System and method to verify availability of a back-up secure...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S223000, C709S224000, C709S227000, C709S231000

Reexamination Certificate

active

06915436

ABSTRACT:
A method and system for verifying the availability of a back-up virtual private network IP security (IPSec) tunnel between two network elements by originating a plurality of connection tests between the network elements. The first network element transmits a backup tunnel verification test message to the second network element over the back-up secure tunnel upon receipt of a backup tunnel verification test command. The back-up secure tunnel includes two unidirectional tunnels. The second network element receives the back-up tunnel verification test message over the first back-up unidirectional secure tunnel and transmits a response back to the first network element over the second back-up unidirectional secure tunnel. The number of failures to respond by the second network element to the backup tunnel verification tests performed during an active verification period specified in the backup tunnel verification test command are reported back to the source that initiated the back-up secure tunnel verification test.

REFERENCES:
patent: 5325362 (1994-06-01), Aziz
patent: 5550984 (1996-08-01), Gelb
patent: 5745884 (1998-04-01), Carnegie et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825891 (1998-10-01), Levesque et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5850446 (1998-12-01), Berger et al.
patent: 5852721 (1998-12-01), Dillon et al.
patent: 5864666 (1999-01-01), Shrader
patent: 6230281 (2001-05-01), Brodfuhrer et al.
patent: 2317308 (1997-08-01), None
patent: 2323757 (1998-02-01), None
patent: 10070566 (1998-03-01), None
patent: 10070576 (1998-03-01), None
patent: WO9726734 (1997-01-01), None
patent: WO9843446 (1997-03-01), None
“Design for a Simple Network Management Protocol Subagent for Internet Firewalls”, IBM Technical Disclosure Bulletin, vol. 40, No. 03, Mar. 1997, pp. 63-68.
“Fusion Power? [virtual private networks]”, Information Week, No. 50, Jan. 1999, pp. 29-31.
“Making the Move to VPN Tunneling”, Telecommunications (International Edition), vol. 32, No. 10, Oct. 1998, pp. 87-88.
“The ABCs of Remote Access VPNs”, Business Communications Reviews, vol. 28, No. 10, Oct. 1998, pp. 47-50.
“Secure Web Tunneling”, Computer Networks and ISDNtems, vol. 30, No. 1-7, Apr. 1998 pp. 531-539.
“A Public-Key Based Secure Mobile IP”, Proceedings of the Third Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1997, pp. 173-184.
“Extend your Net with VPNs”, BYTE (International Edition), vol. 22, No. 11, Nov. 1997, pp. 114-119.
“Mobile IP”, International Journal of Communication Systems, vol. 11, No. 1, Jan.-Feb. 1998 pp. 3-20.
“A New Scheme of Connectionless Transmission over ATM with Scalability and Cut-Through Techniques”, ISS'97: World Telecommunications Congress. ‘Global Network Evolution: Convergence or Collision?’ Proceedings, Pt. vol. 1, pp. 199-206.
“Low-loss TCP/IP Header Compression for Wireless Networks”, Dept. of Comput. Sci., Lulea Univ. of Technol., Sweden, Wireless Networks, vol. 3, No. 5, 1997, pp. 375-387.
“HIPPI over ATM Networks: Extending Connections for Distributed Computing”, IEEE Concurrency, vol. 5, No. 4, Oct.-Dec. 1997, pp. 40-53.
“Dial-in Virtual Private Networks Using Layer 3 Tunneling”, Proceedings, 22ndAnnual Conference on Local Computer Networks, LCN'97, Nov. 2-5, 1997, pp. 555-561.
“A Virtual Private Affair”, BYTE, vol. 22, No. 7, Nov. 1997, pp. 79-80.
“Securing the Internet Protocol”, Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995, pp. 257.
“Hybrid Internet Access”, AIP Conference Proceedings, 1995, No. 325, pp. 69-74.
“Performance Evaluation of Multicast Rerouting Scheme for Handover in Mobile IP”, Journal of KISS (Computer Systems and Theory), vol. 25, No. 8, Aug. 1998, pp. 867-876.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method to verify availability of a back-up secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method to verify availability of a back-up secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to verify availability of a back-up secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3430199

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.