Information security – Access control or authentication – Network
Reexamination Certificate
2011-03-29
2011-03-29
Brown, Christopher J (Department: 2439)
Information security
Access control or authentication
Network
C726S012000
Reexamination Certificate
active
07917948
ABSTRACT:
A method comprises receiving a request for secure network traffic from a device having a private network address at a source node, obtaining the private network address of a requested destination device at a destination node from a route server based on signaling information associated with the request, obtaining the public network address of the destination node associated with the private network address, creating in response to the request a virtual circuit between the source node and the destination node based on the public network address of the destination node, and encrypting network traffic for transporting at least from the source node to the destination node through the virtual circuit. The process is dynamic in that the virtual circuit is created in response to the request. Hence, the process operates as if a fully meshed network exists but requires less provisioning and maintenance than a fully meshed network architecture. Furthermore, the process is readily scalable as if a hub and spoke network exists but is more suitable for delay-sensitive traffic, such as voice and video, than a hub and spoke network architecture.
REFERENCES:
patent: 5600644 (1997-02-01), Chang et al.
patent: 6069895 (2000-05-01), Ayandeh
patent: 6078957 (2000-06-01), Adelman et al.
patent: 6172981 (2001-01-01), Cox et al.
patent: 6175917 (2001-01-01), Arrow et al.
patent: 6269099 (2001-07-01), Borella et al.
patent: 6353614 (2002-03-01), Borella et al.
patent: 6438612 (2002-08-01), Ylonen et al.
patent: 6567405 (2003-05-01), Borella et al.
patent: 6675225 (2004-01-01), Genty et al.
patent: 6697354 (2004-02-01), Borella et al.
patent: 6731642 (2004-05-01), Borella et al.
patent: 6751729 (2004-06-01), Giniger et al.
patent: 6768743 (2004-07-01), Borella et al.
patent: 6781982 (2004-08-01), Borella et al.
patent: 6822957 (2004-11-01), Schuster et al.
patent: 6898200 (2005-05-01), Luciani
patent: 6931010 (2005-08-01), Gallant et al.
patent: 6996621 (2006-02-01), Borella et al.
patent: 7013338 (2006-03-01), Nag et al.
patent: 7032242 (2006-04-01), Grabelsky et al.
patent: 7130854 (2006-10-01), Beadles et al.
patent: 7583665 (2009-09-01), Duncan et al.
patent: 7657628 (2010-02-01), McDysan et al.
patent: 2002/0059516 (2002-05-01), Turtiainen et al.
patent: 2002/0075844 (2002-06-01), Hagen
patent: 2002/0080752 (2002-06-01), Johansson et al.
patent: 2002/0103898 (2002-08-01), Moyer et al.
patent: 2002/0114274 (2002-08-01), Struges
patent: 2002/0129271 (2002-09-01), Stanaway et al.
patent: 2002/0152325 (2002-10-01), Elgebaly et al.
patent: 2003/0108041 (2003-06-01), Aysan et al.
patent: 2003/0108051 (2003-06-01), Bryden et al.
patent: 2003/0110288 (2003-06-01), Ramanujan et al.
patent: 2003/0163440 (2003-08-01), Tonack
patent: 2004/0213206 (2004-10-01), McCormack
patent: 2008/0229095 (2008-09-01), Kalimuthu et al.
IPsec. Wikipedia, the free encyclopedia. [retrieved on Sep. 29, 2008]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/IPsec>.
Welcher, Peter. Next Hop Resolution Protocol. Chesapeake Netcraftsmen. Published by the Chesapeake Netcraftsmen [online]. 1997 [retrieved on Sep. 29, 2008]. pp. 1-7. Retrieved from the Internet: <URL: http://www.netcraftsmen.net/welcher/papers
hrp.htm>.
Hanks, et al., Generic Routing Encapsulation. RFC: 1701, Published by the Network Working Group [online]. Oct. 1994 [retrieved on Sep. 30, 2008]. pp. 1-8. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc1701.txt >.
Luciani, et al., NBMA Next Hop Resolution Protocol (NHRP). RFC: 2332, Published by the Network Working Group [online]. Apr. 1998 [retrieved on Sep. 30, 2008]. pp. 1-49. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2332.txt >.
Kent, et al., Security Architecture for the Internet Protocol. RFC: 2401, Published by the Network Working Group [online]. Nov. 1998 [retrieved on Sep. 30, 2008]. pp. 1-62. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2401.txt >.
Piper, et al., The Internet IP Security Domain of Interpretation for ISAKMP. RFC:2407, Published by the Network Working Group [online]. Nov. 1998 [retrieved on Sep. 30, 2008]. pp. 1-30. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2407.txt >.
Maughan, et al., Internet Security Association and Key Management Protocol (ISAKMP). RFC: 2408, Published by the Network Working Group [online]. Nov. 1998 [retrieved on Sep. 30, 2008]. pp. 1-81. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2408.txt >.
Harkins, et al., The Internet Key Exchange. RFC: 2409, Published by the Network Working Group [online]. Nov. 1998 [retrieved on Sep. 30, 2008]. pp. 1-18. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2409.txt >.
Thayer, et al., IP Security Document Roadmap. RFC: 2411, Published by the Network Working Group [online]. Nov. 1998 [retrieved on Sep. 30, 2008]. pp. 1-11. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2411.txt >.
Fox, et al., NHRP Support for Virtual Private Networks. RFC: 2735, Published by the Network Working Group [online]. Dec. 1999 [retrieved on Sep. 30, 2008]. pp. 1-12. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2735.txt >.
Q.931 Protocol Overview. Connected: An Internet Encyclopedia. Published by the Church of the Swimming Elephant [online]. 2001 [retrieved on Sep. 30, 2008]. pp. 1-6. Retrieved from the Internet: <URL: http://www.cotse.com/CIE/Topics/126.htm>. Worcester, Massachusetts, USA.
Handley, et al., SIP: Session Initiation Protocol. RFC: 2543, Published by the Network Working Group [online]. Mar. 1999 [retrieved on Sep. 30, 2008]. pp. 1-153. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2543.txt >.
Arango, et al., Media Gateway Control Protocol (MGCP). RFC: 2705, Published by the Network Working Group [online]. Dec. 1999 [retrieved on Sep. 30, 2008]. pp. 1-134. Retrieved from the Internet: <URL:http://tools.ietf.org/rfc/rfc2705.txt >.
Chapter 3: Connecting to a Host through a Remote Access Server. Published by Cisco Systems [online]. 1997 [retrieved on Sep. 30, 2008]. pp. 1-29. Retrieved from the Internet: <URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios100/csptcg/35466.htm>.
Schulzrinne, et al., “Tutorial: The IETF Internet Telephony Architecture and Protocols,” 1999, http://www.computer.org/internet/telephony/w3schrosen.htm, printed May 21, 2002, 17 pages. pp. 593-609.
International Engineering Consortium, “Trillium, H.323, 8. H.225 Registration, Admission, Status,” 2002, 2 pages. pp. 610-611.
Cisco Systems, Inc., “Chapter 1, Product Overview,” 1989-1998. pp. 1-1-1-10. pp. 619-630.
Kalimuthu Ramesh
Kalley Yogesh
Sullenberger Michael L.
Vilhuber Jan
Brown Christopher J
Cisco Technology Inc.
Hickman Palermo & Truong & Becker LLP
LandOfFree
Method and apparatus for dynamically securing voice and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for dynamically securing voice and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for dynamically securing voice and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2694953