypted network tunnel 3122 to a physical interface3124 of the secure node 3106. Once in the secure node 3106, the trusteddata is passed through a network stack 3126 of the secure node 3106 andnetwork security software 3130 and directed to a recipient application3132 of the secure node 3106. The network security software 3120 and thenetwork security software 3130 manage data traffic through the encryptednetwork tunnel 3122 based on parameters (3136 and 3138, respectively)loaded from encrypted, read-only files (3140 and 3142, respectively) bycomputer programs (3144 and 3146, respectively). The parameters include,inter alia, shared secret node identification codes for the secure node3106 and the gateway server 3108, a port number of the network securitysoftware 3130, a port number of the recipient application 3132, aprocess identification code and a process owner code associated with therecipient application 3132, and a data protocol associated with thetransmitted data 3102. The encrypted, read-only files (3140 and 3142,respectively) are maintained by security configuration server 3148,which transmits updated encrypted configuration data (3150 and 3152,respectively) through encrypted network tunnels (3154 and 3156,respectively) to file update programs (3158 and 3160, respectively) asshown. In certain embodiments, for example, the computer programs (3144and 3146, respectively) responsible for loading the encrypted, read-onlyfiles (3140 and 3142, respectively) may be positioned in applicationspaces. In certain embodiments, for example, the computer programs (3144and 3146, respectively) responsible for loading the encrypted, read-onlyfiles (3140 and 3142, respectively) may be positioned in kernel spaces.In certain embodiments, for example, one the computer programs (3144 or3146, respectively) responsible for loading the encrypted, read-onlyfiles (3140 and 3142, respectively) may be positioned in an applicationspace and the other of the computer programs may be positioned in akernel space.

A schematic view of a network configuration first node identifier 3202and ninth data structure 3204 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on afirst node 3200 is depicted and a network configuration second nodeidentifier 3302 and tenth data structure 3304 stored in a non-transitorycomputer-readable storage medium (for example a nonvolatile memory) on asecond node 3300 is depicted in FIGS. 32 & 33. The data structurescomprise records 3206 and 3306, each record composed of several fieldsthat are interpreted by network security middleware to define authorizednetwork connections. First fields 3208 and 3308 contain bind-side portnumbers (i.e., numbers for listening ports or ports on server side of aconnection) for network connections formed by the first node 3200 andthe second node 3300, respectively. Second fields 3210 and 3310 providea flag, the flag indicating whether an application program will bind(“B”) the port to a loopback interface or form a connection (“C”) withthe listening port. Third fields 3212 and 3312 contain port numbers fornetwork security software resident on the first node 3200 and secondnode 3300, respectively. Fourth fields 3214 and 3314 contain networkinterface controller identifiers (for example IP addresses, DHCP names,or a proprietary identifiers). Of note, in certain embodiments a networkinterface controller identifier need not necessarily be specified whenthe bind/connect flag is set to “B” whereas it must usually be set whenthe bind/connect flat is set to “C” (i.e., in order for a connectcommand to have access to a required destination address). Fifth fields3216 and 3316 contain remote node identifiers. Sixth fields 3218 and3318 contain a read (“R”), write (“W”) or Read-Write (“R/W”) flag todetermine the allowed directionality of data flow. Optional seventh andeighth fields 3220 and 3320 and 3222 and 3322 contain staticconnection-side application and network security software port numbers(these fields are populated if static port numbers are used on theconnect side of a connection, otherwise the optional seventh fields 3220and 3320 and 3222 and 3322 may be blank and the connect-side ports setephemerally). Eighth fields 3224 and 3324 contain applicationinformation (for example, application identifier and process ownerinformation and a data protocol type) for a local application on thefirst node 3200 and second node 3300, respectively. Ninth fields 3226and 3326 contain application information (for example, applicationidentifier and process owner information and a data protocol type) for aremote application.

As shown, a bind-side port number may be associated with either a localapplication or a remote application. For example, in record 3228, theport number “6001” is associated with an application having theapplication information specified in column 3224 because thebind/connect flag 3210 is set to “B”. The first node 3200 is a source ora destination node for communication of packet data and/or a data stream(and hosts a client or a server) in each of the records present in datastructure 3204 (likewise, the second node is a source or a destinationnode for communication of packet data and/or a data stream in each ofthe records present in data structure 3304). The first record 3228 ofthe first node 3200, for example, is used by network security softwareon the first node 3200 to do its part to establish a connection from thefirst node (having a node identifier 3202 “SID 1”) to receive (“R”) datafrom an application (having an application identifier “RAID 1”) at alocal application (having an application identifier “LAID 1”). Once theconnection is formed, the application process port “6001” is incommunication via a loopback interface to network security softwarepresent on the first node 3200, said network security software havingopened a port “10001” which is bound to interface “NIC 002” (see record3328). As record 3230 shows, the network security software on the firstnode 3200 has a further connection to port “10002” associated withnetwork security software on a third node identified by “SID 3”. Records3232 and 3332 illustrate a scenario in which the second node 3300initiates a read-write (“R/W”) connection with the first node 3200 via anetwork interface controller “NIC 002” on the first node, processor, orcomputing device. Of note, “LAID 3” in the record 3232 has the samevalue as “RAID 3” in the record 3332, and “RAID 3” in the record 3232has the value as “LAID 3” in the record 3332. Of further note, “LAID 3”in the record 3232 refers to a different value than the value “LAID 3”in the record 3332. In addition to the fields 3208-3226 and the fields3308-3326, in certain embodiments, for example, the data structures 3204and 3304 may contain additional fields. In certain embodiments, forexample, the data structure 3204 may be divided among two or more files(for example two files, three files, or four files). In certainembodiments, for example, the data structure 3304 may be divided amongtwo or more files (for example two files, three files, or four files).The ordering of fields 3208-3226 and the ordering of fields 3308-3326 isa non-limiting example comprising certain embodiments of the presentdisclosure. Certain embodiments may comprise, for example, any of theother orderings which may be generated by permuting the orderings offields 3208-3226 and/or the orderings of fields 3308-3326, or a subsetor all of the orderings which may be generated by permuting theorderings of fields 3208-3226 and/or the orderings of fields 3308-3326.

EXAMPLES Prophetic Example 1

In the following Examples, maximum packet processing rates at severalprocessor loads would be determined for network security middlewareconsisting of a port filter and metadata processing engine. The portfilter would be configured to read the destination port number of eachpacket and compare said port number to a list of 500 port numbers storedin kernel random access memory. The metadata processing engine would beconfigured to extract 30 bytes of metadata from a predetermined portionof each packet, optionally decrypt the metadata using a decryptionutility executing in application space, and compare said metadata to alist of 500 30-byte data segments stored in kernel random access memory.Each 30 byte metadata would comprise a fixed 10-byte user code, a10-byte application code, and a 10-byte data protocol code. Results arepresented in Table 1.

TABLE 1 Network Security Middleware Performance Ex- Packet PacketProcessing Rate am- Processor Size (sec⁻¹)/(% wire speed³) ple Load¹(bytes) Encrypted² Middleware No Middleware 1 2.5  100 No 52,500 56,25070% 75% 2 2.5 1500 No 60,000 63,750 80% 85% 3 2.5  100 RC4 45,000 — 60%4 2.5 1500 RC4 52,500 — 70% 5 5  100 No 63,750 67,500 85% 90% 6 5 1500No 67,500 69,000 90% 92% 7 5  100 RC4 60,000 — 80% 8 5 1500 RC4 63,750 —85% 9 10  100 No 69,000 69,000 92% 92% 10  10 1500 No 71,250 73,500 95%98% 11  10  100 RC4 67,500 — 90% 12  10 1500 RC4 69,000 — 92% ¹1 GHzARM9 processor running Microlinux ²Secure Hash Algorithm 3 ³1 GbEthernet interface having 10% packet processing overhead

All publications and patent applications mentioned in this specificationare herein incorporated by reference to the same extent as if eachindividual publication or patent application was specifically andindividually indicated to be incorporated by reference.

While preferred embodiments of the present invention have been shown anddescribed herein, it will be obvious to those skilled in the art thatsuch embodiments are provided by way of example only. It is intendedthat the following claims define the scope of the invention and thatmethods and structures within the scope of these claims and theirequivalents be covered thereby.

What is claimed is:
 1. A product for securing communications of aplurality of networked computing devices, the product comprising anon-transitory computer-readable storage medium having computer-readableprogram code embodied therein, the computer-readable program codeexecutable by a first computing device of the plurality of networkcomputing devices to perform communication management operations, thecommunication management operations comprising: i) forming a configuredcommunication pathway by configuring a pre-established communicationpathway to exclusively communicate application data between a firstuser-application on the first computing device and a seconduser-application on a second computing device of the plurality ofnetwork computing devices, the first user-application operated by afirst user and the second user-application operated by a second user,the configuring comprising: a) sending a first configuration packet fromthe first computing device to the second computing device via thepre-established communication pathway, the first configuration packetcontaining a nonpublic first device identifier for the first computingdevice in an application layer portion of the first configurationpacket; b) receiving a second configuration packet from the secondcomputing device, the second configuration packet containing a nonpublicsecond device identifier for the second computing device in anapplication layer portion of the second configuration packet; c)confirming, in a kernel space of the first computing device, that thesecond computing device is authorized to communicate with the firstuser-application, comprising: matching the nonpublic second deviceidentifier to a preconfigured nonpublic second device code for thesecond computing device; d) further sending a third configuration packetfrom the first computing device to the second computing device via thepre-established communication pathway, the third configuration packetcontaining a nonpublic first user-application identifier in anapplication layer portion of the third configuration packet, wherein thenonpublic first user-application identifier is exclusive to the firstuser-application and the second user-application; e) further receiving afourth configuration packet from the second computing device, the fourthconfiguration packet containing a nonpublic second user-applicationidentifier in an application layer portion of the fourth configurationpacket; and <f) further confirming, in the kernel space of the firstcomputing device, that the second user-application is authorized toreceive the application data from the first user-application,comprising: further matching the nonpublic second user-applicationidentifier to a preconfigured nonpublic second user-application code,wherein the preconfigured nonpublic second user-application code isexclusive to the second user-application and the first user-application;and ii) preventing any transport layer ports used by the configuredcommunication pathway from being used by any other communicationpathway.
 2. The product of claim 1, wherein the communication managementoperations further comprise: i) interrupting, on the first computingdevice, a connection request from the first user-application thatrequests a connection with a transport layer destination port that isassigned to the second user-application, the connection requestcomprising a destination port number for the destination port; ii)decrypting an encrypted read-only file and identifying a data record inthe file that contains the destination port number in a destination portnumber field of the identified data record in the file, the file storedlocally on the first computing device; and iii) verifying, in the kernelspace of the first computing device, that the nonpublic firstuser-application identifier is present in a local user-applicationidentification field of the identified data record and that the receivednonpublic second user-application identifier is present in a remoteuser-application identification field of the identified data record. 3.The product of claim 2, wherein the identified data record is the onlydata record in the file that contains the destination port number in thedestination port number field.
 4. The product of claim 2, wherein thecommunication management operations prevent all user-applications fromdirectly connecting to remote computing devices.
 5. The product of claim2, wherein the communication management operations redirect all requestsfrom user-applications to connect to remote computing devices to aloopback interface.
 6. The product of claim 2, wherein the communicationmanagement operations executed on the first computing device furthercomprise: i) receiving a series of further network packets, the seriesof further network packets comprising (a) the application data, and (b)encrypted parameters in application layer portions of the furthernetwork packets; ii) decrypting, in the kernel space of the firstcomputing device, the encrypted parameters using decryption keys toobtain decrypted parameters; and iii) confirming that the decryptedparameters match the nonpublic second user-application code prior topassing the application data to the first user-application.
 7. Theproduct of claim 2, wherein the communication management operationsexecuted on the first computing device further comprise: i) receiving aseries of further network packets, the series of further network packetscomprising (a) at least portions of the application data, and (b)encrypted parameters in application layer portions of the furthernetwork packets; ii) decrypting, in the kernel space of the firstcomputing device, the encrypted parameters using decryption keys toobtain decrypted parameters; and iii) confirming that the decryptedparameters match the nonpublic second user-application code prior topassing the at least portions of the application data to the firstuser-application.
 8. The product of claim 7, wherein the series offurther network packets comprise all communications of user space datavia the configured communication pathway.
 9. The product of claim 7,wherein the nonpublic first user-application identifier is furtherexclusive to one or more content requirements for the application data.10. The product of claim 7, wherein the communication managementoperations performed in the kernel space of the first computing devicefurther comprise: confirming that the at least portions of theapplication data conform to the one or more content requirements. 11.The product of claim 7, wherein the one or more content requirementscomprise a data range.
 12. The product of claim 7, wherein the one ormore content requirements comprise a command type authorized to bepresent in the application data.
 13. The product of claim 7, wherein theone or more content requirements comprise a command type that isprohibited from being present in the application data.
 14. The productof claim 7, wherein the decryption keys are not applied to theapplication data.
 15. The product of claim 7, wherein the decryptionkeys are a series of different single-use decryption keys.
 16. Theproduct of claim 2, wherein the pre-established communication pathway isconfigured to form the configured communication pathway prior to sendingany data to the destination port.
 17. The product of claim 2, whereinthe identified data record further comprises a flag in a flag field ofthe data record, the flag specifying whether the configuredcommunication pathway is authorized for unidirectional or bidirectionaldata flow between the first user-application and the seconduser-application.
 18. The product of claim 2, wherein the communicationmanagement operations executed on the first computing device furthercomprise: i) receiving a further network packet, the further networkpacket comprising (a) at least a portion of the application data, and(b) an encrypted parameter in an application layer portion of thefurther network packet; ii) decrypting, in the kernel space of the firstcomputing device, the encrypted parameter using a decryption key toobtain a decrypted parameter; and iii) confirming that the decryptedparameter matches the nonpublic second user-application code prior topassing the at least a portion of the application data to the firstuser-application.
 19. The product of claim 1, wherein thepre-established communication pathway is a TCP connection.
 20. Theproduct of claim 1, wherein the nonpublic first device identifier has asize of at least 2048 bits, wherein at least 90% of the nonpublic firstdevice identifier is a randomly generated number.
 21. The product ofclaim 1, wherein the nonpublic first user-application identifiercomprises an application identifier for the first user-application, aprocess owner identifier for the first user, and a randomly generatednumber.
 22. The product of claim 1, wherein the configuring comprises:verifying that an authorized functional counterpart of thecomputer-readable program code is running on the second computingdevice.
 23. The product of claim 22, wherein the configuredcommunication pathway uses a dedicated transport layer port for aprocess that performs at least a portion of the communication managementoperations in the kernel space of the first computing device.
 24. Theproduct of claim 23, wherein the configured communication pathway uses adedicated transport layer for a functional counterpart of thecomputer-readable program code on the second computing device.
 25. Theproduct of claim 1, wherein the computer-readable program code comprisesat least one kernel loadable module.
 26. The product of claim 1, whereinthe first user-application is industrial control software.
 27. Theproduct of claim 1, wherein the first user-application is a healthcareapp.
 28. The product of claim 1, wherein the first computing device is amobile device.
 29. The product of claim 1, wherein a portion of thecommunication management operations are configured for execution in anapplication space of the first computing device.
 30. The product ofclaim 1, wherein the nonpublic first device identifier, the nonpublicfirst user-application identifier, the nonpublic second device code, andthe nonpublic second user-application code are shared secrets betweenthe first computing device and the second computing device.