Trusted flow and operation control method

ABSTRACT

The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.

RELATED APPLICATIONS

This application claims priority from the Provisional Patent Applicationwith Ser. No. 60/365,148; entitled, “BEST EFFORT LINEARIZATION OF TCPPACKET FLOWS,” filed Mar. 16, 2002.

FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable.

BACKGROUND OF THE INVENTION

The Internet success is the result of the IP architecture's robustness,flexibility, and ability to scale, and NOT the result of its efficiency,optimization, security, fine-grained control or performance guarantees.Furthermore, TCP/IP data networks are still suffering from some basic(quite inherent) problems, e.g., denial of service attacks and unstablethroughput.

1. Field and Context of the Invention

The field of the invention is assuring trusted operation which isguaranteed and validated by the underlying methods and systems. Inparticular assuring trusted flow of communications, and morespecifically, making sure that the end stations and users of a computernetwork operate correctly under a given and known rules oftransmissions, even though protocols, methods and software logic istypically available to users of such networks. Trusted operation meansan operation which performance complies with its allowed and definedspecifications.

This will assure network elements that stations perform their task asknown and as determined by a service agreement. It will assure serversin networks that users are behaving properly and are not overusingresources beyond the allocated and allowed parameters. The mechanismsinvolve signaling and allow piggybacking of proper signals for variouspurposes, e.g., authentication of stations and users. The mechanismsinvolve communication network software, communication network operation,control and management. They further involve cryptographic systems andfunctions and software transformation, e.g., obfuscation operation. Theyinvolve computing hardware and software systems.

In general, the underlying mechanisms assure that a “combinedfunctionality” is taken place at a computing system; part of this“combined functionality” is a crucial function of the underlyingcomputing system, whereas some other part of this “combinedfunctionality” is a method to generate an unpredictable signal. Themechanisms make sure to interlock the parts into the combinedfunctionality. The locking means that all parts must be performed. Theoperation part, which is factored into the “combined functionality” istrusted (and is typically associated with limitations, e.g., rate ofoperation or number of times before renewal of precondition for nextsub-operation). The checking is done merely by being able to check thesignal. If the signal passes the check, it means that the other(operation) part was performed as well (thus, it was performed subjectto the associated limitation, namely as a trusted one).

The operation involves a trusted flow of packets (or other units ofcommunication fields), the flow is associated with rules oftransmission. For example, a TCP connection is associated with a windowsize that allows maximum number of transmissions. A trusted flow impliesthat the end station conforms to the allocated window size. However,there is no way to impose on users and end stations to comply with theassumed parameters, and be “trusted” since typically parameters can beeasily changed.

One of the novel ideas behind our mechanisms is the “interlocking” ofparts and insisting that one part will “signal” and its checking willassure compliance, by adding a checking function to validate signals.Thus, if a TCP program with the currently correct performance parameters(i.e., rules of transmission) is interlocked with a cryptographicpseudo-random generator (with a random seed), which output cannot bepredicted, and if further the checker has a copy of the pseudo-randomgenerator, then if further the output of the pseudo random generator isput on data packet headers, then if the headers are checked and theircontent matches the expected value from the generator, the checkerconcludes that the packet flow is “trusted.”

The basic mechanism involves a system where the “combined functionality”is performed and one where it is checked. It also involves acommunication system. It involves a software transformation module toassure the interlocking of the separate functions into a combinedfunctionality, finally a management system assuming plurality ofelements implementing the combined functionality is in the network.

2. Background of the Prior Art

In traditional telephone networks the user of the telephone devicecannot overburden the network with signals beyond the allocated circuitit gets. On the other hand, in software operations and thus in computercommunication networks, a user gets access to the software in itsstation, the same software which is in charge of regulating the userhimself. As a result, users can “control” the network rather than thenetwork controlling the users.

Indeed, it is assumed that there is availability of logic (i.e.,software) of methods for controlling communication and for preparationof data packets for transmissions. The description is given in numerousbooks: “Computer Networks” (3rd Edition) by A. Tannebaum, Prentice Hall,1996; “Internetworking with TCP/IP” by D. E. Comer, Prentice-Hall, ThirdEdition, 1995, ISBN 0-13-216987-8; and “TCP/IP Illustrated, Vol. 1: TheProtocols” by W. R. Stevens, Addison-Wesley, Reading, Mass. 1994.

Known in the art, are certain methods to try to detect users'misbehavior and to react to them. Firewalls, intrusion detectionmethods, data packet filtering, connection dropping are methods to reactto user over flooding the network, they are “reactive”. See thefollowing references: “Building Internet Firewalls” (2nd Edition) byElizabeth D. Zwicky, Simon Cooper, D. Brent Chapman, Deborah Russell;Publisher: O'Reilly & Associates; ISBN: 1565928717; 2nd edition (Jan.15, 2000). “Internet Security: Professional Reference” by Derek Atkins(Editor), Paul Buis, Chris Hare, Robert Kelley, Carey Nachenberg; NewRiders Publishing; ASIN: 1562055577; Bk&Cd-Rom edition (February 1996).

Mechanisms for the avoidance of misbehavior by having a user and an endstation use trusted software and signal that they use it to a checkerare not known in the art. We are not aware of a method that furtherassures that the user cannot replace the trusted software and continueto signal correctly. We are not aware of means to identify “trustedflows” as a unique and separate stream of communication, which maydeserve a better class of service, though class of service are known inthe art and are used differently. Such a method allows one to assurethat trusted flows continue to be transmitted while using traditionalreactive methods against the non trusted flow.

Our methods use cryptographic functions, e.g., pseudo random generation,random bits generation, authentication, signature, and encryption. Suchmethods of varied level of security and efficiency are known in the art,in software packages and in hardware devices. We can employ them asneeded in accordance with the present invention. We do not assume anyinvention of any of the underlying cryptographic technique employed atdifferent steps and different mechanisms herein. A security professionalfamiliar with the art, will be able to use the cryptographic functionsand tools and embed them in accordance with the present invention. Suchmechanism are described in “Applied Cryptography: Protocols, Algorithms,and Source Code in C,” 2nd Edition by Bruce Schneier; Publisher: JohnWiley & Sons; ISBN: 0471117099; 2 edition (Oct. 18, 1995) and in“Handbook of Applied Cryptography” (CRC Press Series on DiscreteMathematics and Its Applications) by Alfred J. Menezes, Paul C. VanOorschot, Scott A. Vanstone (Editor); Publisher: CRC Press; ISBN:0849385237; (October 1996).

Same is true for underlying devices, we can employ such devices as smartcards and other portable devices (USB connection based, wireless deviceswith radio frequency, laser connection, etc.)—a security engineerfamiliar with the art and the common practice will be able to employthese elements and embed them in accordance with the present invention.

The method uses hidden programs. One method to hide programs is softwareobfuscation transformations. Methods and techniques for obfuscation arealso known in the art. They modify the “look” of the software logic, butmaintain its “semantics” (or meaning). They are analogous to compiling aprogram in high level language code to a program in “object code” or“machine code” which performs the same task but is not readable to mostof users. They make the software “unreadable” and “non-modifiable”. Wedo not invent any underlying basic code obfuscation methods. In fact,there are various methods in the art applied to the currently mostuseful programming languages. The methods take a software program (sayin Java language) and return another program (in Java as well) whichperforms the same task and approximately with the same performance. Yet,the second program is hard to read and understand. The art of programobfuscation, including all transformations on data, variables, names,control structure, etc., are given in a number of papers considered thestate of the art by C. Collberg C. Thomborson and D. Low: ‘ManufacturingCheap, Resilient and Stealthy Opaque Constructs,” ACM's POPL 1998, pages184-196; and “Watermarking, Tamper-Proofing, and Obfuscation—Tools forSoftware Protection,” by Collberg, Thomberson and Low, technical reportUniversity of Arizona to be published in IEEE Transactions on SoftwareEngineering 2002; and “A Taxonomy of Obfuscation Transformation,” by C.Collberg, technical report number 148, University of Arizona.

Additionally, Valdez and Yung describe how to add encryption operationand program distribution to obfuscation in: “Software DisEngineering:Program Hiding Architecture and Experiments,” by E. Valdez and M. Yung,Information Hiding 1999, pages 379-394, Springer Verlag Lectures inComputer Science; and “SISSECT: DIStribution for SECurity Tool,” by E.Valdez and M. Yung, ISC 2001, pages 125-143, 2001 Springer VerlagLectures in Computer Science LNCS2200, respectively. Note that theembedding of programs inside tamper proof devices and hiding encryptedprograms are also known in the art (e.g., as part of cryptographicco-processors). In accordance with the present invention, a combinationof the above techniques can be utilized.

Note that hidden programs have been traditionally employed to hide thelogic of the software. They have been used in hiding cryptographicprograms (e.g., in a tamper proof device) so that the operation is notobservable or modifiable. They have been further used to enforce certainoperation associated with content distribution and electronic commerce,assuring that such notions like digital payment and protecting ofcontent are run in an environment that is not modifiable by the user.Again, the notion of use is against modification of the workingenvironment.

Unlike the use of hiding and obfuscation of programs for the sake ofsoftware protection, the present invention does not hide the “semanticsof the program” from the user. In fact, the specification andperformance parameters can be publicly known—the goal is, in turn, anintegrity function, where the goal is for users not to be able to changethe operation software (that performs data packet transmission) whileretaining correct signaling.

In accordance with the present invention, what is needed is a mechanismthat combines many programs together so that they are inseparable. Inthis sense, hidden programs are merely a means to get a method of“interlocking mechanism” where known (rather than unknown) programs andperhaps hidden parameters (hidden) are combined into a uniquefunctionality and are inseparable. The interlocking involves puttingtogether a set of “well behaved” programs with correct and agreed uponparameters with a continuous mechanism for signaling, and associatingthe signaling checker with a method that assures good behavior of thecontinuous flow. What is new is that we involve system programs, whichare commonly known, programs that perform packet generation andperformance parameters and even known cryptographic programs with hiddenparameters.

In accordance with the present invention, a method is utilized by whichit is impossible via hidden programs to execute parts of the combinedfunctionality separately with a malicious non-trusted part replacinganother part of the combined functionality, rather than a method ofhiding the logic and its semantics.

In accordance with the present invention, a mechanism is provided forchecking component for the signals, as well as a combined communicationsystem mechanism for handling the trusted flow coming from station thatuse the combined functionality. This will give network elements that canassure trusted traffic is generated in a trusted fashion and further isvalidated.

In accordance with the present invention, methods and systems are alsoprovided which employ the elements above in a combined network and thatwill manage, renew and tune the elements, and methods for dynamicallychanging hidden program and parameters and for renewing preconditionscan be utilized as well. Finally, what is needed is a method forgenerating and distributing the combined functionality logic modules, amechanism for safe integration of separate known logic modules to thecombined functionality logic.

SUMMARY OF THE INVENTION

The present invention relates to assuring that an ongoing operationwithin computing systems is performed according to a specification andin particular it relates to a method and system for ensuring thatsources that are sending data packets will do it according to awell-defined, specified, and expected behavior. Specifically, in oneembodiment of the disclosed method and system ensures that the variousprograms that are used in sending data packets from various sources intoand across the various networks, are operating according to predefinedrules in accordance with what, data packets and traffic patterns, thevarious networks expect to receive, forward and support.

Another embodiment of the present invention, when put in the context ofthe Internet protocols, facilitates the realization of a new type of IP(Internet protocol) VPN (virtual private network). Such VPN generatesand sends data packets with security tag vectors over IP (Internetprotocol) VPN (virtual private network) connection through a networkinterface. Such a network interface can be realized as part of: afirewall, a classifier for a class of service (CoS) access control to IPnetwork, and policer as part of a differentiated services (DiffServ)access control to IP network, while mapping data packets with verifiedsecurity tag vectors to premium services. Note that premium services aredefined, for example, by CoS and DiffServ. Consequently, the datapackets that are generated and sent from a potentially non-trustedcomputing environment at the end station are, in fact, to be trustedonce the respective security tag vectors have been verified.

In accordance with one aspect of the present invention, VPN connections(trusted connections) are created by employing a trusted flow generator(TFG) and a trusted tag checker, as specified herein.

One embodiment of the present invention, herein in the Internet context,allows the network to verify and authenticate the proper operation ofthe TCP layer implementation on the users' terminals; wherein aplurality of applications transmit and receive data units to and fromother pluralities of applications through an interface layer namedsocket layer. The socket layer translates requests to send data units byeach of the plurality of applications into requests TCP_Send to aTrusted TCP Code for sending sequences of bytes to a remote end station.This further facilitates the authentication and metering of window flowcontrol and other programs used to send data packets over the Internet.Such operations can be implemented in a firewall. The firewall will makesure that a specified version of a program is running when implementinga protocol. This is a very strong integrity function, which assures theproper usage of (proper versions of) programs.

In remote monitoring of programs, typically a measure is inserted insidean obfuscated version of the program (the program sends signal whichindicate its usage, namely number of times it runs, and other issues ofcompliance with metering of usage). However, what we teach here is amechanism by which a program signals to the firewall in a way that thelocal user cannot modify it (due to obfuscation, encryption and otherhiding methods which create interlocking of the program sub-tasks in amanner which is hard to reverse engineer).

The “subliminal” or “invisible” messages sent from the correct programare not necessarily visible to or easily interpreted the user, but arewell suited for interpretation at the firewall. If the interpretation ofsignals is valid, it means that indeed the user employs the rightsoftware (program) when running the packet generation (TCP) protocol.This integrity of software via the produced signals and theirinterpretation at the firewall assure the integrity of the softwarerunning the protocol remotely. Then according to the result of thevalidity check, the firewall can decide to serve or to drop service orto classify class of service to the messages coming from this version ofthe protocol at the end-point.

The firewall is in the middle of the transmission and can act based onthe signaling from the originating software. This constitutes asecondary channel for control of software usage within an installation.This is a novel usage of metering and signaling methods. It is based ona hidden program part of an obfuscated program which is hard to reverseengineer; this part may involve hidden parameters (a seed for acryptographic pseudo random generator) which generates part of thesignal. This mechanism for monitoring remotely actual usage of softwarewhich produces unpredictable signals, can be applied to communicationprotocols, operating systems procedures, and many other software systemwhere a remote function (the firewall) checks the integrity of softwareusage remotely, and where the firewall can further act based on itsfinding and react or control the system based on the validity of thechecking of the signal.

Furthermore, in more generality, an objective of the present inventionis to ensure that programs and other units running software logic thatgenerate and send data packets, are well behaved.

The present invention further provides a method and system that consistof an end station and a network interface, such that, the networkinterface is capable of determining the authenticity of the program usedby the end station to generate and send data packets. The method isbased on using a hidden program that was obfuscated within the programthat is used to generate and send data packets from the end station.

In another embodiment of the present invention, the hidden program isupdated dynamically and it may include the functionality for generatinga pseudo random sequence of security signals. Only the network interfaceknows how the pseudo random sequence of security signals were generated,and therefore, the network interface is able to check the validity ofthe pseudo random sequence of security signals, and thereby, verify theauthenticity of the programs used to generate and send data packets.

This method is based on using a hidden program that was obfuscated andencrypted within the program that is used to generate and send datapackets from the end station. The hidden program is updated dynamicallyand it includes the functionality for generating a pseudo randomsequence of security signals. The method further comprises of means forcoordinating the initialization of the end station and networkinterface.

Another embodiment of the present invention, involves secure integrationof separate software modules into a combined functionality. Thisembodiment provides a method and system for processing logic modules,each having a separate functionality, into a unique functionality thatis to be executed in an interlocked mode as a unique functionality. Themethod is based on taking logic modules (programs and data) with knownfunctionality and transforming them into a hidden program by integratingmodules to execute together into a logic which is partially obfuscatedand/or encrypted and/or physically hidden. The hidden program is updateddynamically to strengthen it against reverse engineering efforts. Theprogram includes the functionality for generating security signals,which are unpredictable by observers, e.g., a pseudo random sequence ofsecurity signals. Only elements that share the means for producing thesecurity signals can check their validity. The modules includeoperational tasks and performance parameters for this operation. Theoperation can be transmission of data packets with given parameters ofperformance that the hidden program contains. The generated securitysignals thus assure that the correct operation was taken place and canbe used to signal various cryptographic parameters as well.

Yet another embodiment of the present invention, further provides amethod and system for detecting and reacting to unexpectedcommunications patterns. The system consists of a plurality of endstations and a plurality of network interfaces, such that, the networkinterface is capable of determining the authenticity of the program usedby the end station to generate and send data packets. The system furtherconsists of a plurality of secure management servers, which continuouslyexchange management messages with the network interfaces. Consequently,the secure management servers have the information for detectingunexpected communications patterns. The method allows the control of endstations, and when an unexpected communication pattern is detected thenselectively, only packets from authenticated programs are allowed to betransmitted.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional illustration of a system that consists of an endstation with a trusted flow generator (TFG) that sends data packets withsecurity tags through a network interface (NI) with a trusted tagchecker (TTC), such that, the TTC is capable of determining theauthenticity of the program used by the end station to generate and sendthe data packets;

FIG. 2 is a functional illustration of a system that consists of an endstation with a trusted flow generator (TFG) that is part of the TCP/IPand UDP programs used for sending data packets with security tagsthrough a network interface (NI) with a trusted tag checker (TTC), suchthat, the TTC is capable of determining the authenticity of the TCP/IPand UDP programs used by the end station to generate and send the datapackets;

FIG. 3 is a functional illustration of a system that consists of an endstation with a trusted flow generator (TFG) that is part of rate controlsoftware with predefined parameters used for sending data packets withsecurity tags through a network interface (NI) with a trusted tagchecker (TTC), such that, the TTC is capable of determining theauthenticity of the rate control software used by the end station togenerate and send the data packets;

FIG. 4 is a schematic illustration of a security system thatauthenticates the window flow control protocol, the system includes acontroller for selectively coupling the data packets to the data networkthrough an access point;

FIG. 5 is a schematic illustration of a bi-directional security systemthat authenticates the window flow control protocol, wherein datapackets are flowing in one direction and acknowledgement signals areflowing in the other direction, the system includes a controller forselectively coupling the data packets to the data network through anaccess point;

FIG. 6 is a timing diagram of a common time reference (CTR) that isaligned to the coordinated universal time (UTC) standard, as utilized bythe present invention, wherein the UTC is divided into a plurality ofcontiguous periodic super-cycles each comprised of at least onecontiguous time cycle each comprised of at least one contiguous timeframe, wherein the super-cycle is equal to and aligned with the UTCsecond;

FIG. 7A is a description of a data packet structure that consists of aheader and a payload portions, such that, the header portion consists ofpriority field, address and port fields, and various generic data packetheader fields;

FIG. 7B is a description of the generic data packet header fields usedby the end station with its trusted flow generator (TFG);

FIG. 7C is a description of the generic data packet header fields usedby the network interface with trusted tag checker (TTC) and securitymanagement system (SMS);

FIG. 8 is a schematic description of the trusted flow generator (TFG)operation that is used to generate and send data packets with securitytags;

FIG. 9 is a schematic description of the trusted tag checker (TTC)operation that is used to check the authenticity of the program used togenerate and send data packets with security tags;

FIG. 10 is a functional structure of the trusted flow generator (TFG)that is used to generate and send data packets with security tags;

FIG. 11 is a functional structure of the trusted tag checker (TTC) thatis used to check the authenticity of the program used to generate andsend data packets with security tags;

FIG. 12A is a functional description of a program obfuscator thatconsists of interlocking logic and receives as inputs interlockingparameters and a plain program with multiple logic modules and createsas an output an obfuscated program as a single logic program;

FIG. 12B is a functional description of a program encrypter thatconsists of interlocking logic and receives as inputs interlockingparameters and a plain program with multiple logic modules and createsas an output an encrypted program as a single logic program;

FIG. 12C is a functional description of a hidden program generator thatconsists of interlocking logic and receives as inputs interlockingparameters and a plain program with multiple logic modules and createsas an output a hidden program as a single logic program;

FIG. 12D is a functional description of an object code programgenerator, e.g., software or embedded in tamper proof hardware or smartcard device, and creates as an output an object program as a singlelogic program;

FIG. 13 is a schematic description of execution of a hidden program byTFG with codes and parameters that were received from the TTC;

FIG. 14 is a description of a plain program components with well-behavedoperational program with defined rules of transmission, security tagvector (STV) generator, parameter table, and control program;

FIG. 15 is a functional description of a system implemented with tamperproof hardware;

FIG. 16 is a functional block diagram of the high protocol layers of aprotocol stack that includes a trusted Transmission Control Protocol(TCP) layer, wherein the trusted TCP layer is augmented with obfuscatedcode for generation and checking of secure tags;

FIG. 17 is a flow diagram of the TCP operations performed by a TCPsender instance when the higher layer requires transmission of data;

FIG. 18 is a flow diagram of the TCP operations performed by a TCPsender instance when unsent data is present within the TCP senderwindow, wherein the operations include computing a secure tag vector(STV) and a security tag serial number (STSN) both to be sent with a TCPsegment;

FIG. 19 is a flow diagram of the TCP operations performed by a TCPsender instance when a retransmission time-out expires and previouslytransmitted data are retransmitted together with attached STV and STSN;

FIG. 20 is a flow diagram of the TCP operations performed by a TCPreceiver instance when a new TCP segment is received, including checkinga security tag and processing acknowledgment information;

FIG. 21 is a description of a system consists of a plurality of TFGs, aplurality of TTCs, and plurality of secure management servers (SMSs),such that, the TTCs together with the SMSs are capable of detectingunexpected communications patterns;

FIG. 22 is a description of a system consists of a plurality of TFGs anda sequence of TTCs, such that, the TTCs are capable of authenticatingthe path traversed by data packets that were sent from the TFGs;

FIG. 23 is a description of the various messages exchanged among theTTCs and SMSs for detecting unexpected communications patterns and thevarious possible responses messages when detecting such pattern;

FIG. 24 is a flow chart describing the TFG operation before and afterdetecting unexpected communications patterns;

FIG. 25 is a flow chart describing the TTC operation in order to detectand after detecting unexpected communications patterns;

FIG. 26 is a flow chart describing the SMS operation in order to detectand after detecting unexpected communications patterns;

FIG. 27 is a functional description of system that consists of a TFGchallenge controller that sends an authenticate challenge requestmessage to users and programs and receives back an authenticatechallenge response message, wherein only when the response matches thechallenge the system will generate and send data packets with securitytag vectors.

FIG. 28 is a functional description of a system that generates and sendsdata packets with security tag vectors over IP (Internet protocol) VPN(virtual private network) connection through a network interface, e.g.,firewall, classifier, and policer, while mapping data packets withverified security tag vectors to premium service.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

While the present invention is susceptible of embodiment in manydifferent forms, there is shown in the drawing, and will be describedherein in detail, specific embodiments thereof with the understandingthat the present disclosure is to be considered as an exemplification ofthe principles of the present invention and is not intended to limit thepresent invention to the specific embodiments illustrated.

The present invention relates to a method and system for ensuring thatsources that are sending data packets will do so according to a welldefined and expected behavior. Specifically, the methods and systems ofthe present invention ensure that the various programs which are used tosend data packets from various sources into and across the variousnetworks, are operating according predefined rules in accordance withdata packets and traffic patterns, that the various networks expect toreceive, forward and support.

In accordance with the present invention, a general protocol is definedbetween the sources and a network interface, as shown in FIG. 1, whereinthe source contains a program for generating and sending data packetscalled Trusted Flow Generator or TFG 110TFG and the network interfacecontains a program called Security Tag Checker or TTC 120TTC forreceiving and checking data packets. The data packet that is sent by TFG110TFG contains Security Tag 111, which is part of the data packetheader or part of the data packet payload. In general, TFG 110TFG doesnot have to attach the Security Tag 111 to every data packets, but onlyto predefine selected ones. The data packets that are sent between thesource and the network are sent across an access network 140, e.g., ametro network, an enterprise network, a wireless network, and a cellularnetwork.

In some embodiments of the present invention, the network interface hasthe capability of sending to the TFG 110TFG certain operation andperformance information, e.g., Trusted Flow Parameters and Codes 121 andSecure Time-stamps 122, as shown in FIG. 1. In some embodiments of thepresent invention, the source of the Secure Time-stamps sent to 110TFGis UTC (Coordinated Universal Time a.k.a. GMT) 002. Furthermore, the TFG110TFG for the generation of the Security Tag 111 can be responsive toat least one of the Trusted Flow Parameters and Codes 121 and SecureTime-stamps 122. Consequently, the control of the TFG 110TFG operationis with the network interface.

The network interface with its TTC 120TTC can be located in variousplaces in the system, e.g., at the boundary of the carrier/ISP network150, between different carrier/ISP networks, across the carrier/ISPnetworks 150 next to servers 130Serv and across the carrier/ISP networks150 next to: enterprise networks, virtual private networks (VPNs),storage area networks (SANs), content delivery networks (CDNs).

The data packets are sent with Security Tags 111—wherein each has a sizeof at least one bit of information. The sequence of values of theSecurity Tags 111 that are generated by the TFG 110TFG is hidden in theTFG 110TFG program in a manner in which the user of the program does notknow in advance what it is. Only the TTC 120TTC knows how to generatethe sequence of values of the Security Tags 111 in order to check andverify that the received sequence of data packets are to be trusted.

Other embodiments of the present invention further comprise a SecurityManagement Server or SMS 160SMS, which is used for managing theoperations of TFG 120TFG and TTC 120TTC. The SMS is connected to TFG andTTC via bi-directional communications link 161, as shown in FIG. 1.

FIG. 2 shows a specific setting of the TFG 120TFG inside an end-usercomputer 115. This computer 115 can located in a plurality of places,e.g., a desktop, a workstation, and/or a mobile device—cell phone. FIG.1 and FIG. 2 further specify another functionality for the TTC 120TTCprogram, that data packets that were successfully checked by TTC will besent as into the network or to the server with high priority datapackets with premium service 222. Such data packets will not beadversely affected by a lower priority traffic. This will enablenetworks and servers to differentiate, for example, between data packetsthat were sent from trusted TCP/UDP program, from TFG 110TFG, and datapackets that were sent from an untrusted TCP/UDP program. Trusted datapackets, will receive high priority by using various priority protocols,e.g., DiffServ, and time-driven priority. Consequently, data packetflows associated with trust data packets will not be subject todenial-of-service (DoS) attacks.

FIG. 2 further illustrates static operation of TFG 120TFG, namelywithout receiving any Trusted Flow Parameters/Codes 121 and SecureTime-stamps 122 from the network interface. This mode of operation issuitable, for example, when TFG 120TFG is running TCP/IP where itsexecution parameters are predetermined. However, under differentexecution scenarios TCP/IP will require to receive at least one of theTrusted Flow Parameters/Codes 121 and Secure Time-stamps 122.

FIG. 3 illustrates a specific setting where the TFG 120TFG program isdynamic and is responsive to some connection oriented settings. Thismode of operation corresponds, in some embodiments, to using MPLS (Multiprotocol Label Switching) and GMPLS (Generalized Multi protocol LabelSwitching). In this embodiment, the end-user sends a Service Request 312to the network interface which then sends back Trusted FlowParameters/Codes 322 to the TFG 120TFG program specifying the kind ofservice the user has received, for example, with rate controlparameters—maximum transmission rate and average transmission rate. TheTrusted Flow Parameters/Codes 322 can be provided to the networkinterface as Clear Parameters Agreed by Carrier/ISP 321.

Each controller, generator, checker and other devices that are used tosend and receive data packets and messages, in the context of thepreferred embodiment herein, can be realized in various ways, e.g. (butnot limited to): (1) software code, (2) dedicated hardware, (3) Javaapplet, and (4) utilizing a combined: (i) central processing unit (CPU)(ii) memory for storing data packets and messages, and (iii) memory forstoring various processing and control programs.

Hidden Program:

In another embodiment of the present invention, as shown in FIG. 4, theclient software at the end station 410 consist of a first softwareapplication 412 with two parts:

(1) User operative portion 413, and

(2) Hidden program portion 414.

In this embodiment, the hidden program portion 414 sends (first)security signal 411 to the controller for selectively coupling the datapackets 424 to the network interface 420, wherein the network interfacefunction as an access point to the WAN/Backbone Network 150. Thecoupling operation is performed responsive to the security signal 411,wherein the security signal 411 is part of the data packet. The datapackets are sent by the user operative portion 413 in the first softwareapplication 412. The data packets that are sent from/to end station 410to/from the network interface 420 are transferred through an accessnetwork 140, as shown in FIG. 4.

In FIG. 4 the controller for selectively coupling the data packets 424verifies that only data packets with the right security signals 411 areforwarded to the WAN/Backbone Network 150.

In another embodiment of the present invention, the controller forselectively coupling the data packets 424 sends secure time-stamps 421to hidden program portion 414, wherein the secure time-stamps 421 areuniquely used by the hidden program portion 414 in order to uniquelygenerate the security signals 411, as shown in FIG. 4. Only data packetswith the right security signals 411 that were generated responsive tothe secure time-stamps 421 are forwarded by the controller forselectively coupling the data packets 424 to the WAN/Backbone network150. The secure time-stamps 421 are derived, in some embodiments, fromUTC (coordinated universal time) 002 and in some other cases the securetime-stamps 421 are locally generated.

The controller for selectively coupling the data packets 424 has theoptional capability, in some embodiments, to send a (second) SecureTime-stamp 423 to a (second) controller for selectively coupling thedata packets 424 across the WAN/Backbone Network 150 in order tocoordinate the operation of the two controllers for selectively couplingthe data packets 424. Consequently, for example, data packets generatedby the first software application 412 can be checked by the (second)controller for selectively coupling the data packets 424.

In another embodiment, shown in FIG. 4, the controller for selectivelycoupling the data packets 424 can receive a (second) security signal:from a hidden program portion 422 of a second software application 412in order to enable the controller to selectively couple data packets 424and to forward data packets generated by the first software application412.

FIG. 5 illustrates a general operation of the controller for selectivelycoupling the data packets 424 that can send and receive (S/R) securitysignals and S/R secure time-stamps; specifically, to S/R: First SecuritySignal 511, S/R Second Security Signal 513 and Third Security Signal515, and to S/R: First Secure Time-stamp 512, Second Secure Time-stamp514 and Third Secure Time-stamp 516. The data packets forwardingoperations over multiple communications links: 521, 522, 523, and 524,are utilized by the controller for selectively coupling the data packets424 is responsive to the security signals and secure time-stamps itreceives.

In some embodiments, as illustrated in FIG. 5, the method comprises aSecurity Management Server (SMS) 160SMS, which is used for managing theoperations of the controller for selectively coupling the data packets424. The information exchanged via the, S/R (send and receive) SecurityManagement Signals 562 are used by the controller for selectivelycoupling the data packets 424 sending operations of the security signalsand secure time-stamps; and the data packets forwarding operations overmultiple bi-directional communications links: 521, 522, 523, and 524.

The communications control system that is shown in FIG. 4 and FIG. 5 iscomprised of plurality of access points 420 that function as networkinterfaces for coupling data packets to a WAN/Backbone network 150. Theend station/client 410 includes a first software application comprisinga user operative portion 413 and a hidden program portion 414, forselectively sending data packets for transmission through the accesspoint 420. The access point 420 includes a controller for selectivelycoupling the data packets to the access point 424 responsive to thehidden program portions 414. The secure coupling of the data packets tothe access point 424 is performed by attaching a security signal 411 toeach data packet by the hidden program portion 414 of the first softwareapplication at the end station.

The security signal 411 representative of the hidden program portion iscoupled to the controller 424 for enabling the coupling of associatedones of the data packets after the controller 424 verifies thecorrectness and integrity of said security signal 411. Consequently, thesecurity signal 411 authenticates the first software application. Thesecurity signal 411 can have one of a plurality of functionalrepresentations, e.g., a digital signature derived from at least one ofthe associated ones of the data packets and representative of the hiddenprogram portion 414.

The access point, shown in FIG. 4, couples a secure time-stamp 421 tothe hidden program portion 414. The secure time-stamp 421 is used in thegeneration procedure, generating the security signal by the hiddenprogram portion 414 of the first software application. The securetime-stamp 421 is generated at the network interface 420 responsive tothe UTC (Universal Coordinated Time) signal. The UTC signal can be usedfor the generation of a digital signature in the hidden program portion414 that is then used for the generation of the security signal 411.

The network interface also includes a mapping table 425 that is used bythe controller for selectively coupling 424 for associating the datapackets with a priority class responsive to the security signal. Datapackets, as shown in FIG. 7, are comprised of a header portion 700 and apayload portion 701PL. The security signal 411 and the secure time-stamp421 are part of at least one of the header portion and the payloadportion. The data packet header portion further comprises a priorityclass. The priority class is defined in accordance with at least one ofthe following: differentiated services, DiffServ, IEEE 802.1p, class ofservice (CoS), time-driven priority.

The data packet header 700 further comprises of a flow identification(ID) as part of the data packet header address and port fields704AdrPrt. The flow ID is associated with at least one entry in themapping table 425, wherein the content of the selected entry of themapping table 425 determining a priority class. The controller forselectively coupling 424 is responsive to the priority class and thesecurity signal 411 for determining how to forward the data packet, forexample: the data packet can be forwarded with high priority, the datapacket can be forwarded with premium service, the data packet can beforwarded with low priority, and the data packet can be discarded.

As illustrated in FIG. 5, the network interface 420 that is the firstaccess is used for coupling data packets between first backbone network140 and second backbone network 150. The network interface sends andreceives data packet over the first backbone network 140 over two datachannels 521 and 522, and the network interface send and receive datapacket over the second backbone network 150 over two data channels 523and 524.

There are first software application and a second software application,each comprising: a user operative portion 413 and a hidden programportion 414, for selectively sending data packets for bi-directionaltransmission through the network interface 420 across first backbonenetwork 140 and second backbone network 150; and over multiple datachannels: 521, 522, 523 and 524. The data channels exchange data packetsbetween the first software application and the second softwareapplication. The network interface 420 includes a controller forselectively coupling the data packets to the access point 420 responsiveto the hidden program portions 414 of the first software application andthe second software application that were transferred across the firstbackbone network 140 and second backbone network 150.

Each of the data channels: 521, 522, 523 and 524, as shown in FIG. 5, isassociated with sending and receiving (S/R) security signals: 511 S/Rfirst security signal, 513 S/R second security signal, and 515 S/R thirdsecurity signal; and for S/R secure time-stamps: 512 SIR first securetime-stamp, 514 S/R second secure time-stamp, and 516 S/R third securetime-stamp.

The S/R first security signal 511 representative of the hidden programportion of the first software application and the S/R second securitysignal 513 representative of the hidden program portion of the secondsoftware application are selectively coupled to the controller forselectively coupling 424 of associated ones of the data packets to betransferred across the first backbone network 140 and second backbonenetwork 150.

The S/R first security signal 511 authenticates the first softwareapplication, the S/R second security signal 513 authenticates the secondsoftware application, a third security signal 513 authenticates a thirdsoftware application (not shown in FIG. 5).

In another embodiment of the present invention, the S/R first securitysignal 511 and the S/R second security signal 513 are digital signaturesderived from the data packet headers and are representative of thehidden program portion 414 first software application and the secondsoftware application, respectively.

The access point 420 couples a secure time-stamp, 512, 514, and 516, tothe bidden program portions of the first software application, thehidden program portion of the second software application, and thehidden program portion of a third software application. Then, thesecurity signals, 511, 513, and 515, respectively, are selectivelygenerated responsive to the secure time-stamp, 512, 514, and 516, andthe hidden program portions. The secure time-stamps, 512, 514, and 516,are generated responsive to the UTC (Universal Coordinated Time) signal.

UTC Time Structure:

In some embodiments, the secure time-stamps are derived from UTC(coordinated universal time) 002, as shown in FIG. 6. In one embodiment,each of the successive UTC seconds 600 is divided into consecutive timeframes that are grouped into time cycles. As shown in the exampleillustrated in FIG. 6, there are 100 time frames in each time cycle. Forillustration purposes, the time frames within a time cycle are numbered1 through 100. Consecutive time cycles are grouped together intosuper-cycles, and as shown in FIG. 6, there are 80 time cycles in eachsuper-cycle. For illustration purposes, time cycles within a super-cycleare numbered 0 through 79. Super-cycles 0 and m are shown in FIG. 6.

FIG. 6 illustrates the relationships among time frames, time cycles, andsuper-cycles; in alternate embodiments, the number of time frames withina time cycle may be different than 100, and the number of time cycleswithin a super-cycle may be different than 80. In this illustratedexample, the duration of every super-cycle is exactly one second asmeasured by the UTC standard. Moreover, as illustrated in FIG. 6, thebeginning of each super-cycle coincides with the beginning of a UTCsecond. Consequently, when leap seconds are inserted or deleted for UTCcorrections (due to changes in the earth rotation period), the cycle andsuper-cycle periodic scheduling will not be affected. The time frames,time cycles, and super-cycles are associated in the same manner with allrespective network interface 420 and all respective Security TagCheckers 120TTC.

In the embodiment illustrated in FIG. 6, the super-cycle duration isequal to one second as measured using the UTC (Coordinated UniversalTime) standard. In an alternate embodiment, the super-cycle durationspans multiple UTC seconds. In another alternate embodiment thesuper-cycle duration is a fraction of a UTC second. In anotherembodiment, the super-cycle duration is a small integer number of UTCseconds. A time frame may be further divided into time slots in thepreferred embodiment, not illustrated in FIG. 6.

UTC can be obtained by the network interface 420 from various sources,e.g., global positioning system (GPS), Global Navigation SatelliteSystem (GLONASS), Galileo, and Two-Way Satellite Time and frequencyTransfer (TWTFT).

The Generic Structure of Data Packets:

FIG. 7A is a description of a data packet structure that consists of aheader portion 700 and a payload portion 701PL, such that, the headerportion consists of priority field 703Pri, address and port fields704AdrPrt, and various generic data packet header fields 702Gen, whichare described in more detail below. The priority field 703Pri is used,in some embodiments, for associating data packets with class of service,e.g., premium service. The address and port fields 704AdrPrt are usedboth for routing and association with various applications, e.g.,streaming media. In some embodiments, when a data packet is received forprocessing an additional time of arrival (ToA) 705ToA is attached to it.ToA can be derived from the UTC second 600—as shown in FIG. 6. ToA705ToA can have a plurality of numerical formats. One example is theformat of the Internet's Network Time, which is in seconds relative to0h UTC on 1 Jan. 1900. The full resolution NTP timestamp is a 64-bitunsigned fixed point number with the integer part in the first 32 bitsand the fractional part in the last 32 bits. In some fields where a morecompact representation is appropriate, only the middle 32 bits are used;that is, the low 16 bits of the integer part and the high 16 bits of thefractional part. The high 16 bits of the integer part must be determinedindependently.

There are two variants of the generic data packet header fields 702Genone is associated with end station 115 and the trusted flow generator(TFG), as shown in FIG. 7B, and network interface (NI) and the trustedtag checker (TTC), as shown in FIG. 7C. The two variants of the genericdata packet header fields 702Gen are used in the various protocols andalgorithms utilized in various method and system embodiments of thepresent invention.

FIG. 7B illustrates the generic data packet header fields 702Gen used bythe end station 115 with its trusted flow generator (TFG). These fieldscontain information to be used, for example, by the trusted tag checker(TTC) at the network interface (see FIG. 1). The generic fields that arerelated to TFG are:

-   -   (5) Security Tag Vector—STV 711, which is used to signal to the        TTC that a certain program was used to generate and send data        packets;    -   (6) Security Tag Serial Number—STSN 712, which is used for        initializing the operation of TFG and TTC;    -   (7) Security Signals 713, which used to send various security        information from TFG to TTC; and    -   (8) Priority: Class of service 714, which is used as priority        field mapping data packets to their respective class of service.

FIG. 7C illustrates the generic data packet header fields 702Gen used bythe network interface with trusted tag checker (TTC) and securitymanagement system (SMS). These fields contain information to be used,for example, the trusted flow generator (TFG) at the end station 115(see FIG. 1). The generic fields that are related to TFG are:

-   -   (5) Trusted Flow Parameters & Codes 721,    -   (6) Security Signals 722, used to send various security        information from TTC to TFG;    -   (7) Secure Time Stamps 723, used to provide the time derived        from UTC 002—see FIG. 6; and    -   (8) Secure Renewable Parameters 724, used for securely sending        renewable parameters from TTC to TFG, which are used for        example, for determining how often certain programs for        generating and sending data packets can be used.

The Operation, Structure of TFG and TTC, and Communications System:

FIG. 8 illustrates the trusted flow generator (TFG) 110TFG operationthat is used to generate and send data packets with security tags. TheTFG operation is based upon taking logic modules (programs and data)with known functionality and transforming them into a hidden program byintegrating modules to execute together into a logic which is partiallyobfuscated and/or encrypted and/or physically hidden—as shown in FIG.12A, FIG. 12B, FIG. 12C, FIG. 12D, and FIG. 14.

The hidden program that is part of TFG 110TFG is updated dynamically, asshown in FIG. 13, to strengthen it against reverse engineering efforts.The program includes the functionality for generating security signals,e.g., Security Tag Vector—STV 711, Security Tag Serial Number—STSN 712,and Security Signals 713, which are unpredictable by observers, e.g., apseudo random sequence of security signals. Only elements that share themeans for producing the security signals can check their validity. Themodules include operational tasks and performance parameters for thisoperation. The operation can be transmission of data packets with givenparameters of performance that the hidden program contains. Thegenerated security signals thus assure that the correct operation wastaken place and can be used to signal various cryptographic parametersas well, e.g., Security Signals 713.

In FIG. 8, data packets are received for processing by operation module811 and transferred to the initialization module 812, which is used forcoordinating the operation of TFG and TTC by appropriately setting theSecurity Tag Serial Number—STSN 712, which is used for initializing theoperation of TFG and TTC. The operation module 813 is responsible forComputing the Renewable Precondition for Transmission, as shown in FIG.13, then this operation module is computing two fields in for thegeneric part of the data packet header 700Gen: (1) Security Tag Vector(STV) 711 and (2) Security Tag Serial Number (STSN) 712. Following thisstep there are two options 814: (1) computing additional securitysignals, e.g., authenticating and signing the data packet 815 before itstransmission 816, and (2) to proceed to data packet sending 815 withoutadditional security operations.

FIG. 9 illustrates the trusted tag checker (TTC) 120TTC operation thatis used to check the authenticity of the program used to generate andsend data packets with security tags. The data packet is received byoperation module 911 and then transferred to operation module 912 thatperforms the service mapping function. The service mapping can be donein various methods, e.g., by decoding the priority field 703Pri in thepacket header and by decoding the address and port fields 704AdrPrt inthe data packet header. The service mapping can be performed by decodingthe class of service 714 in the generic data packet header fields. Whenthe incoming data packet is identified as generated by a trusted flowgenerator (TFG), the data packet can receive premium service afterfurther authenticity checks by operation module 913. Module operation913 checks two fields in the generic header of the data packet receivedfrom the end station 115: (1) Security Tag Vector—STV 711, which is usedto signal to the TTC that a certain program was used to generate andsend data packets; and (2) Security Tag Serial Number—STSN 712, which isused for initializing the operation of TFG and TTC. If the checking byoperation module 913 is correct, the data packet will be sent byoperation module 915 as premium service data packet. Otherwise, when thechecking is not correct the data packet is discarded by operation module914. The sending of data packets from operation module 915 can be basedon various parameters, e.g., time of arrival 705ToA, address 704AdrPrt,and priority 703Pri. Data packets that are not receiving premium serviceare transferred from operation module 912 to operation module 915 forsending out of the TTC 120TTC.

FIG. 10 illustrates the trusted flow generator (TFG) 110TFG that is usedto generate and send data packets with security tags. The TFG, in someembodiments of the present invention, is done in software as part of thefirst computing element, wherein the second computing element is the TTC120TTC. The TFG basic operations are performed by the TFG controller1010, which receives data packet in 1011. The TFG controller 1010 sendsinitialization parameters 1012 to the pseudo random tag generator 1020prior to sending the next value signal 1013 to the pseudo random taggenerator 1020 requesting a security tag vector (STV) 711 for thegeneric header of the incoming data packet. The pseudo random taggenerator 1020 returns the next tag 1014 to the TFG controller 1010 withthe next security tag vector (STV) 711. The data packet with the nextsecurity tag vector (STV) 711 is then sent out 111.

The TFG controller operation with the pseudo random tag generatoroperation, shown in FIG. 10, can be implemented as one of theembodiments of the present invention as described in detail in thedescriptions of FIG. 16, FIG. 17, FIG. 18, FIG. 19, and FIG. 20. Thedescriptions in FIG. 16, FIG. 17, FIG. 18, FIG. 19, and FIG. 20 detailembodiments of hiding and obfuscating the IP's (Internet Protocol's) TCP(transport control protocol). The operations of hiding and obfuscatingare further described in the description FIG. 12, FIG. 13, and FIG. 14.

As illustrated in FIG. 10, the operation of the TFG controller 1010 isfurther controlled by the TFG renewable controller 1040, which sendsrenewable codes and parameters 1041 to the TFG controller 1010. Therenewable codes and parameters 1041 determine renewable characteristicsof the TFG controller 1010. The renewable characteristics includeparameters, e.g., bow many data packets can be processed by the TFGcontroller 1010 before receiving other renewable parameters, and howmany data packets can be processed per unit time by the TFG controller1010. The operation of the TFG renewable controller 1040 is furthercontrolled, in some embodiments of the present invention, through thenetwork by at least one of: the security management server 160SMS andthe trusted tag checker 120TTC, that send to the TFG renewablecontroller 1040 two types of renewable signals: (1) Trusted FlowParameters/Codes 121 and (2) Secure Time-stamps 122. The two renewablesignals determine how the TFG renewable controller 1040 controls the TFGcontroller 1010.

As illustrated in FIG. 10, the operation of the pseudo random taggenerator 1020 is further controlled by the TFG update controller 1050,which sends update codes and parameters 1051 to the pseudo random taggenerator 1020. The update codes and parameters 1051 determines updatecharacteristics of the pseudo random tag generator 1020. The updatecharacteristics include changes to the security tag vector 711generation. The operation of the TFG update controller 1050 is furthercontrolled, in some embodiments of the present invention, through thenetwork by at least one of: the security management server 160SMS andtrusted tag checker 120TTC, that send to the TFG update controller 1050two types of renewable signals: (1) Trusted Flow Parameters/Codes 121and (2) Secure Time-stamps 122. The two renewable signals determine howthe TFG update controller 1050 controls the pseudo random tag generator1020.

Another possible and more detailed embodiment of the TFG updatecontroller 1050, TFG controller 1010, TFG renewable controller 1040, andthe pseudo random tag generator 1020, illustrated in FIG. 10, are shownin the operation illustrated in FIG. 13.

FIG. 11 illustrates the trusted tag checker (TTC) 120TTC that is used tocheck the authenticity of the TFG program used to generate and send datapackets with security tags. The TTC controller 1110 receives data packet1111 and then checks its service type by sending a decoding signal 1131to the service level lookup table 1130. The decoding signal 1131 can beat least one of: priority field 703Pri, address and port fields704AdrPrt, class of service 714, and security signal 713. The responsesignal 1132 indicates to the TTC controller 1110 whether or not the datapacket 1111 has a security tag vector 711 that need to be checked inorder to verify the authenticity of the generating and sending TFGprogram 110TFG.

The TTC controller 1110 sends initialization parameters 1112 to thepseudo random tag generator 1120 prior to sending the next value signal1113 to the pseudo random tag generator 1020 requesting a security tagvector (STV) 711 for checking STV 711 received in the generic header ofthe incoming data packet 1111. The pseudo random tag generator 1120returns the next tag 1114 to the TTC controller 1110 with the nextsecurity tag vector (STV) 711. Then, the TTC controller 1110 comparesthe two STV 711 values, from the data packet and the locally computed bythe pseudo random tag generator 1120, if the two values are the same thedata packet can be sent with premium service as it is illustrated inFIG. 9. Module 915 in FIG. 9 shows the operation of sending of datapackets that can be based on various parameters, e.g., time of arrival705ToA, address 704AdrPrt, and priority 703Pri.

As illustrated in FIG. 11, the operation of the TTC controller 1110 isfurther controlled by the TTC renewable controller 1140, which sendsrenewable codes and parameters 1141 to the TTC controller 1110. Therenewable codes and parameters 1141 determine renewable characteristicsof the TTC controller 1110. The renewable characteristics includeparameters, e.g., how many data packets can be checked and compared bythe TTC controller 1110. The operation of the TTC renewable controller1140 is further controlled, in some embodiments of the presentinvention, through the network by the security management server 160SMSthat sends to the TFG renewable controller 1140 two types of renewablesignals: (1) Trusted Flow Parameters/Codes 121 and (2) SecureTime-stamps 122. The two renewable signals determine how the TTCrenewable controller 1140 controls the TTC controller 1110.

As illustrated in FIG. 11, the operation of the pseudo random taggenerator 1120 is further controlled by the TTC update controller 1150,which sends update codes and parameters 1151 to the pseudo random taggenerator 1120. The update codes and parameters 1151 determines updatecharacteristics of the pseudo random tag generator 1120. The updatecharacteristics include changes to the security tag vector 711generation. The operation of the TTC update controller 1150 is furthercontrolled, in some embodiments of the present invention, through thenetwork by the security management server 160SMS and trusted tag checker120TTC that sends to the TTC update controller 1150 two types ofrenewable signals: (1) Trusted Flow Parameters/Codes 121 and (2) SecureTime-stamps 122. The two renewable signals determine bow the TTC updatecontroller 1150 controls the pseudo random tag generator 1120.

FIG. 15 is illustrates an embodiment implemented with, e.g., tamperproof hardware. In this integrated configuration, the operation andembodiments described in FIG. 8, FIG. 9, FIG. 10, and FIG. 1, for TFG110TFG and TTC 120TTC are combined together. This integratedconfiguration can be implemented in various manners, e.g., tamper proofhardware, VLSI, micro-coded with a network appliance and micro-coded ina tamper proof manner with a network appliance. The integratedconfiguration can be further combined with a smart card 1510. Theintegrated configuration, in some configuration of the presentinvention, is further enhanced with a TFG challenge controller asdiscussed relative to and as illustrated in detail in FIG. 27.

The embodiment illustrated in FIG. 15 is used in the realization ofvarious edge devices and network appliances, e.g., a cellular telephone,a PDA, a single printed circuit board, a single chip, a single computingmodule, a single chassis, a hand held device, a single box, a userterminal.

The TFG system, illustrated in FIG. 8 and FIG. 10, possesses means forproviding controlled communication in accordance with defined rules oftransmission. The system further comprising: processing data inaccordance with defined logic to construct a first data packet; meansfor generating a security tag vector 711 responsive to validating theprocessing in accordance with the defined logic; and means forconstructing by the TFG controller 1010, shown in FIG. 10, a trusteddata packet 111 responsive to the means for processing and means forgenerating.

The system further comprises: means for transmitting the trusted datapacket 111 onto a communications path, e.g., the VPN connection 2810 inFIG. 28, in accordance with the defined rules of transmission.

The system, as illustrated in FIG. 1 and FIG. 11, further comprises:means for receiving the trusted data packet 111 from the communicationspath; and means for validating the trusted data packet responsive toanalyzing the trusted data packet to verify the security tag vector 711responsive to the defined logic.

The system further comprises: means for mapping 1130, as shown in FIG.11, wherein mapping is of the trusted data packet 111 to a firstcommunications class of service responsive to the validating the trusteddata packet and verifying the respective security tag vector; and meansfor mapping the trusted data packet 111 to a second communications classof service responsive to the validating the trusted data packetresulting in failed verifying of the security tag vector 711.

The system further comprises: means for coupling the firstcommunications class of service with the trusted data packets 111 forfurther communication therefrom; wherein the data packets of the secondcommunications class of service is denial of further communicationtherefrom; and wherein the data packets of the second communicationsclass of service are stored in a local storage without furthertransmission.

The system, in a different embodiment, transmits the data packets of thesecond communications class of service at a lower priority level thanthe first communications class of service, wherein the priorities aredetermined responsive to set of priority bits 703Pri within each of thedata packets.

The transmitting is performed in a first computing element that is partof TFG, as shown in FIG. 1, FIG. 8 and FIG. 10; and wherein the meansfor receiving is performed in a second computing element that is part ofTTC, as shown in FIG. 1, FIG. 9 and FIG. 11. The first computing elementand the second computing element are both contained within a singlephysical computing system, as shown in FIG. 15.

As illustrated in FIG. 15, the first computing element and the secondcomputing element are contained in separate physical computing systems,as shown in FIG. 1, FIG. 2, FIG. 3, FIG. 4 and FIG. 28. The secondcomputing element has non-modifiable processing logic.

As illustrated in FIG. 1 and FIG. 15, at least one of the firstcomputing element and the second computing element is comprised of atleast one of: tamper-proof hardware and tamper-proof firmware,self-destructive hardware; wherein the second computing element is madeinoperative responsive to detection of at least one of: tampering,attempt to replace hardware, attempt to replace firmware, attempt toreplace software. The single physical computing system, as shown in FIG.15, is at least one of: a single printed circuit board, a single chip, asingle computing module, a single chassis, an hand held device, a PDA, acellular phone, a single box, a user terminal.

The TFG system, as shown in FIG. 8 and FIG. 10, generates the securitytag vectors (STVs) 711 and processes data in accordance with definedlogic to construct the first data packet are obfuscated. The TFG systemwhich generates the STV 711 is hidden within the processing data inaccordance with defined logic to construct the first data packet 111.

The TFG system, shown in FIG. 8 and FIG. 10, generates the security tagis encrypted within the processing data in accordance with defined logicto construct the first data packet, as shown in the specifications ofFIG. 12, FIG. 13 and FIG. 14.

The system, as shown FIG. 1, couples the first computing element that isTFG 110TFG and the second computing element that is TTC 120TTC through acommunications network 140 and 150. The communications network, 140 and150, is at least one of: an access network, a metropolitan network, alocal area network, a wireless network, an enterprise network, acellular telephone network, a cable modem network, a passive opticalnetwork, Ethernet, token ring, a spatial reuse ring, SONET ring,resilient packet ring, a costumer premise network (CPN), an IP,Internet, a 3G wireless network, IEEE 802 standards, ATM network, framerelay (FR) network, a virtual private network (VPN), a shared media, anda storage area network (SAN).

As illustrated, the first computing element that is TFG 110TFG and thesecond computing element that is TTC 120TTC are directly coupled.

The first computing element that is TFG 110TFG is part of at least oneof: a single printed circuit board, a single chip, a single computingmodule, a single chassis, an hand held device, a PDA, a cellular phone,a single box, a user terminal, an application software module, anoperating system module, a Java applet, a communications softwaremodule, a firmware component, a software driver, and a distributedsystem software module.

The second computing element that is TTC 120TTC is part of at least oneof: a firewall, a gateway, a router, a routing controller, a local areanetwork bridge, a local area network switch, a wireless base station, awireless 3G base station, an IEEE 802.11 base station, a cable modemhead-end, a central office, an ADSL DSLAM, and a point-of-presence(PoP).

In one embodiment, the system additionally forwards the trusted datapacket 111 for further communication over a defined communications path150, wherein the defined communications path 150 is part of at least oneof: a VPN (virtual private network), an ATM, a FR (frame relay), a CPN(costumer premise network), a content delivery network (CDN), an ISP, ashared media, a firewall, a local area network, the Internet, ametropolitan area network, a SAN, a link to application server, a linkto web server, a link to data base server, a link to Internet server, alink to network server, a public network, an enterprise network, and acarrier network.

The system forwards the trusted data packet 111 to a further computingdevice, wherein the further computing device is at least one of: anapplication server, a web server, a data base server, an Internetserver, a network server, a firewall, a multimedia server, a videoserver.

Within the TTC 120TTC, the first class of service is comprised of alocal processing of the trusted data packet 111; wherein the localprocessing is done by at least one of: a router, a server, a web-server,a database, a firewall, a network appliance.

The TFG 120TFG, further receives at least some of the defined rules oftransmission from a separate rules controllers: TFG renewable controller1040 and TFG update 1050, specified in FIG. 10. The system, within theTFG 120TFG, wherein the defined rules of transmission determine at leastone of: performance characteristics, access characteristics,transmission limitations, transmission rates, window sizes, portnumbers, IP addresses, network addresses, quotas, renewable quotas,packet structure limitations, and transmission schedule.

Within the TFG 120TFG, at least one of the defined rules of transmissiondetermines a renewable precondition for transmission. The renewableprecondition for transmission is defined by least one of: renewabletransmission quota of trusted data packets, number of trusted datapackets that can be transmitted per unit of time, time signal, UTC timesignal, digitally signed time signal, digitally signed time-stamp,digitally signed time-stamp from UTC (coordinated universal time),digital cash for transmission of trusted data packets, and cryptographickeys for marking trusted data packets.

For the renewable controller 1040, the renewable precondition fortransmission is obtained from at least one of: a predefined logic, anexternal rule controller, a security management system (SMS) 160SMS,network interface, network appliance, server, network management system,firewall, local computation, smart card device, portable device.

For the TFG system, whenever the renewable precondition for transmissionis not valid, transmission is suspended.

The TFG system as illustrated in FIG. 10, further updates parts ofdefined logic by using a TFG update controller 1050, wherein the meansfor updating comprise of at least one of: means for adding data, meansfor deleting data and means for replacing data and wherein datacomprises at least one of lines of codes, machine codes, obfuscatedcodes, object codes, tables of codes, program parameters, subroutineparameters, tables of parameters, data structure of parameters, softwaremodules, alpha numeric values, cryptographic fields, assembly languagecode, software applets, program control information, firmware code,instructions for reprogramming programmable hardware elements, e.g.,PLAs.

The TFG system generates data packets 111 with STV that comprises atleast one of: means for applying a pseudo-random generator, means forapplying a pseudo-random function, means for applying a cryptographicfunction, means for applying an encryption function, means for applyinga scrambling subroutine, means for applying an authentication function,means for applying a digital signing function, means for applying acryptographic hash function, applying a subroutine, means for applying acomputational logic module, means for applying a symmetric cryptographyfunction, applying an asymmetric cryptography function, employing acryptographic key, employing a cryptographic seed, employing anencrypted software, employing an obfuscated software, means foremploying a hidden program, means for employing logic with a set ofparameters, means for employing a hardware module, means for employing asmart card, means for employing a portable device, and means foremploying a distributed protocol.

The TTC system illustrated in FIG. 9 and FIG. 11, validates compliancewith communications processing for the transmittal of data packets 111comprised of a received security tag vector—STV 711. The TTC systemfurther comprises: means for receiving one of the data packets; meansfor generating a local security tag; means for comparing the localsecurity tag to the received security tag; and means for mapping thereceived data packet to a defined class of service responsive to themeans for comparing.

The TTC system illustrated in FIG. 9 and FIG. 11, further comprises:means for mapping the received data packet to a first class of serviceresponsive to the local security tag equaling the received security tag;and means for mapping the received data packet to a second class ofservice responsive to the local security tag which is different from thereceived security tag.

The TTC system illustrated in FIG. 9 and FIG. 11, further comprises:means for forwarding the received data packet for further communicationover a defined communications path. The TTC system in FIG. 9 and FIG. 1,wherein the defined communications path is part of at least one of: aVPN, an ATM, a FR, a CPN, a content delivery network (CDN), an ISP, ashared media, a firewall, a local area network, an Internet, ametropolitan area network, a SAN, a link to application server, a linkto web server, a link to data base server, a link to Internet server, alink to network server, a public network, an enterprise network, and acarrier network.

The TTC system illustrated in FIG. 9 and FIG. 11, forwards the receiveddata packet to a further computing device, wherein the further computingdevice is at least one of: an application server, a web server, a database server, an Internet server, a network server, a firewall, amultimedia server, and a video server.

As illustrated in FIG. 9 and FIG. 11, the TTC system wherein the firstclass of service is comprised of a local processing of the received datapacket 111, wherein the local processing is done by at least one of: arouter, a server, a web-server, a database, a firewall, and a networkappliance.

The TFG and TTC system control signaling in accordance with definedrules of at least one of transmission and operation, the methodcomprising: means for processing data in accordance with defined logicto construct operation; means for generating a security tag responsiveto validating the processing in accordance with the defined logic; andmeans for constructing a signal responsive to computing with securitytag. The system further transmits the signal onto a communications pathin accordance with the system operation.

The system further receives at least some of the defined rules of atleast one of transmission and operation, from a separate rulescontroller: TFG renewable controller 1040 and TFG update 1050, specifiedin FIG. 10; wherein at least one of the defined rules of at least oneof: transmission and operation, and determines a renewable preconditionfor at least one of transmission and operation.

The system as illustrated in FIG. 10 further updates parts of thedefined logic; wherein generating comprises at least one of means forapplying a pseudo-random generator, means for applying a pseudo-randomfunction, means for applying a cryptographic function, means forapplying an encryption function, means for applying a scramblingsubroutine, means for applying an authentication function, means forapplying a digital signing function, means for applying a cryptographichash function, means for applying a subroutine, means for applying acomputational logic module, means for applying a symmetric cryptographyfunction, means for applying an asymmetric cryptography function, meansfor employing a cryptographic key, means for employing a cryptographicseed, means for employing an encrypted software, means for employing anobfuscated software, means for employing a hidden program, means foremploying logic with a set of parameters, means for employing a hardwaremodule, means for employing a smart card, means for employing a portabledevice, and means for employing a distributed protocol.

The TFG system provides at least one of the defined rules of at leastone of transmission and operation, that determines an action based on acontext; wherein the context involves at least one of a system userpresent, a system user present at an end-station, a system user presentat the computer used for transmission and operation, application programpresent, a data information available, a cryptographic keys availableand parameters available.

The TFG system provides that when said context is missing for at leastone of transmission and operation there will be no transmitting thesignal onto a communications path in accordance with the operation.

The TTC system, as illustrated in FIG. 9 and FIG. 11, are embodimentswhich validate compliance with defined rules of at least one oftransmission and operation comprised of a received signal. The systemfurther provides: means for receiving signal; means for generating alocal signal; means for comparing the local signal and received signal;means for deciding on compliance; means for mapping at least one oftransmission and operations to a defined class of service responsive tothe deciding; means for receiving data packet; means for mapping thereceived data packet to a first class of service responsive to deciding;means for mapping the received data packet to a second class of serviceresponsive to deciding; means for forwarding the received data packetfor further communication over a defined communications path; and meansfor forwarding the received data packet to a further computing device.

Embodiments of the TTC system as illustrated in FIG. 1, FIG. 9 and FIG.11; provide that the first class of service is comprised of a localprocessing the received data packet; wherein the local processing isdone by at least one of: a router, a server, a web-server, a database, afirewall, and a network appliance.

The trusted system as illustrated herein provides for communicationssystem comprising:

-   -   (4) TFG system in FIG. 8 and FIG. 10 with a first communications        subsystem comprising a first processing subsystem providing        first logic for data packet processing, rules of transmission        and security tag generation, for selectively transmitting        trusted data packets 111; and    -   (5) TTC system in FIG. 9 and FIG. 11 with a second        communications subsystem comprising a second processing        subsystem providing logic for checking, validating and mapping        of the selectively transmitted trusted data packets responsive        to a defined validation logic; and    -   (6) a communications access network coupling the first        communications subsystem and the second communications        subsystem.

In said trusted system, the mapping of the selectively transmittedtrusted data packets 111 is further comprised of mapping logic; whereinmapping logic is further comprised of at least one of: a mapping table,decision-tree, a processing logic, a data packet processing logic, adata packet header processing decision-tree, a security tag processinglogic, a data packet identification processing logic, a data packetpriority processing logic, a data packet class of service processinglogic, and a secure time-stamp processing logic.

In one embodiment, said trusted system further comprises: acommunications service network for coupling the second communicationssubsystem to a destination; and wherein the rules of transmission areprovided to the first communications subsystem from the communicationsservice network; wherein the second communications subsystem is furthercomprised of: a subsystem for forwarding data packets responsive to themapping logic.

In the TFG system as illustrated in FIG. 1, FIG. 8 and FIG. 10, therules of transmission, that are part of the TFG controller 1010, arefurther characterized as defining at least one of: transmission rate,maximum window size, port number, destination IP, source IP, data packetpriority, transmission time, and transmission schedule.

In the TFG system as illustrated in FIG. 1, FIG. 8 and FIG. 10, therules of transmission and security tag generation, that are part of theTFG controller 1010, are further characterized as responsive to a atleast one of: predefined schedule, secure time-stamp, renewable codesand parameters, and update codes and parameters.

In the TFG system as illustrated in FIG. 1, FIG. 8 and FIG. 10, therules of transmission are part of the TFG controller 1010; wherein therules of transmission are provided from an external storage medium;wherein the first logic is comprised as a part of the TFG controller1010; wherein the first logic is comprised of an interlocking of aplurality of logic modules responsive to the data packet processing, therules of transmission and the security tag generation; wherein theinterlocking is further characterized in that each respective one of theplurality of logic modules is associated with a respective one of aplurality of defined subtasks; wherein the combined plurality of definedsubtasks defines the first logic; and wherein all of the logic modulesare required to properly perform the respective defined subtask toprovide the first logic.

The TFG system as illustrated in FIG. 1, FIG. 8 and FIG. 10, furthercomprises: an update controller, as part of the TFG, and a securitymanagement server (SMS) that is external to the TFG system; wherein theupdate controller 1050 provides update codes and parameters to the firstprocessing subsystem that is part of the TFG controller 1010 and whereinthe SMS provides an update information to the update controller. Thesystem further comprises: a renewable controller 1040, wherein therenewable controller provides update codes and parameters to the firstprocessing subsystem; wherein the SMS provide a renewable information tothe renewable controller. The TFG system with its first processingsubsystem further comprises: cryptographic modules; whereincryptographic modules further providing for at least one of: programauthentication, user authentication, cryptographic authentication,application authentication, encryption, secure time-stamp, and digitalsignature.

The TTC system with its second processing subsystem further comprisesvalidation modules; wherein validation modules further providing for atleast one of: program authentication checking, user authenticationchecking, cryptographic authentication checking, applicationauthentication checking, decryption, secure time-stamp, and digitalsignature validation.

In another embodiment, the system controls communications data packetflow between at least two computing elements comprising: means forgenerating a security tag; means for associating the security tag with afirst computing element responsive to compliance logic; means forgenerating a data packet which includes a security portion; means fortransmitting the data packet over a communications path; means forreceiving the data packet at least a second computing element; means forprocessing the data packet to validate the security portion responsiveto the security portion and at least a portion of the data packet; andmeans for transmitting the data packet from the second computing elementto for further processing at least a third computing element; wherein(1) the communications path includes at least the second computingelement and the third computing element, (2) the transmitting isresponsive to the processing of the second computing element and thethird computing element and (3) wherein the processing in at least oneof: the second computing element and the third computing element,computing of additional security.

In another embodiment, providing secure communications, the systemcomprises means for consistent initialization of a tag generator, whichis part of the TFG controller 1010, operating from an initial generatorstate to generate a sequence of security tags 711 for association withdata packets for transmission; means providing for transmission of thedata packets with associated security tags from the TFG controller 1010to tag verifier, which is part of TTC 120TTC, operating from an initialverification state to generate a sequence of comparison security tagsfor selective comparison to the security tags 711. The system furtherincludes means for coordinating the initial generator state and theinitial verifier state prior to transmission of any of the data packetsin the sequence; and wherein the tag verifier provides valid comparisontags responsive to the means for coordinating.

Said system comprises means for consistent initialization, furthercomprising: a sequence number 712 that is associated with the taggenerator, which is part of the TFG controller 1010, wherein thesequence number is included as part of the security tag. The tagverifier, which is part of TTC, generates a comparison sequence numberfor selective comparison to the sequence number that is part of thesecurity tag; wherein the sequence number 712 is used for at leastdetecting data packet loss.

Said system further comprises: a secure time-stamp; wherein the taggenerator, which is part of the TFG controller 1010, includes the securetime-stamp as part of the security tag 711 in the generic data packetheader. The tag verifier, which is part of TTC 120TTC, generates acomparison secure time-stamp for selective comparison to the securetime-stamp that is part of the security tag.

Said system provides secure communications, comprising: a tag generatoroperating from an initial generator state to generate a sequence ofsecurity tags and related information for association with data packetsfor transmission; means providing for transmission of the data packetswith associated security tags 711 in the generic data packet header; atag verifier operating from an initial verification state to generate asequence of comparison tags for selective comparison to the securitytags responsive to the related information; and wherein (1) the tagverifier only provides validation of the data packets 111 responsive tocomparing the comparison tags and the respective security tags for therespective data packets, and to the synchronization of the initialgenerator state and the initial verification state and (2) the relatedinformation is at least of: program authentication, user authentication,cryptographic authentication, application authentication, encryption,secure time-stamp, time-stamp, clock reading, and digital signature.

Program Hiding and Obfuscating with Secure Logic Interlocking:

In a preferred embodiment, the system provides secure integration ofseparate logic modules to provide a combined functionality, the systemcomprising: a plurality of software logic modules operable stand-aloneto provide a respective plurality of subtask functions; a transformationcontroller for interlocking the plurality of software logic modules intoa single logic program; wherein the combined functionality is onlyprovided when the plurality of subtask functions are executed responsiveto the single logic program.

The system providing secure integration gets an input random bit string1211 as a parameter and another parameter of plain program consisting oflogic modules 1212. It performs the integration of the logic modulesusing an “obfuscator” 1210; or “program encrypter” 1220; and/or “hiddenprogram generator” 1230, generating modules for remote execution; orexecution in memory modules which are not easily available orrecognizable and/or “object code program generator” generating softwarewhich makes the code unchangeable and/or it embeds the code in a tamperproof device” 1240. In all cases, the outcome is a single logic programwhich can be an obfuscated program” 1211; and/or “an encrypted program”1221; and/or “a hidden program” 1231 and/or “an object program” 1241.Examples of various options to be executed are presented in FIG. 12. Theprogram can be integrated where part of it is hidden and another part isencrypted and other such combinations are possible. It is clear to onewho is familiar with the art how to combine and super-impose thetransformation above and variation thereof as part of the system forsecure integration.

The exact sequence and nature of the obfuscation and/or encryptiontransformations maintain the logic of each of the module, but makes theexecutable logic a unique integrated logic which is to be executed asone logic without the user being able to separate the modules, are alsosubject to variation, and is known in the art as explained in thebackground for the present invention.

In a preferred embodiment, the system for secure integration can besafely run (execute), wherein the single logic program is written to beimmune to reverse generation; namely, there is no effective way toseparate by reverse engineering the module to be executed separately.

The system can be executed on various inputs and in particular, whereinone of the software logic modules provides a cryptographic function forproducing pseudo-random sequence of security tags vectors 711. In thecase where this module is not available for reverse engineering thenthere is no way to generate the output sequence of security tags due tothe strength of unpredictability of cryptographic functions.

The system in this case can use various means known in the art and run,wherein producing pseudo-random sequence of security tags involvescomputation by at least one of the following methods: applying apseudo-random generator, applying a pseudo-random function, applying acryptographic function, applying an encryption function, applying ascrambling subroutine, applying an authentication function, applying adigital signing function, applying a cryptographic hash function,applying a subroutine, applying a computational logic module, applying asymmetric cryptography function, applying an asymmetric cryptographyfunction, employing a cryptographic key, employing a cryptographic seed,employing an encrypted software, employing an obfuscated software,employing a hidden program, employing logic with a set of parameters,employing a hardware module, employing a smart card, employing aportable device, and employing a distributed protocol. These methods areexamples and not exclusive and are available in the art as softwareand/or hardware subroutines.

The system of the secure logic integration achieves a mechanism wherethe single logic program (in one of many forms 1211,1221,1231,1241) cannow perform in one location (e.g., a TFG 110TFG) as a hidden programportion 414, and signal the security tag (with various fields as in711,712,713,714) and due to the uniqueness of the module and the factthat the input logic modules are now interlocked and are executed alltogether, we are assured that the functionality of the separate logicmodules is faithfully executed when the signal is correctly generated.When the security tags are attached to a stream of packets as in 111,they can be checked at another location e.g., the TTC 120TFG. Thechecking 910 assures the origin of the security tags and thus the streamof packets. The TFG controller 1010 uses the unique logic module andthus functionally also the pseudo random tag generator 1020, whereas theTTC controller 1110 employs the pseudo random tag generator 1120 tocheck the tag by comparison.

In a preferred embodiment, the system for secure integration is run,where one of the software logic modules provides logic to construct datapackets. In fact, such logic modules can be any type of networkingsoftware, and a combination of networking modules can be integrated aswell. The notion of data packet is general and for example, we canexecute the system for providing logic integration, wherein logic toconstruct data packets computes at least one of: IP data packet, TCP/IPdata packet, UDP data packet, ATM data packet, MPLS data packet, TCP SYNsignal, PING signal, ICMP signal, IPv4, IPv6, FC frame, cable modemframe, Ethernet frame, and data packet segmentation.

The system for secure logic integration provides a single logic modulewhich hides certain rules of execution, thus the mechanism assures tointerlock the signal generation of security tags and the rules ofexecution. In particular, the system is run wherein one of the softwarelogic modules provides rules of transmission. These rules are part of acomputation, and the system is run, wherein the rules of transmissioncompute at least one of: performance characteristics, accesscharacteristics, transmission limitations, transmission rates, windowsizes, port numbers, IP addresses, network addresses, quotas, renewablequotas, packet structure limitations, and schedule. Indeed, acombination of rules is possible, as well, to assure a number ofexecution rules are followed for various transmissions and variousoperations.

The system of secure integration of separate logic modules can integraterules, wherein at least one of the rules of transmission determines arenewable precondition for transmission. This will enforce the TFGcontroller 1010 to request and receive renewable codes and parameters1041 from a TFG renewable controller 1040 when the single module will beexecuted in the TFG controller. The system of secure integration can berun wherein the renewable precondition for transmission is least one of:renewable transmission quota of trusted data packets, number of trusteddata packets that can be transmitted per unit of time, time signal, UTCtime signal, digitally signed time signal, digital cash for transmissionof trusted data packets, and cryptographic keys for marking trusted datapackets. These quota oriented methods and cryptographic refreshparameters methods are known in the art. However, in accordance with oneaspect of the present invention, logic has to be integrated forrecognizing renewable condition and activation of renewable codes andparameter receipt process when precondition for transmission is notvalid. The system can be constructed wherein the renewable preconditionfor transmission is obtained from at least one of: a predefined logic,an external rule controller, a security management system, networkinterface, network appliance, server, network management system,firewall, local computation, smart card device, and portable device.These are examples of possible location and operation of the TFGrenewable controller 1040.

The system for secure integration can get as input where combinations ofindividual software modules are provided as input. A first example iswhere it can be run, wherein one of the software logic modules providesa cryptographic function for producing a pseudo-random sequence ofsecurity tags; and wherein one of the software logic modules provideslogic to construct data packets. A second example is the system whereinone of the software logic modules provides a cryptographic function forproducing a pseudo-random sequence of security tags; and wherein one ofthe software logic modules provides rules of transmission. A thirdexample is the system wherein one of the software logic modules providesa cryptographic function for producing a pseudo-random sequence ofsecurity tags; wherein one of the software logic modules provides logicto construct data packets; and wherein one of the software logic modulesprovides rules of transmission.

A demonstrative example is illustrated in FIG. 14, where the plainprogram components to be integrated are a well-behaved operationalprogram (e.g., a TCP program in the context of the Internet protocol)that has defined rules of transmissions (e.g., a window size), a secondcomponent is a cryptographic program for security tag generation, athird is a parameter table (with e.g., the seed for a pseudo randomgenerator) and a fourth component is a control program for adding rulesto the integrated task (e.g., automatic refresh parameters for therenewable rules).

In accordance with another aspect of the present invention, to achieve alarge set of possible hidden programs, we need the system of secureintegration of software modules, further comprising: a source ofinterlocking parameters 1211; and wherein the transformation controlleris further comprised of means for combining the software logic modulesaccording to defined interlocking logic responsive to the interlockingparameters. The source of interlocking parameters is generated by arandom source, cryptographic keys, or a defined table and location inmemory. Other methods that allow the logic to choose from a large set ofoptions are possible to the one familiar with the art and one can employcryptographic means and decision tree logic for activatingtransformations in a random and unknown fashion.

This provides a system, wherein the transformation controller (1210,1220, 1230, 1240) determines an intermixture of the subtask functions ofthe plurality of software logic modules into the single program toprovide the combined functionality. Further, the system is such, whereinthe intermixture can be provided in a defined plurality of differentways; and wherein each of the different ways provides a different one ofthe single program providing the combined functionality.

The resulting system is such wherein the intermixture is furthercomprised of at least one of: obfuscation, encryption, replication,adding dummy code, addition of redundant control, renaming of variables,splitting a procedure into multiple sub-procedure, dictionarytransformation, compilation, interpretation, cryptographictransformation, digital signing, and scrambling. Other transformationthat change the representation of the logic and its way of execution butdo not change the meaning and results of the logic are in the art.

For example, it can comprise a system wherein replication comprised ofrepetitions of the software logic modules into an oversize programcomprising the single program embedded therein; and we can have thissystem, wherein each repetition is made active separately to define anactive single program within the oversize program, which acts as thesingle program.

In many situations, in accordance with another aspect of the presentinvention, for the system for secure integration, the transformationcontroller further generates external software modules for linkedoperation with the single program required for the combinedfunctionality is needed. For example the resulting single program (inthe TFG 110TFG) may be required to consult with another subsystem (theTTC 120TTC) where the external software modules reside and operate.

The system for secure integration of software modules, which alsogenerates external logic modules, can be run where it is furthercomprised of means for transmitting the external software modules toseparate computing subsystems; and wherein the external software modulesare executed in the separate computing subsystems to provide at leastone of: update information and renewable information coupled to thesingle logic program.

The system can be executed wherein means for transmitting furtherinvolve at least one of: encryption, authentication, and digitalsigning. The system can be run wherein the update information is atleast one of: change data, change executable code, change pattern,change order and pseudo-change of dummy code.

The system can be run, wherein the renewable information is at least oneof: renewable transmission quota of trusted data packets, number oftrusted data packets that can be transmitted per unit of time, timesignal, UTC time signal, digitally signed time signal, digital cash fortransmission of trusted data packets, and cryptographic keys for markingtrusted data packets.

Note that the system of secure integration can be further comprised ofmeans for transmitting of the single logic program to a primarycomputing system. The system can be run wherein means for transmittingfurther involve at least one of: encryption, authentication, and digitalsigning.

In particular, the system can be combined wherein there is securityverification information generated by the transformation controller, forutilization by a separate security tag verification logic in a separatecommunications subsystem which validates the security tag.

Such an operation by the resulting single program and resulting externalsoftware modules is illustrated in FIG. 13, where the single program isexemplified by a distributed execution of first hidden program 1310 isrequired to call 1311, 1313 and get returns 1312, 1314 when executed.The external software modules of codes 1340 and parameters 1350 areresponsible for the returns. This distributed execution is activated ona data packet with empty generic parameters 1301. To demonstrate that asingle program operation can be repeated in many places and by varioussoftware components in the computing subsystem we can view thecontinuation of the execution in 1310 that continues with 1330 but onthe output of 1310 which is a data packet with first generic parameters1302. The operation is a second single program represented by adistributed execution of second hidden program 1330 with calls 1331,1333, and returns 1332, 1334 from a second code 1360 and secondparameters 1370 in a second external software modules.

The system of secure integration of separate logic modules can be suchwherein one of the software logic modules provides security services.There are many examples of such services. The services can combine usersand programs in a secure way and integrate them into the operationalmodules, generating a security tag based on them and generating it onthe operational level without the need for extra operations from theuser or the program. In fact, the system can be such, wherein thesecurity services include means for at least one of: userauthentication, user sign-on, data packet authentication, user login,applying user's cryptographic keys, applying organization'scryptographic keys, and digital signing. It can be such wherein securityservices further provides means for applying cryptographictransformations based on keys belonging to a primary computing system.The primary computing system can be the one that includes means forexecution of single logic program.

One embodiment of the present invention embeds security servicesautomatically into the operational level. The services can authenticateelements and embed the authentication information in the security tags.This will result in a virtual private network implemented in theoperational level of packet handling and rules of transmission.

The system can be such that one of the software logic modules providesfor a cryptographic function for producing pseudo random sequence ofsecurity tags, and further comprising of means for providing one of thesoftware logic modules to a secondary computing subsystem.

The generation of the hidden program single module and the externalmodules and the distribution are all part of the transformationcontroller and constitute together with the logic component fortransformations, cryptography and transmission the system enabling asingle logic module which has a combined functionality.

Hiding and Obfuscating TCP (Transport Control Protocol):

FIG. 16, FIG. 17, FIG. 18, FIG. 19, and FIG. 20 show a possibleembodiment of the present invention for allowing the network to verifyand authenticate the proper operation of the TCP layer implementation onthe users' terminals. FIG. 16 illustrates the high protocol layers of aprotocol stack, wherein a plurality of applications 1620-1 and 1620-2transmit and receive data units to and from other plurality ofapplications through an interface layer named socket layer 1640. Thesocket layer 1640 translates requests to send data units by each of theplurality of applications 1620-1 and 1620-2 into requests TCP_Send 1655to a Trusted TCP Code 1600TFG for sending sequences of bytes to a remoteend system. The socket layer 1640 hands to the respective one of theplurality of applications 1620-1 and 1620-2 sequences of bytes providedby the TCP code 1600TFG though data line TCP_Received 1650, wherein eachsequence of bytes had been previously received from a remote end systemby the TCP code 1600TFG.

The Trusted TCP Code 1600TFG implements defined rules of transmissionfor the reliable exchange of bytes with a remote TCP layer instancethrough a bi-directional TCP connection. Bytes provided by the SocketLayer 1640 through data line TCP_Send 1655 are organized in data unitscalled TCP segments and transferred to an Internet Protocol Layer 1610through data line IP_Send 1665. The IP Protocol Layer 1610 isresponsible for delivery of TCP segments to a remote IP Protocol Layer1610 entity that transfers them to the respective Trusted TCP Code1600TFG through data line IP_Received 1660.

The Trusted TCP Code 1600TFG includes a Pseudo Random Tag Generator 1120for generation of a security information to be included in a TCP segmentthat is transmitted, wherein the security tag information is aimed atcertifying that the corresponding TCP segment was generated by a TrustedTCP Code 1600TFG, e.g., the TCP transmitter that originated the TCPsegment operates in compliance with defined rules of transmission.Network nodes, e.g., routers, switches, gateways, proxies, and networkappliances, and the destination can use the security informationenclosed in a TCP segment to verify that it was generated by Trusted TCPCode 1600TFG.

In an alternate embodiment, the security information encompasses aSecurity Tag Vector and a Security Tag Serial Number, as previouslydescribed within the present disclosure. In another embodiment thesecurity information is carried with the Acknowledgment number fieldwithin the TCP header, whereby such field is not used to carrypiggybacked acknowledgement information. In an alternative embodimentthe TCP header is modified to include an additional field carrying thesecurity information. In an alternative embodiment the securityinformation is enclosed within the TCP payload.

In one embodiment, the Trusted TCP Code 1600TFG includes a Trusted TagChecker 120TTC for verifying the security information included withinTCP segments received through data line IP_Received 1660.

The Trusted TCP Code 1600TFG receives external timing information from areal-time Clock 1630 through a Clock_Tick 1635 line for implementingtimers essential for proper TCP operation as it is described in thefollowing. (Further detail can be found in, “Internetworking withTCP/IP” by D. E. Comer, Prentice-Hall, Third Edition, 1995, ISBN0-13-216987-8; “TCP/IP Illustrated, Vol. 1: The Protocols” by W. R.Stevens, Addison-Wesley, Reading, Mass. 1994.)

FIG. 17 illustrates the operation of the Trusted TCP Code 1600TFG uponbeing provided, through data line TCP_Send 1655, with data bytes to betransmitted 1750 to a respective remote TCP layer entity. The provideddata bytes are stored in a respective TCP sender buffer 1710 thatcontains all the data bytes for which delivery has been requested by atleast one of a plurality of applications and delivery has not beenconfirmed yet by a corresponding remote TCP layer entity.

Next, the Trusted TCP Code checks 1720 whether the TCP transmissionwindow includes data bytes stored in the sender buffer and not yet sent,in which case a procedure which task is to assemble and send a TCPsegment 1800 is initiated.

FIG. 18 illustrates an embodiment of the present invention, for theprocedure by which to send a TCP segment. The procedure consists of anexecution loop that is repeated as long as 1810 the TCP transmissionwindow includes data bytes stored in the sender buffer which are notsent yet. If the amount of such bytes does not exceed a minimumthreshold for which sending a TCP segment is considered worthy 1820, theSend TCP Segment 1800 procedure is terminated 1820-N.

Otherwise 1820-Y, a TCP segment is prepared for transmission 1830, i.e.,the corresponding header fields are computed, the header is assembled,and the corresponding data bytes appended as a payload. If the TCP layerentity has to acknowledge the reception of data bytes along the otherdirection of the TCP connection, the acknowledgement information isadded and put inside the corresponding TCP header fields 1840. In thepreferred embodiment the acknowledgment information consists of anAcknowledgement number that identifies the last in-sequence bytereceived, and an ACK bit flag that indicates that the acknowledgementnumber field contains a valid value.

The security tag vector (STV) 711 is then computed 1850 and, togetherwith a Security Tag Serial Number (STSN) 712, coupled to the TCP segment1860. Finally, the TCP segment including the security information issent 1870 by transferring it to the IP layer entity through data lineIP_Send 1665 in FIG. 16.

FIG. 19 illustrates an alternate embodiment of the present invention,wherein operations are performed by the Trusted TCP Code 1600TFG eachtime a timing signal is provided 1910 by the Real-time clock 1630 inFIG. 16 through line Clock_Tick 1635. The first transmitted TCP segmentcontained in the transmission window is considered 1920 and an executionloop is repeated for each transmitted TCP segments contained in the TCPtransmission window whose corresponding associated re-transmission timeshas timed-out 1930.

The TCP sender window is updated 1940 according to the defined rulesimplemented by the Trusted TCP code 1600TFG. In one alternate embodimentof the present invention, the window size is halved. In anotheralternate embodiment, the window size is reduced to one TCP segment. Inyet another alternate embodiment, the window size is decreased in atleast one of: a linear way, a multiplicative way, an additive way, andan exponential way. In another embodiment, the window size is leftunchanged.

If the TCP layer entity has to acknowledge the reception of data bytesalong the other direction of the TCP connection, the acknowledgementinformation is added and put inside the corresponding TCP header fields1840. In the preferred embodiment the acknowledgment informationconsists of an Acknowledgement number that identifies the lastin-sequence byte received, and an ACK bit flag that indicates that theacknowledgement number field contains a valid value.

The security tag vector (STV) is then computed 1850 and, together with aSecurity Tag Serial Number (STSN), coupled to the TCP segment 1860.Finally, the TCP segment including the security information is re-sent1970 by transferring it to the IP layer entity through data line IP_Send1665 in FIG. 16. The next transmitted TCP segment contained in the TCPsender window is considered 1980 for the next iteration of the executionloop.

FIG. 20 illustrates the operations performed by one embodiment of theTrusted TCP Code 1600TFG in FIG. 16 each time a TCP segment is provided2010 by the corresponding IP layer 1610 through the IP_Received dataline 1660.

In one preferred embodiment, the STV and STSN are extracted from thereceived TCP segment 2020 and the Trusted Tag Checker 120TTC in FIG. 16included in the Trusted TCP Code 1600TFG checks that the STV has beenproperly generated 2030 in FIG. 20. This enables the receiver TrustedTCP Code 1600TFG to verify that the corresponding received TCP segmenthas been sent by a sender Trusted TCP Code 1600TFG operating accordingto defined rules for transmission.

According to such preferred embodiment if the check on the tag 2030reveals that the TSV has not been properly generated 2030-N, thecorresponding received TCP segment is discarded and not processed anyfurther.

If the check on the tag 2030 reveals that the TSV has been properlygenerated 2030-Y, the Trusted TCP Code 1600TFG checks whether thereceived TCP segment contains a payload 2040, in which case the payloadis processed as described in the following. The data bytes contained inthe payload are saved in a receiver buffer 2050. Then the content of thesequence number field in the TCP header of the respective received TCPsegment is considered for checking 2060 whether the data bytes carriedin the payload field of the respective TCP segment are in sequence withthe data bytes carried within previously received TCP segments.

If the first data byte in the payload of the respective received TCPsegment immediately follows the last consecutive byte received 2060-Y,the data bytes contained in the payload field of the respective receivedTCP segment can be delivered 2065 to the respective destinationapplication 1620-1 and 1620-2 in FIG. 16, through data line TCP_Received1650. In yet another embodiment, all of the data bytes contained in thepayload field of the respective received TCP segment are provided to therespective destination application 1620. In another embodiment, at leastone of only part of the data bytes and none of the data bytes aredelivered to the respective application 1620. In yet another embodiment,the data bytes contained in the payload field of the respective receivedTCP segment are provided to the respective destination application 1620together with data bytes contained in the payload filed of previouslyreceived TCP segments that had been stored in the receiver buffer butnot yet delivered to the respective destination application 1620.

Acknowledgement of the received data bytes is then taken care of 2070.In one embodiment, a TCP segment is sent to the sender of the receivedTCP segment; the Acknowledgement Number field included in the header ofthe sent TCP segment contains the sequence number of the lastin-sequence byte received and the ACK bit flag, which indicates that theAcknowledgement Number field contains a valid value.

In an alternate embodiment, acknowledgment information is not sent tothe sender of the received TCP segment within a TCP segment generatedexplicitly for this purpose; instead, the acknowledgement information ispiggybacked within the header of a TCP segment carrying data bytes tothe sender of the received TCP segment. In an alternative embodiment,transmission of acknowledgement information is delayed until more databytes are received within the payload field of successively received TCPsegments.

Next, the Trusted TCP Code checks whether the received TCP segmentcontains valid acknowledgement information 2075. In the preferredembodiment this is accomplished by checking the ACK flag bit containedin the header of the TCP segment. If the header of the received TCPsegment contains valid acknowledgement information 2075-Y, suchinformation is processed 2080 and the sender window of the Trusted TCPCode 1600TFG is properly updated according to the defined transmissionrules. Then the procedure for sending TCP segments 1800 is entered.

Management of Trusted Flow System:

FIG. 21 illustrates a system consisting of a plurality of TFGs 110TFG, aplurality of TTCs 120TTC, and plurality of secure management servers(SMSs) 150SMS, such that, the TTCs together with the SMSs are capable ofdetecting and reacting to various unexpected communications patterns.The TFGs, TTCs and SMSs are capable of communicating with one anothervia a network 150. The SMSs and TTCs are further capable of exchangingsecurity management signals 161 in a manner described in FIG. 23, FIG.24, FIG. 25 and FIG. 26.

As illustrated in FIG. 21, the TTC controls the flow of data packets toservers 130Serv that are located in costumer premises. Such costumerpremises include, but are not limited to: enterprise networks, localarea networks, virtual private networks, enterprise networks and storagearea networks.

FIG. 22 illustrates a system consisting of a plurality of TFGs and asequence of TTCs, such that, the TTCs are capable of authenticating thepath traversed by data packets 111 that were sent from the TFGs.

In another embodiment of the present invention, the system in FIG. 22controls the data packet flow over at least two computing elements,which are TFG 110TFG and TTC 120TTC each comprising means for generatingsecurity tag vectors 711 (shown in FIG. 7). Each TFG 110TFG has furthermeans for associating the security tag vector 711 with a first computingelement responsive to compliance logic. The TFG further includes meansfor generating a data packet, which includes a security portion. Thesecurity portion is a security tag vector 711, as it was described indetail in FIG. 8 and FIG. 10. The system in FIG. 22 further includesmeans for transmitting the data packet over a communications path. TheTTC 120TTC constitutes a second computing element and has further meansfor receiving the data packet and capability for processing the datapacket to validate the security tag vector 711, as was described indetail in FIG. 9 and FIG. 11.

The system shown in FIG. 22, further comprises means for transmittingthe data packet from the second computing element, which operates asTTC, as described in FIG. 9 and FIG. 11, for further processing in atleast a third computing element, which operates as the TTC, as describedin FIG. 9 and FIG. 11. The result of the sequential checks by thesequence of TTCs is validation that the sequence data packets with thesequence of security tag vectors 711 have been transmitted over apredefined communications path or route in the network 150. In general,the communications path includes second computing element, thirdcomputing element and so on, each of which has the TTC 120TTCfunctionality (as was described in detail in FIG. 9 and FIG. 11) capableof validating that the sequence data packets with the sequence ofsecurity tag vectors 711 have been transmitted over a predefinedcommunications path or route in the network 150.

FIG. 23 illustrates the various operation management messages (OMMs)exchanged among the TTCs and SMSs for detecting unexpectedcommunications patterns and the various possible responses messages whendetecting such pattern. In some embodiments of the present invention,the content of OMMs are: (1) authenticated and signed (A and S) and/or(2) sent with TS (time stamp), wherein TS are in some cases from UTC002.

The OMMs that are illustrated in FIG. 23 have the following fields. Forinitialization operations: (I1) HP: Hidden Program, (I2) CP: CheckerProgram and (I3) Registration. During run-time the following run-timereports are exchanged among the TTCs and SMSs: (R1) PU(N): Number ofPremium Users and (R2) A(L): Attack Location. As a result of detectingunexpected communications pattern the following run-time action messagesare exchanged among the TTCs and SMSs: (A1) D/E: Disable/enablenon-premium users and (A2) LPU(N): Limit the Number of Premium users.The manner in which the various messages are exchanged is shown indetail in FIG. 23.

The manner in which the TFGs, TTCs and SMSs are acting and responding isdescribed in detail, and is illustrated in FIG. 24, FIG. 25 and FIG. 26,respectively.

FIG. 24 illustrates the TFG 110TFG operation before and after detectingunexpected communications patterns. When a TFG opens a connectionthrough a TTC 2410 the TFG sends a registration message R to this TTC2411. In some embodiments of the present invention, the connection canbe a virtual private network (VPN) connection 2810—as shown in FIG. 28.When TFG detects an attack 2420, the TFG sends A(L) or attack locationmessage to TTCs and SMSs 2421. When TFG receives HP (hidden program)message from TTC or SMS 2430, the TFG incorporates the HP into itsoperational code 2431. This last operation is equivalent to therenewable and update operations that were described in detail in FIG.10, specifically, the operations of the TFG renewable controller 1040and TFG update controller 1050.

FIG. 25 illustrates the TTC 120TTC operation in detection and afterdetecting unexpected communications patterns. When TTC receivesregistration (R) message from TFG 2510, the TTC updates the number ofpremium users (PU(N)) 2511. When TTC receives checker program (CP) formSMS 2520, the TTC incorporates the CP into its operational code 2521.This last operation is equivalent to the renewable and update operationsthat are described in detail in FIG. 11, specifically, the operations ofthe TTG renewable controller 1140 and TTC update controller 1150. WhenTTC receives attack location (A(L)) message from TFG, another TTC, SMS2530, the TTC sends attack location (A(L)) message to other TTCs andSMSs with the location of the attack 2531. When TTC receives D/E(disable/enable) non-premium users' messages from another TTC or SMS2540, the TTC enable/disable, accordingly, non-premium service users2541. When TTC receives LPU(N) (limit the number of premium users to N)message from another TTC or SMS 2550, the TTC limits the number ofpremium users to N 2551.

FIG. 26 illustrates the SMS operation for detection and after detectingunexpected communications patterns. When SMS receives registration (R)message from TFG 2610, the SMS updates the number of premium users(PU(N)) 2611. When SMS receives attack location (A(L)) message from TFG,another TTC, SMS 2620, the SMS sends attack location (A(L)) message toother TTCs and SMSs with the location of the attack 2621. When SMSreceives D/E (disable/enable) non-premium users message from another TTCor SMS 2630, the SMS enable/disable, accordingly, non-premium serviceusers 2631.

The network management system, is illustrated in FIG. 21, FIG. 23, FIG.24, FIG. 25, and FIG. 26, and comprises: a plurality of trusted flowgenerator (TFG) subsystems 110TFG, a plurality of trusted tag checker(TTC) subsystems 120TTC, and a plurality of secure management server(SMS) subsystems 160SMS. Each of the TFG subsystems sends and receivesmanagement messages and selectively generates security tag vectors(STVs) 711. Each of the STVs is generated responsive to compliancelogic, which are part of each of the TFG, a and each STV 711 isassociated with each respective one of the data packet headers.

Each of the TTC subsystems 120TTC, that is part of the systemillustrated in FIG. 21, FIG. 23, FIG. 24, FIG. 25, and FIG. 26, sendsand receives management messages and selectively generates a comparisontag for comparison to the security tag vector 711 for each respectiveone of the received data packets 111. The network management systemsends and receives management messages over a communications networkthat is used for coupling the data packets, the plurality of TFGsubsystems, the plurality of TTC subsystems and SMS subsystems. Each ofthe TFG subsystems is comprised of logic comprised of packet processing,rules of transmission and security tag generation.

In the network management system is illustrated in FIG. 21, FIG. 23,FIG. 24, FIG. 25, and FIG. 26, each of the TTC subsystems sends a countmessage that provides a report of a count of how many TFG subsystems arecoupled for transmission of data packets 111 through the TTC subsystems.Each TFG subsystem is considered as a premium user. The TTC subsystemsupon receiving the count messages with the number of premium users (orTFG subsystems) from other TTC subsystems sum them up into a TTC numberof premium users—PU(N)—see the table in FIG. 23. When PU(N) exceeds apredefined threshold the TTC subsystem sends a notification message tothe SMS subsystem. The notification message can be one of two types:(A1) D/E: disable/enable non-premium users and (A2) LPU(N): limit thenumber of premium users—as shown in FIG. 23.

The SMS and TTC subsystems send update information for the rules oftransmission and security tag vector generation of selected ones of theTFG subsystems. The update information to the rules of transmission andsecurity tag vector generation is sent as part of the HP (hiddenprogram) message—as shown in FIG. 23. The SMS subsystem sends renewableinformation to the rules of transmission and security tag vector 711generation of selected one of the TFG subsystems. The update informationand the renewable information are sent as illustrated in FIG. 10.

The data packets are divided into two groups: a first group of the datapackets, from premium users, which are communicated with respective onesof the security tags vector 711; and a second group of the data packets,from non-premium users, which are communicated without respective onesof the security tags vector.

The SMS subsystem is responsive to the received management messages, asillustrated in FIG. 23, for controlling the flow of the data packets onthe communications network 150. The plurality of TTC subsystems 120TTCprovide report count message with the number of premium users PU(N),wherein each premium user generates and sends data packets with securitytag vectors from TFG subsystem 110TFG. The SMS subsystem is responsiveto the PU(N) messages from the plurality of TTC subsystems forcontrolling flow of the data packets in the communications network 150.The SMS subsystem is disabling and enabling the flow of the data packetsresponsive to the report count messages—PU(N)s. The SMS subsystemlimits, to a predefined number, the flow of the data packets responsiveto the report count messages—PU(N). The SMS subsystem is disabling andenabling at least one of: first group of the data packets and secondgroup of the data packets, wherein the first group of the data packetsoriginated from a set of premium users. The SMS subsystem limits, to apredefined number, at least one of: first group of the data packets andsecond group of the data packets.

The SMS monitors the received messages from the TTC subsystems to detectan attack pattern responsive to attack analysis logic. The attackanalysis logic consists of the data packets traffic load over all linksof the communications network 150. The attack analysis logic gets asinput at least one of: type of data packets sent by TFG subsystems110TFG, type of data packets received by TTC subsystems 120TTC, numberof data packets sent by TFG subsystems, rate of data packets sent by TFGsubsystems, number of data packets received by TTC subsystems, rate ofdata packets received by TTC subsystems, sources of data packets sent byTFG subsystems, sources of data packets received by TTC subsystems,destinations of data packets sent by TFG subsystems, destinations ofdata packets received by TTC subsystems, routes of data packets sent byTFG subsystems, and routes of data packets received by TTC subsystems.

The attack analysis logic is responsive to its input and determinesselected control messages, as illustrated in FIG. 23, to be sent torespected ones of plurality of TTC subsystems and respected ones ofplurality of TFG subsystems. The attack analysis logic responsive to itsinput, and the data packets traffic load over all links of thecommunications network 150, determines the attack location. The attackanalysis logic responsive attack location sends selected controlmessages—as illustrated in FIG. 23.

The selected control messages determine, for each TTC subsystem, atleast one of: disabling the first group of the data packets, disablingthe second group of the data packets, enabling the first group of thedata packets, enabling the second group of the data packets, limitingthe first group of the data packets, and limiting the second group ofthe data packets; wherein the first group of the data packetscorresponds to premium users generating data packets from TFG subsystems110TFG, and wherein the second group of the data packets were generatedby non-premium users.

The selected control messages, as illustrated in FIG. 23, furtherdetermine (for each TFG subsystem and/or for each TTC subsystem) atleast one of: disabling the first group of the data packets, disablingthe second group of the data packets, enabling the first group of thedata packets, enabling the second group of the data packets, limitingthe first group of the data packets, and limiting the second group ofthe data packets.

The send and receive management messages, as illustrated in FIG. 23,contain at least one of: an authentication field, a digital signaturefield, a time-stamp field, an encrypted field, an encrypted portion ofthe message, and a keying information field.

The Authenticate Challenge Request and Response Operation:

FIG. 27 is an illustration of an embodiment of the present invention,wherein a system that consists of a TFG challenge controller sendsauthenticate challenge request messages to users and programs andreceives back authenticate challenge response messages, and only whenthe responses respectively match the challenge requests, will the systemgenerate and send data packets with security tag vectors.

The secured network management system illustrated in FIG. 27, is managesthe communications of data packets. The system comprises: a plurality oftrusted flow generator (TFG) subsystems; a plurality of trusted tagchecker (TTC) subsystems; and a plurality of secure management server(SMS) subsystems.

In said system, each of the TFG subsystems sends and receives messagesand selectively generates security tag vectors 711, responsive tocompliance logic for association with each respective one of the datapackets.

The system illustrated in FIG. 27 includes a communications network forcoupling the data packets, the plurality of TFG subsystems, and theplurality of TTC subsystems; and wherein each of the TFG subsystems110TFG is comprised of logic comprised of packet processing, rules oftransmission and security tag vector 711 generation; wherein the TFGsubsystem further comprises a TFG challenge controller 2710.

The TFG challenge controller 2710 further comprises a communicationsubsystem for interaction with users and programs that produce inputsfor packet processing; wherein the communication subsystem sends achallenge message 2711 to users and programs that produce inputs forpacket processing; wherein challenge message 2711 comprises at least oneof: a cryptographic field, an encryption field, a clear text field, arequest for users to perform a task using a keyboard, a request forusers to perform a task using a mouse, a request for users to perform atask using a biometrics reader, a request for users to perform a taskusing a terminal input function, requesting an answer to a verbalquestion, requesting an answer to an audiovisual question, requesting ananswer to a previously stored data item, requesting an answer related topublished information within the user and the program computingsubsystems, requesting payment, requesting digital form of payment,requesting a credit card number, requesting information retrievable froma smart card, requesting information retrievable from a portable device,an activation of a sensor enabling the receipt of sensory information,and requesting information based on means of computing received from theSMS subsystem.

The TFG challenge controller 2710 receives a response message 2712 fromusers and programs that produce input for packet processing; whereinresponse message 2712 comprises at least one of: a cryptographic field,an encryption field, a clear text field, a response to a request forusers to perform a task using a keyboard, a response to a request forusers to perform a task using a mouse, a response to a request for usersto perform a task using a biometrics reader, a response to a request forusers to perform a task using a terminal input function, a response to amessage requesting an answer to a verbal question, a response to amessage requesting an answer to an audiovisual question, a response to amessage requesting an answer to a previously stored data item, aresponse to a message requesting an answer related to publishedinformation within the user and the program computing subsystems, aresponse with payment, a response with a digital form of payment, aresponse with a credit card number, a response with informationretrievable from a smart card, a response with information retrievablefrom a portable device, a response with a signal, a response with aradio signal, a response with a wireless signal, a response with an RFinformation, a response with an IR information, response with sensoryinformation, response with audio information, response with olfactoryinformation, and an answer to a message requesting information based onmeans of computing received from the SMS subsystem.

As illustrated in FIG. 27, the TFG challenge controller 2710 allows userand program input to be used in packet processing responsive to aresponse message 2712 received from user and program. The TFG challengecontroller 2710 does not allow user and program input to be used inpacket processing responsive to a failed response message 2712 receivedfrom user and program.

The TFG subsystem 110TFG selectively generates data packets withsecurity tags responsive to the response messages 2712 that successfullyanswered the challenge request 2711. The TFG subsystem is then sendingthe data packets with security tags 711 to the TTC subsystem 120TTC. TheTTC subsystem upon receiving the data packet from the TFG subsystem isvalidating the data packet by analyzing the security tag 711.

The TTC subsystem further comprises: means for mapping the data packetwith security tags 711 to a first communications class of serviceresponsive to the validating the data packet and verifying therespective security tag 711; and means for mapping the data packet to asecond communications class of service responsive to the validating thedata packet with security tags resulting in failed verifying of thesecurity tag 711. Then the TTC subsystem couples the data packets of thefirst communications class of service for further communicationtherefrom. The TTC subsystem denies further communications therefrom ofthe data packets of the second communications class of service. The TTCsubsystem stores the second communications class of service in localstorage without further transmission. In another embodiment of thepresent invention, the TTC subsystem sends the data packet of the secondcommunications class of service is at a lower priority level than thedata packets of the first communications class of service.

The IP Virtual Private Network Functional Operation:

FIG. 28 illustrates a system that generates and sends data packets withsecurity tag vectors 711 over IP (Internet protocol) VPN (virtualprivate network) connection 2810 through a network interface, e.g.,firewall, classifier, and policer, while mapping data packets withverified security tag vectors 111 to premium service. Consequently, thedata packets that were generated and sent from an untrusted computingenvironment at the end station are to be trusted once the respectivesecurity tag vectors 711 have been verified.

The VPN connection 2810 is created by using a trusted flow generator(TFG) 110TFG and a trusted tag checker 120TTC as was specified in detailin the respective description of FIG. 8, FIG. 9, FIG. 10 and FIG. 11.

From the foregoing, it will be observed that numerous variations andmodifications may be effected without departing from the spirit andscope of the present invention. It is to be understood that nolimitation with respect to the specific apparatus illustrated herein isintended or should be inferred. It is, of course, intended to cover bythe appended claims all such modifications as fall within the scope ofthe claims.

1. A method of providing controlled communication, the methodcomprising: processing of data within a first computing system inaccordance with a first defined logic; generating a first security tagindependent of the first data packets, responsive to validating theprocessing, within the first computing system, occurring in accordancewith a second defined logic; wherein the generating of the firstsecurity tag is unrelated to content of the first data packet,transmitting the first security tag as an output from the firstcomputing system onto a communications path in accordance with thedefined rules of transmission for coupling to a second computingsubsystem; transmitting a first data packet, after the transmitting ofthe first security tag, as an output from the first computing systemonto a communications path in accordance with defined rules oftransmission; validating the first security tag responsive toindependent generation in the second computing system therein of asecond security tag; and controlling communications with the firstcomputing system responsive to the validating the first security tagresponsive to the generation of the second security tag.
 2. The methodas in claim 1, further comprising: receiving within a second computingsystem, the first security tag coupled from the communications path;validating in the second computing system, the processing of data inaccordance with a third defined logic responsive to generating thesecond security tag; and validating the processing occurring within thefirst computing system responsive to the first security tag and thesecond security tag.
 3. The method as in claim 2, further comprising:mapping the first data packet to a first defined action responsive tovalidating the processing of data in accordance with the third definedlogic; and mapping the first data packet to a second defined actionresponsive to a failed validating of the processing of data inaccordance with the third defined logic.
 4. The method as in claim 3,wherein the first defined action is comprised of enabling utilization ofcoupling the first data packet for further processing.
 5. The method asin claim 3, wherein the second defined action is comprised of denial offurther utilization of the first data packet.
 6. The method as in claim3, wherein the second defined action provides for local storage of thefirst data packet in the second computing system without furtherprocessing.
 7. The method as in claim 3, wherein the second definedaction has an associated second priority level, wherein the secondpriority level is a lower priority for transmission than the firstpriority level.
 8. The method as in claim 7, wherein the priority levelfor transmission is determined responsive to a predefined set of bitswithin the first data packet.
 9. The method as in claim 3, furthercomprising: wherein the first defined action provides for forwarding ofthe first data packet for further communication over a definedcommunications path.
 10. The method as in claim 9, wherein the definedcommunications path is part of at least one of: a VPN, an ATM, a FR, aCPN, a content delivery network (CDN), an ISP, a shared media, afirewall, a local area network, an Internet, a metropolitan areanetwork, a SAN, a link to an application server, a link to a web server,a link to a data base server, a link to an Internet server, a link to anetwork server, a public network, an enterprise network, and a carriernetwork.
 11. The method as in claim 3, further comprising: wherein thefirst defined action provides for enabling of coupling at least one ofthe first computing system and the second computing system to a thirdcomputing system.
 12. The method as in claim 11, wherein the thirdcomputing system is comprised of at least one of: an application server,a web server, a data base server, an Internet server, a network server,a firewall, a multimedia server, a video server, and a domain nameserver.
 13. The method as in claim 11, wherein the coupling provides fortransfer of data content from the third computing system to at least oneof the first computing system and the second computing system.
 14. Themethod as in claim 13, wherein the data content is comprised of at leastone of: application software, web-pages, audio content, video moviecontent, video still visual content, audiovisual content, and digitaldata content.
 15. The method as in claim 3, wherein the first definedaction is comprised of enabling further processing of the first datapacket in the second computing system.
 16. The method as in claim 3,wherein the first action is comprised of processing that is done by atleast one of: a router, a server, a web-server, a database, a firewall,and a network appliance.
 17. The method as in claim 2, wherein the firstcomputing system and the second computing system are both containedwithin a single physical computing system.
 18. The method as in claim17, wherein the single physical computing system is at least one of: asingle printed circuit hoard, a single chip, a single computing module,a single chassis, an hand held device, a PDA (personal data assistant),a cellular phone, a single box, and a user terminal.
 19. The method asin claim 2, wherein the first computing system and the second computingsystem are comprised of separate physical computing systems.
 20. Themethod as in claim 2, wherein the second computing system hasnon-modifiable processing logic.
 21. The method as in claim 2, whereinat least one of the first computing system and the second computingsystem is comprised of at least one of: a tamper-proof hardware, atamper-proof firmware, a self-destructive hardware, and a smart card.22. The method as in claim 2, further comprising: making at least oneof: the first computing system and the second computing systeminoperative responsive to detection of at least one of: tampering,attempting to replace hardware, attempting to replace firmware, andattempting to replace software.
 23. The method as in claim 2, furthercomprising: coupling the first computing system and the second computingsystem through a communications network.
 24. The method as in claim 23,wherein the communications network is at least one of: an accessnetwork, a metropolitan network, a local area network, a wirelessnetwork, an enterprise network, a cellular telephone network, a cablemodem network, a passive optical network, Ethernet, token ring, aspatial reuse ring, SONET ring, resilient packet ring, a costumerpremise network (CPN), an IP, Internet, a 3G wireless network, IEEE 802standards, ATM network, frame relay (FR) network, a virtual privatenetwork (VPN), a shared media, a peer-to-peer network, and a storagearea network (SAN).
 25. The method as in claim 2, further comprising:directly coupling the first computing system and the second computingsystem via at least one of: a Blue-Tooth connection, an infraredconnection, an input-output channel, an internal computer bus, auniversal serial bus (USB), a mother board, and an IEEE 1394 connection.26. The method as in claim 2, wherein the first computing system is partof at least one of: a single printed circuit board, a single chip, asingle computing module, a single chassis, an hand held device, a PDA, acellular phone, a smart card, a single box, a user terminal, anapplication software module, an operating system module, a Java applet,a communications software module, a firmware component, a softwaredriver, and a distributed system software module.
 27. The method as inclaim 2, wherein the second computing system is part of at least one of:a server, a firewall, a gateway, a router, a routing controller, a localarea network bridge, a local area network switch, a wireless basestation, a wireless 3G base station, an IEEE 802.11 base station, anIEEE 802.15 access, an IEEE 802.16 access, an IEEE 802.17 access, acable modem head-end, a central office, an ADSL DSLAM, and apoint-of-presence (PoP).
 28. The method as in claim 1, furthercomprising: obfuscating so as to impede observation and understanding ofat least one of: the processing of data in accordance with the firstdefined logic; and the processing of the first security tag inaccordance with the second defined logic.
 29. The method as in claim 1,wherein the generating of the first security tag is hidden within theprocessing of data in accordance with the first defined logic.
 30. Themethod as in claim 1, wherein generating of the security tag isencrypted within the processing of data in accordance with at least oneof: the first defined logic and the second defined logic.
 31. The methodas in claim 1, wherein the first defined logic is comprised of aplurality of parts, and wherein the second defined logic is comprised ofa plurality of parts, the method further comprising: receiving selectedones of the plurality of parts as selected parts comprised of at leastone of: selected ones of the plurality of parts of the first definedlogic and selected ones of the plurality of parts of the second definedlogic.
 32. The method as in claim 31, wherein the selected partsdetermine at least one of: performance characteristics, accesscharacteristics, transmission limitations, transmission rates, windowsizes, port numbers, IP addresses, network addresses, quotas, renewablequotas, usage parameters of copyright protected content, packetstructure limitations, and transmission schedule.
 33. The method as inclaim 31, wherein the selected parts are provided by at least one of alocal separate controller, a remote separate controller, a remoteserver, a remote web server, a firewall, a database, a video server, acontent delivery server, a smart card, a tamper resisting device, andself-destruction device.
 34. The method as in claim 1, wherein at leastone of the defined rules of transmission determines a renewableprecondition for said transmitting of at least one of said first datapacket and said first security tag vector.
 35. The method as in claim34, wherein the renewable precondition for transmission is defined byleast one of: renewable transmission quota of a number of first datapackets that can be transmitted per unit of time, time signal, UTC timesignal, digitally signed time signal, digitally signed time-stamp,digitally signed time-stamp from UTC (coordinated universal time),digital cash for transmission of the first data packets, biometric keys,and cryptographic keys for marking the first data packets.
 36. Themethod as in claim 34, wherein the renewable precondition fortransmission is comprised of one of being valid and of not being valid,the method further comprising: suspending the transmitting responsive tothe renewable precondition for transmission not being valid.
 37. Themethod as in claim 34, further comprising: obtaining the renewableprecondition for transmission is obtained from at least one of: apredefined logic, an external rule controller, a security managementsystem (SMS), a network interface, a network appliance, a server, anetwork management system, a firewall, a local computation, a smart carddevice, and a portable device.
 38. The method as in claim 1, furthercomprising: replacing at least a part of the first defined logic andapart of the second defined logic, with a new part of a respective oneof the first defined logic and the second defined logic.
 39. The methodas in claim 38, wherein the replacing comprises at least one of: addingdata, deleting data and replacing data and wherein data comprises atleast one of a plurality of lines of codes, machine codes, obfuscatedcodes, object codes, tables of codes, program parameters, subroutineparameters, tables of parameters, data structure of parameters, softwaremodules, alpha numeric values, cryptographic fields, assembly languagecode, software applets, program control information, firmware code,instructions for reprogramming programmable hardware elements such asfield programmable gate-arrays (FPLAs).
 40. The method as in claim 1,wherein the generating is comprised of at least one of applying apseudo-random generator, applying a pseudo-random function, applying acryptographic function, applying an encryption function, applying ascrambling subroutine, applying an authentication function, applying adigital signing function, applying a cryptographic hash function,applying a subroutine, applying a computational logic module, applying asymmetric cryptography function, applying an asymmetric cryptographyfunction, employing a cryptographic key, employing a cryptographic seed,employing an encrypted software, employing an obfuscated software,employing a hidden program, employing logic with a set of parameters,employing a hardware module, employing a smart card, employing aportable device, and employing a distributed protocol.
 41. A method ofproviding controlled communications, the method comprising: generating afirst computing system a respective generated security tag vectorgenerated responsive to processing of the data within the firstcomputing system according to a first defined logic; generating a localsecurity tag vector within second computing system, responsive to asecond defined logic; receiving data packets for local storage in thefirst computing system; controlling one of quality and class of servicefor communication of data packets responsive to the comparing of thelocal security tag vector to the generated security tag vector; andwherein the generated security tag vector and the local security tagvector are generated independent of the content of the data packets. 42.The method as in claim 41, further comprising: mapping the received datapackets to a first class of service responsive to determining the localsecurity tag vector equaling the generated security tag vector; andmapping the received data packets to a second defined action responsiveto the determining of a difference between the local security tag vectorfrom the generated security tag vector.
 43. The method as in claim 41,further comprising: wherein the first defined action provides forforwarding of the received data packet for communication utilizing adefined communications path.
 44. The method as in claim 43, wherein thedefined communications path is part of at least one of: a VPN, an ATM, aFR, a CPN, a content delivery network (CDN), an ISP, a shared media, afirewall, a local area network, an Internet, a metropolitan areanetwork, a SAN, a link to application server, a link to web server, alink to data base server, a link to Internet server, a link to networkserver, a public network, an enterprise network, and a carrier network.45. The method as in claim 42, further comprising: forwarding thereceived data packets to a third computing system responsive to at leastone of: the first defined action and the second defined action.
 46. Themethod as in claim 45, wherein the third computing system is at leastone of: an application server, a web server, a data base server, anInternet server, a network server, a firewall, a multimedia server, avideo server.
 47. The method as in claim 45, wherein the first definedaction is comprised of a processing of the received data packets. 48.The method as in claim 47, wherein the processing is done by at leastone of: a router, a server, a web-server, a database, a firewall, and anetwork appliance.
 49. The method as in claim 41, wherein the definedlogic is comprised of multiple parts, the method further comprising:replacing at least a part of the defined logic for the generating of thesecurity tag vector.
 50. The method as in claim 49, wherein thereplacing is comprised of using information obtained by at least one of:a local operation, a predefined logic, an external rule controller, asecurity management system, a network interface, a network appliance, aserver, a network management system, a firewall, a base station, a videoserver, a local computation, a smart card device, and a portable device.51. A system providing controlled communication of a first computingsubsystem, the system comprising: processing logic within the firstcomputing subsystem providing processing in accordance with firstdefined rules; tag logic within the first computing subsystem providinggeneration a first security tag responsive to validating the processingin accordance with the first defined rules; wherein the first computingsubsystem transmits the first security tag onto a communications path inaccordance with defined rules of transmission; wherein the firstcomputing subsystem transmits the first data packet onto acommunications path in accordance with the defined rules oftransmission; wherein the generating the first security tag is unrelatedto content of the first data packet; and a second computing system,wherein the second computing subsystem receives the first security tagfrom the communications path; wherein the second computing subsystemvalidates the first security tag on the second computing system,responsive to second defined rules; and wherein the second computingsubsystem controls communications between the first computing subsystemand the second computing subsystem, responsive to validating the firstsecurity tag.
 52. The system as in claim 51, further comprising: meansfor mapping the first data packet to provide a first defined actionresponsive to a successful validating by the means for validating; andmeans for mapping the first data packet to provide a second definedaction responsive to a failed validating by the means for validating.53. The system as in claim 52, wherein the first defined action providesfor coupling the first data packet for further communication.
 54. Thesystem as in claim 53, wherein the second defined action provides fordenial of further communication.
 55. The system as in claim 53, whereinthe second defined action provides for local storage in the secondcomputing system.
 56. The system as in claim 53, wherein the seconddefined action is at a lower priority level of transmission prioritythan that of the first defined action.
 57. The system as in claim 56,wherein the priority level of transmission is determined responsive to apredefined set of bits within the first data packet.
 58. The system asin claim 52, further comprising: means for forwarding the first datapacket for further communication over a defined communications pathresponsive to the first defined action.
 59. The system as in claim 58,wherein the defined communications path is part of at least one of: aVPN, an ATM, a FR, a CPN, a content delivery network (CDN), an ISP, ashared media, a firewall, a local area network, an Internet, ametropolitan area network, a SAN, a link to application server, a linkto web server, a link to data base server, a link to Internet server, alink to network server, a public network, an enterprise network, and acarrier network.
 60. The system as in claim 52, further comprising:means for forwarding the first data packet to a separate computingdevice responsive to the first defined action.
 61. The system as inclaim 60, wherein the separate computing device is at least one of: anapplication server, a web server, a data base server, an Internetserver, a network server, a firewall, a multimedia server, a videoserver, and a domain name server.
 62. The system as in claim 52, whereinthe first defined action is comprised of a local processing at thesecond computing subsystem of the first data packet.
 63. The system asin claim 62, wherein the local processing is done by at least one of: arouter, a server, a web-server, a database, a firewall, a networkappliance.
 64. The system as in claim 51, wherein the first computingsubsystem and the second computing subsystem are both contained within asingle physical computing system.
 65. The system as in claim 64, whereinthe single physical computing system is at least one of: a singleprinted circuit board, a single chip, a single computing module, asingle chassis, an hand held device, a PDA, a cellular phone, a singlebox, a user terminal.
 66. The system as in claim 51, wherein the firstcomputing subsystem and the second computing subsystem are eachcontained in separate physical computing systems.
 67. The system as inclaim 51, wherein the second computing subsystem is comprised ofnon-modifiable processing logic.
 68. The system as in claim 51, whereinat least one of the first computing subsystem and the second computingsubsystem is comprised of at least one of: a tamper-proof hardware, atamper-proof firmware, a smart card, and a self-destructive hardware.69. The system as in claim 51, wherein at least one of: the firstcomputing subsystem and the second computing subsystem is madeinoperative responsive to detection of at least one of: tampering,attempt to replace hardware, attempt to replace firmware, and attempt toreplace software.
 70. The system as in claim 51, further comprising:means for obfuscating to impede observation and understanding of leastone of: the processing of data in accordance with the first definedrules; and, processing, in accordance with the second defined rules. 71.The system as in claim 51, wherein the tag logic for providing forgenerating of the first security tag vector is hidden within theprocessing, in accordance with the first defined rules.
 72. The systemas in claim 51, wherein the logic for generating of the security tagvector is encrypted within the processing of data in accordance with atleast one of: the first defined rules and the second defined rules. 73.The system as in claim 51, further comprising: a communications networkfor coupling of the first computing subsystem and the second computingsubsystem.
 74. The system as in claim 73, wherein the communicationsnetwork is at least one of: an access network, a metropolitan network, alocal area network, a wireless network, an enterprise network, acellular telephone network, a cable modem network, a passive opticalnetwork, Ethernet, token ring, a spatial reuse ring, SONET ring,resilient packet ring, a costumer premise network (CPN), an IP,Internet, a 3G wireless network, IEEE 802 standards, ATM network, framerelay (FR) network, a virtual private network (VPN), a shared media,peer-to-peer network, and a storage area network (SAN).
 75. The systemas in claim 51, further comprising: means for directly coupling thefirst computing subsystem via at least one of: a blue-tooth connection,an infrared connection, an input-output channel, an internal computerbus, a universal serial bus (USB), a mother board, and an IEEE 1394connection.
 76. The system as in claim 51, wherein the first computingsubsystem is part of at least one of: a single printed circuit board, asingle chip, a single computing module, a single chassis, an hand helddevice, a PDA, a cellular phone, a smart card, a single box, a userterminal, an application software module, an operating system module, aJava applet, a communications software module, a firmware component, asoftware driver, and a distributed system software module.
 77. Thesystem as in claim 51, wherein the second computing subsystem is part ofat least one of: a server, a firewall, a gateway, a router, a routingcontroller, a local area network bridge, a local area network switch, awireless base station, an IEEE 802.15 access, an IEEE 802.16 access, anIEEE 802.17 access, a wireless 3G base station, an IEEE 802.11 basestation, a cable modem head-end, a central office, an ADSL DSLAM, and apoint-of-presence (PoP).
 78. The system as in claim 51, wherein thefirst defined rules is comprised of a plurality of parts, and whereinthe second defined rules is comprised of a plurality of parts, thesystem further comprising: means for receiving selected ones of theplurality of parts from at least one of: the first defined rules and thesecond defined rules from at least one of: a local separate controller,a remote separate controller, a remote server, a remote web server, afirewall, a database, a video server, a content delivery server, a smartcard, a tamper resisting device, and a self-destruction device.
 79. Thesystem as in claim 78, wherein the selected parts determine at least oneof: performance characteristics, access characteristics, transmissionlimitations, transmission rates, window sizes, port numbers, IPaddresses, network addresses, quotas, renewable quotas, usage parametersof data rights for protected content, packet structure limitations, andtransmission schedule.
 80. The system as in claim 51, wherein at leastone of the defined rules of transmission determines a renewableprecondition for transmission.
 81. The system as in claim 80, whereinthe renewable precondition for transmission is defined by least one of:renewable transmission quota of first data packets, number of first datapackets that can be transmitted per unit of time, time signal, UTC timesignal, digitally signed time signal, digitally signed time-stamp,digitally signed time-stamp from UTC (coordinated universal time),digital cash for transmission of the first data packets, biometricparameters, and cryptographic keys for marking the first data packets.82. The system as in claim 80, wherein the renewable precondition fortransmission is obtained from at least one of: a predefined logic, anexternal rule controller, a security management system (SMS), a networkinterface, a network appliance, a server, a network management system, afirewall, a local computation, a smart card device, and a portabledevice.
 83. The system as in claim 80, wherein when the renewableprecondition for transmission is not valid, transmission is suspended.84. The system as in claim 51, further comprising: means for replacingat least a part of at least one of: the first defined rules and thesecond defined rules; and wherein the means for replacing provides atleast one of: adding data, deleting data and replacing data and whereindata comprises at least one of lines of codes, machine codes, obfuscatedcodes, object codes, tables of codes, program parameters, subroutineparameters, tables of parameters, data structure of parameters, softwaremodules, alpha numeric values, cryptographic fields, assembly languagecode, software applets, program con trot information, firmware code,instructions for reprogramming programmable hardware elements, and logicfor field programmable gate-arrays (FPLAs).
 85. The system as in claim51, wherein the means for generating utilizes at least one of applying apseudo-random generator, applying a pseudo-random function, applying acryptographic function, applying an encryption function, applying ascrambling subroutine, applying an authentication function, applying adigital signing function, applying a cryptographic hash function,applying a subroutine, applying a computational logic module, applying asymmetric cryptography function, applying an asymmetric cryptographyfunction, employing a cryptographic key, employing a cryptographic seed,employing an encrypted software, employing an obfuscated software,employing a hidden program, employing logic with a set of parameters,employing a hardware module, employing a smart card, employing aportable device, and employing a distributed protocol.
 86. A systemproviding controlled signaling between separate computing subsystems,the system comprising: first computing logic at a first computingsubsystem, providing processing to provide a first defined operationresponsive to first defined logic; tag logic providing generation of afirst security tag vector in the first computing logic responsive tovalidating the processing at the first computing logic in accordancewith the first defined logic; wherein the second computing subsystemreceives the first security tag vector from the communications path;wherein the second computing subsystem validates the processing at thefirst computing subsystem by processing the first security tag vector inaccordance with a second defined logic, to provide verification ofintegrity of the first security tag vector; and wherein the secondcomputing subsystem controls communications between the first computingsubsystem and the second computing subsystem, responsive to theverification of integrity of the first security tag vector.
 87. Themethod as in claim 86, wherein the defined logic is comprised of aplurality of parts, wherein at least some selected parts of theplurality of parts of the defined logic for processing data, isperformed on at least one of: a single chip, a single chip on the motherboard, a single computing module, a hand held device, a cellular phone,a smart card, a user terminal, an application software module, anoperating system module, a Java applet, a communications softwaremodule, a firmware component, a software driver, a tamper resistancehardware, obfuscated software, tamper resistant software, tamperresistant firmware, and self-destructive hardware.
 88. The system as inclaim 86, wherein the first defined rules and the second defined rulesare structured according to defined rules of operation, the systemfurther comprising: a separate rules controller for providing at leastsome of the defined rules of operation.
 89. The system as in claim 86,wherein at least one of the defined rules of operation determines arenewable precondition for operation.
 90. The system as in claim 86,wherein at least one of the defined rules of operation determines anaction based on a context.
 91. The system as in claim 90, wherein thecontext involves at least one of a system user present, a system userpresent at an end-station, a system user present at the computer usedfor transmission and operation, application program present, a datainformation available, data rights permission available and parametersavailable.
 92. The system as in claim 90, wherein when said context ismissing for operation, there is no transmitting the signal onto acommunications path in accordance with the operation.