Methods and systems for hairpins in virtual networks

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

07047424

ABSTRACT:
Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional processor may determine whether the first and second processors mutually consent to enabling a hairpin between the first and second processors. The first processor may be provided with a first information identifying the hairpin and the second processor may be provided with a second information identifying the hairpin, when the additional processor may determine that the first and second processors mutually consent to the hairpin. Moreover, a first information flow may be established from the first processor to the hairpin based on the provided first information, and a second information flow may be established from the second processor to the hairpin based on the provided second information. The hairpin may forward the first information flow received from the first processor to the second processor such that the communication between the first and second processors is allowed by the firewalls.

REFERENCES:
patent: 5825772 (1998-10-01), Dobbins et al.
patent: 5864666 (1999-01-01), Shrader
patent: 5875472 (1999-02-01), Bauman et al.
patent: 5918019 (1999-06-01), Valencia
patent: 6041166 (2000-03-01), Hart et al.
patent: 6061796 (2000-05-01), Chen et al.
patent: 6092200 (2000-07-01), Muniyappa et al.
patent: 6094437 (2000-07-01), Loehndorf, Jr. et al.
patent: 6104716 (2000-08-01), Crichton et al.
patent: 6154839 (2000-11-01), Arrow et al.
patent: 6173399 (2001-01-01), Gilbrech
patent: 6195705 (2001-02-01), Leung
patent: 6249523 (2001-06-01), Hrastar et al.
patent: 6339595 (2002-01-01), Rekhter et al.
patent: 6381646 (2002-04-01), Zhang et al.
patent: 6393488 (2002-05-01), Araujo
patent: 6407988 (2002-06-01), Agraharam et al.
patent: 6438612 (2002-08-01), Ylonen et al.
patent: 6449272 (2002-09-01), Chuah et al.
patent: 6490289 (2002-12-01), Zhang et al.
patent: 6507873 (2003-01-01), Suzuki et al.
patent: 6516417 (2003-02-01), Pegrum et al.
patent: 6615357 (2003-09-01), Boden et al.
patent: 6631416 (2003-10-01), Bendinelli et al.
patent: 6684256 (2004-01-01), Warrier et al.
patent: 6697354 (2004-02-01), Borella et al.
patent: 6701358 (2004-03-01), Poisson et al.
patent: 6751729 (2004-06-01), Giniger et al.
patent: 6788681 (2004-09-01), Hurren et al.
patent: 6798782 (2004-09-01), Caronni et al.
patent: 2001/0014097 (2001-08-01), Beck et al.
patent: 2001/0032273 (2001-10-01), Cheng
patent: 2002/0023210 (2002-02-01), Tuomenoksa
patent: 2002/0026503 (2002-02-01), Bendinelli et al.
patent: 2002/0026531 (2002-02-01), Keane et al.
patent: 2002/0029276 (2002-03-01), Bendinelli et al.
patent: 2002/0056008 (2002-05-01), Keane et al.
patent: 2002/0091859 (2002-07-01), Tuomenoksa
patent: 2002/0099937 (2002-07-01), Tuomenoksa
patent: 2002/0124090 (2002-09-01), Poier et al.
patent: 2003/0033401 (2003-02-01), Poisson et al.
patent: 2003/0108041 (2003-06-01), Aysan et al.
patent: 2003/0131263 (2003-07-01), Keane et al.
patent: 2003/0145104 (2003-07-01), Boden et al.
patent: 2003/0158962 (2003-08-01), Keane et al.
patent: 0 302 646 (1989-02-01), None
patent: 0 838 930 (1998-04-01), None
patent: WO 02/17558 (2002-02-01), None
patent: 2 340 702 (2000-02-01), None
patent: WO 8908887 (1989-09-01), None
patent: WO 985467 (1998-12-01), None
patent: WO 9859470 (1998-12-01), None
patent: WO 0011832 (2000-03-01), None
patent: WO 01/80487 (2001-10-01), None
patent: WO 0180490 (2001-10-01), None
patent: WO 01/82533 (2001-11-01), None
Malkin Gary Scott: “Dial-In Virtual Private-Networks Using Layer 3 Tunneling” Proceedings of the Conference on Local Computer Networks, Nov. 2, 1997.
O'Guin, S. et al., “Application of Virtual Private Networking Technology to Standards-Based Management Protocols Across Heterogeneous Firewill-Protected Networks,” IEEE, pp. 1251-1255, Oct. 31, 1999.
Hurwitz Group, “How Small and Midsize Businesses Can Turn the Internet into a Private Network for Competitive Advantage,” Jun. 2000, downloaded from http://www.openreach.com on Jan. 4, 2001.
Applied Technologies Group, “A Practical Guide to the Right VPN Solution,” 2000, downloaded from http://www.openreach.com on Jan. 23, 2001.
OpenReach, “Demystifying VPN: An Introduction to VPN Technology,” 2000, downloaded from http://www.openreach.com on Jan. 4, 2001.
OpenReach, “Private Connections / Open Networks,” presented on Feb. 20, 2001.
OpenReach, “Transforming the Internet into My Private Backbone for Business: Demystifying VPNs,” presented on Nov. 7, 2000.
NetworkMagazine.com, “Special Report: VPN Overlay Networks: An Answer to Networks-Based IP VPNs?,” Jun. 5, 2001, downloaded downloaded from http://www.network magazine.com on Nov. 5, 2001.
RFC-2401, S. Kent et al., “Security Architecture for The Internet Protocol,” The Internet Society (1998).
RFC-2409, Harkins et al., “The Internet Key Exchange,” The Internet Society (1998).
RFC-1828, Metzger et al., “IP Authentication Using Keyed MD5,” The Internet Society (1995).
RFC-793, “Transmission Control Protocol,” Information Sciences Institute for Defense Advanced Research Projects Agency (DARPA) (1981).
RFC-791, “Internet Protocol,” Information Sciences Institute for Defense Advanced Research Projects Agency (DARPA) (1981).
RFC-2663, P. Srisuresh et al., “IP Network Address Translator (NAT) Technology and Considerations,” pp. 1-30, Aug. 1999.
W. T. Teo et al., “Mobile IP extension for Private Internets Support (MPN),” Internet Drafts Archive, Online!, pp. 1-24, Feb. 1999, Retrieved from the Internet: URL:http://www.watersprings.org/pub/id/draft-teoyli-mobileip-mvpn-02.txt>, retrieved on Feb. 9, 2005! .

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for hairpins in virtual networks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for hairpins in virtual networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for hairpins in virtual networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3609231

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.