Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring
Reexamination Certificate
2005-12-13
2005-12-13
Najjar, Saleh (Department: 2155)
Electrical computers and digital processing systems: multicomput
Computer network managing
Computer network monitoring
C709S227000, C713S152000
Reexamination Certificate
active
06976071
ABSTRACT:
A communication system includes a data network that is coupled to various nodes, including routers. In one example arrangement, a first router is part of a first local network and a second router is part of a second local network. Each router includes a security gateway module and a keep-alive module. The security gateway module is capable of establishing a secure link, such as one according to an Internet Protocol Security (IPsec) protocol, over the data network. The keep-alive module sends one or more ping messages over the secure link to the remote router (or a node coupled to the router), which responds with appropriate ping replies to indicate that a link is alive.
REFERENCES:
patent: 5828833 (1998-10-01), Belville et al.
patent: 5864666 (1999-01-01), Shrader
patent: 6073172 (2000-06-01), Frailong et al.
patent: 6079020 (2000-06-01), Liu
patent: 6173411 (2001-01-01), Hirst et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6360269 (2002-03-01), Mamros et al.
patent: 6392990 (2002-05-01), Tosey et al.
patent: 6473798 (2002-10-01), Grosser et al.
patent: 6636898 (2003-10-01), Ludovici et al.
“Introduction to Internet”—Originally cited in the Applicant's Remarks submitted Nov. 10, 2004. Also cited by Examiner in the response to arguments. Was not forwarded to the Examiner with the amendment so it is being made part of the record.
“Layer 2 Tunneling Protocol (L2TP) Overview” by the IBM Corporation, 1999, as printed from www-1.ibm.com/servers/eserver/iseries/tcpip/vpn/redbooks/l2tppres/pdf/l2tppres.pdf.
“Securing L2TP using IPSEC” Internet-Draft, Oct. 1999, Internet-Draft for RFC 3193 <draft-ietf-pppext-l2tp-security-05.txt.
Kessler et al., RFC 2151 “A Primer on Internet and TCP/IP Tools and Utilities”, Jun. 1997.
S. Deering et. al., Request for Comments: 2460,Internet Protocol, Version 6(IPv6)Specification,pp. 1-39 (Dec. 1998).
J. Postel, Request for Comments: 768,User Datagram Protocol,pp. 1-3 (Aug. 1980).
W. Simpson, Request for Comments: 1661,The Point-To-Point Protocol(PPP), pp. 1-47 (Jul. 1994).
G. McGregor, Request for Comments: 1332,The PPP Internet Protocol Control Protocol(IPCP), pp. 1-13 (May 1992).
R. Droms, Request for Comments: 1541,Dynamic Host Configuration Protocol, pp. 1-35 (Oct. 1993).
S. Kent et al., Request for Comments: 2406,IP Encapsulating Security Payload(ESP), pp. 1-20 (Nov. 1998).
D. Maughan, et al., Request for Comments: 2408,Internet Security Association and Key Management Protocol(ISAKMP), pp. 1-76 (Nov. 1998).
Information Sciences Institute, Request for Comments: 791,Internet Protocol, Darpa Internet Program Protocol Specification,pp. 1-46 (Sep. 1981).
S. Kent, Request for Comments: 2401,Security Architecture for The Internet Protocol, pp. 1-58 (Nov. 1998).
J. Postel, Request for Comments: 792,Internet Control Message Protocol, Darpa Internet Program Protocol Specification,pp. 1-20 (Sep. 1981).
Information Sciences Institute, Request for Comments: 793,Transmission Control Protocol, Darpa Internet Program Protocol Specification,pp. 1-82 (Sep. 1981).
W. Townsley et al., Request for Comments: 2661,Layer Two Tunneling Protocol “L2TP”, pp. 1-71 (Aug. 1999).
Baron Peter W.
Donzis Lewis T.
Hughes Earnest E.
Matelske Ryan M.
Lazaro David
Trop Pruner & Hu PC
LandOfFree
Detecting if a secure link is alive does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detecting if a secure link is alive, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting if a secure link is alive will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3513848