Detecting if a secure link is alive

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S227000, C713S152000

Reexamination Certificate

active

06976071

ABSTRACT:
A communication system includes a data network that is coupled to various nodes, including routers. In one example arrangement, a first router is part of a first local network and a second router is part of a second local network. Each router includes a security gateway module and a keep-alive module. The security gateway module is capable of establishing a secure link, such as one according to an Internet Protocol Security (IPsec) protocol, over the data network. The keep-alive module sends one or more ping messages over the secure link to the remote router (or a node coupled to the router), which responds with appropriate ping replies to indicate that a link is alive.

REFERENCES:
patent: 5828833 (1998-10-01), Belville et al.
patent: 5864666 (1999-01-01), Shrader
patent: 6073172 (2000-06-01), Frailong et al.
patent: 6079020 (2000-06-01), Liu
patent: 6173411 (2001-01-01), Hirst et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6360269 (2002-03-01), Mamros et al.
patent: 6392990 (2002-05-01), Tosey et al.
patent: 6473798 (2002-10-01), Grosser et al.
patent: 6636898 (2003-10-01), Ludovici et al.
“Introduction to Internet”—Originally cited in the Applicant's Remarks submitted Nov. 10, 2004. Also cited by Examiner in the response to arguments. Was not forwarded to the Examiner with the amendment so it is being made part of the record.
“Layer 2 Tunneling Protocol (L2TP) Overview” by the IBM Corporation, 1999, as printed from www-1.ibm.com/servers/eserver/iseries/tcpip/vpn/redbooks/l2tppres/pdf/l2tppres.pdf.
“Securing L2TP using IPSEC” Internet-Draft, Oct. 1999, Internet-Draft for RFC 3193 <draft-ietf-pppext-l2tp-security-05.txt.
Kessler et al., RFC 2151 “A Primer on Internet and TCP/IP Tools and Utilities”, Jun. 1997.
S. Deering et. al., Request for Comments: 2460,Internet Protocol, Version 6(IPv6)Specification,pp. 1-39 (Dec. 1998).
J. Postel, Request for Comments: 768,User Datagram Protocol,pp. 1-3 (Aug. 1980).
W. Simpson, Request for Comments: 1661,The Point-To-Point Protocol(PPP), pp. 1-47 (Jul. 1994).
G. McGregor, Request for Comments: 1332,The PPP Internet Protocol Control Protocol(IPCP), pp. 1-13 (May 1992).
R. Droms, Request for Comments: 1541,Dynamic Host Configuration Protocol, pp. 1-35 (Oct. 1993).
S. Kent et al., Request for Comments: 2406,IP Encapsulating Security Payload(ESP), pp. 1-20 (Nov. 1998).
D. Maughan, et al., Request for Comments: 2408,Internet Security Association and Key Management Protocol(ISAKMP), pp. 1-76 (Nov. 1998).
Information Sciences Institute, Request for Comments: 791,Internet Protocol, Darpa Internet Program Protocol Specification,pp. 1-46 (Sep. 1981).
S. Kent, Request for Comments: 2401,Security Architecture for The Internet Protocol, pp. 1-58 (Nov. 1998).
J. Postel, Request for Comments: 792,Internet Control Message Protocol, Darpa Internet Program Protocol Specification,pp. 1-20 (Sep. 1981).
Information Sciences Institute, Request for Comments: 793,Transmission Control Protocol, Darpa Internet Program Protocol Specification,pp. 1-82 (Sep. 1981).
W. Townsley et al., Request for Comments: 2661,Layer Two Tunneling Protocol “L2TP”, pp. 1-71 (Aug. 1999).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting if a secure link is alive does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting if a secure link is alive, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting if a secure link is alive will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3513848

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.