Electrical computers and digital processing systems: multicomput – Computer network managing
Reexamination Certificate
2007-08-20
2010-12-14
Hu, Jinsong (Department: 2617)
Electrical computers and digital processing systems: multicomput
Computer network managing
C709S227000, C709S228000, C709S230000, C370S401000
Reexamination Certificate
active
07853680
ABSTRACT:
Real routable external addresses may be pooled rather than assigned to nodes and may be dynamically bound to connections by a proxy or gateway device in ways that spread apparent identity of individual nodes across multiple of the external addresses. In general, these spread identity techniques may be employed at one end or the other of a connection, as well as at both ends. In a typical double-ended configuration, the architecture and associated techniques provide “double-blindfolding,” wherein true identities (addresses) of communicating peers are always hidden from each other. In some double-ended configurations, dynamic binding may be employed at a fine level of granularity, for instance allowing individual packets associated with given connection to bear different apparent source addresses and/or different apparent destination addresses. In some single-ended configurations, a spread identity proxy is interposed between an information server and a plurality of requesters. The proxy redirects individual inbound connection requests for information from the information server to distinct addresses of a pool and establishes corresponding network address translations thereby dynamically spreading identity of the information server across multiple distinct addresses of the pool.
REFERENCES:
patent: 6754709 (2004-06-01), Gbadegesin
patent: 7224696 (2007-05-01), Bouleros et al.
patent: 2003/0172170 (2003-09-01), Johnson et al.
patent: 2007/0002761 (2007-01-01), Diamant et al.
patent: 2008/0133760 (2008-06-01), Berkvens et al.
Adiseshu, H., et al., “A Reliable and Scalable Striping Protocol,” InProceedings of the ACM SIGCOMM, 1996, pp. 131-141.
Adjie-Winoto, W., et al., “The design and implementation of an intentional naming system,” inProceedings of 17th ACM SOSP, Kiawah Island, SC, 1999, pp. 186-201.
Akamai, Inc., Fast Internet Content Delivery with FreeFlow, Apr. 2000 http://www.cs.washington.edu/homes/ratul/akamai/freeflow.pdf (12 pages).
Allman, M., et al., “An Application-Level Solution to TCP's Satellite Inefficiencies,” InProceedings of the First International Workshop on Satellite-based Information Services(WOSBIS), Rye, NY, Nov. 1996, pp. 1-8.
Anderson, T., et al., “Overcoming the Internet Impasse through Virtualization,”IEEE Computer Society, Apr. 2005, pp. 34-41.
Balakrishnan, H., et al., “A Layered Naming Architecture for the Internet,” InProceedings of SIGCOMM'04, Portland, OR, Sep. 2004, pp. 343-352.
Belenky, A. and Ansari, N., “On IP traceback,”IEEE Communications Magazine, Jul. 2003, pp. 142-153.
Cheriton, D.R. and Gritter, M., “Triad: A New Next-Generation Internet Architecture,” Mar. 2000, http://www-dsg.stanford.edu/triad/triad.ps.gz, pp. 1-20.
Cheriton, D.R. and Gritter, M., “Triad: A Scalable Deployable NAT-based Internet Architecture,” Stanford Computer Science Technical Report, Jan. 2000, pp. 1-18.
Crawford, M., and Huitema, C., “DNS Extensions to Support IPv6 Address Aggregation and Renumbering,” Jul. 2000, RFC 2874, 20 pages.
Estrin, D., et al., “Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification,” Network Working Group, CISCO, Jun. 1997, 66 pages.
Goff, T. and Phatak, D.S., “Unified Transport Layer Support for Data Striping and Host Mobility,”IEEE Journal of Selected Areas in Communicationsvol. 22, May 2004, pp. 737-746.
Goff, T., et al., “Preemptive Routing in Ad Hoc Networks,” inProceedings of the ACM MOBICOM, Jul. 2001, pp. 43-52.
Goff, T., et al., “Freeze-TCP: A true end-to-end TCP enhancement mechanism for mobile environments,” InProceedings of the IEEE INFOCOM'2000, Tel-Aviv, Israel, Mar. 2000, vol. 3, pp. 1537-1545.
Gritter, M., and Cheriton, D., “An Architecture for Content Routing Support in the Internet,” inProceedings of the 3rd USENIX Symposium on Internet Technologies and Systems(USITS '01), Mar. 26-28, 2001, San Francisco, http://www.usenix.org/publications/library/proceedings/usits01/gritter.html, 12 pages.
Hacker, T., et al., “The End-to-End Performance Effects of Parallel TCp Sockets on a Lossy Wide-Area Network,” InProceedings of the 16th IEEE-CS/ACM International Parallel and Distributed Processing Symposium(IPDPS), Apr. 2002, pp. 1-10.
Handley, M. and Greenhalgh, A., “Steps Towards a DoS-resistant Internet Architecture,” SIGCOMM'04 Workshops, Portland, OR, Sep. 2004, pp. 49-56.
Hommel, W., “An Architecture for Privacy-Aware Inter-domain Identity Management,” inProceedings of DSOM2005, pp. 49-60.
Hsieh, H.-Y, and Sivakumar, R., “A Transport Layer Approach for Achieving Aggregate Bandwidths on Multi-homed Mobile Hosts,” MOBICOM'02, Atlanta, GA (Sep. 23-28, 2002), pp. 83-94.
Huitema, C., Multi-homed TCP. Internet Draft, Internet Engineering Task Force, May 1995. Expired, http://www3.tools.ietf.org/html/draft-huitema-multi-homed-01, pp. 1-19.
Huitema, C., and Draves, R., “Host-Centric IPv6 Multihoming,” Internet Draft, Internet Engineering Task Force, Oct. 2001, Work-in-progress, http://tools.ietf.org/html/draft-huitema-multi6-hosts-03, pp. 1-51.
Lakshminarayanan, K., et al., “Brief Announcement: Towards a Secure Indirection Infrastructure,” PODC'04, St. John's, Newfoundland, Canada (Jul. 25-28, 2004), p. 383.
Magalhaes, L. and Kravets, R., Transport Level Mechanisms for Bandwidth Aggregation on Mobile Hosts, InProceedings of the 9th International Conference on Network Protocols(ICNP) 2001, pp. 165-171.
Mahajan, R., “How akamai works,” http://www.cs.washington.edu/homes/ratul/akamai.html downloaded on Aug. 14, 2007, pp. 1-5.
Mirkovik, J., et al., “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” Tech. rep., UCLA CS Department, 2002, pp. 1-12.
Phatak, D., “Spread-Identity mechanisms for DOS resilience and Security,” IEEE Computer Society,Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005, pp. 1-12.
Phatak, D., and Goff, T., “A Novel Mechanism for Data Streaming Across Multiple IP Links for Improving Throughput and Reliability in Mobile Environments,” inProceedings of the IEEE INFOCOM, Jun. 2002, pp. 773-781.
Rivest, R., “Chaffing and Winnowing: Confidentiality without Encryption,” Mar. 1998, theory.lcs.mit.edu/rivest/chaffing.txt, pp. 1-9.
Sivakumar, H. et al., “PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks,” IEEE Computer Society,Proceedings of the IEEE/ACM SC2000, 6 pages.
Snoeren, A. and Balakrishnan, H., “An End-to-End Approach to Host Mobility,” inProceedings of the ACM MOBICOM, Boston, Aug. 2000, pp. 155-166.
Snoeren, A., “Adaptive Inverse Multiplexing for Wide-Area Wireless Networks,” InIEEE Globecom1999, pp. 1665-1672.
Stewart, R. R. et al., “SCTP Extensions for Dynamic Reconfiguration of IP Addresses and Enforcement of Flow and Message Limits,” http://www.ietf.org/internet-drafts/draft-ieff-tsvwg-addip-sctp-02.txt, Jun. 2001, pp. 1-27.
Stocia, I. et al., “Internet Indirection Infrastructure,” inProceedings of the ACM SIGCOMM 2002, vol. 32, 4, (new York), ACM Press, Aug. 19-23, 2002, pp. 73-88.
Stone, R., “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” inProceedings of the 9th USENIX Security Symposium, Denver, CO, Aug. 14-17, 2000, 15 pages.
Strayer, T. et al., “An Integrated Architecture for Attack Attribution,” tech. rep., BBN Technologies, 10 Moulton Street, Cambridge, MA 02138, 2003, pp. 1-37.
Subramanian, L. et al., “OverQoS: An Overlay based Architecture for Enhancing Internet QoS,” In NSDI, University of California at Berkeley, 2004, pp. 71-84.
Tarr, C., “Identity Indirection,” 1995, downloaded from www.cs.wustl.edu/˜schmidt/OOPSLA-95/html
Blank Rome LLP
Hu Jinsong
LandOfFree
Spread identity communications architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Spread identity communications architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Spread identity communications architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4151716