Proxy interception
First Claim
1. A method in a proxy node for non-transparent interception, the method comprising:
- receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request;
storing the primary request;
creating a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, wherein the secondary request is associated with the primary request;
storing the secondary request;
sending the secondary request to a second node;
receiving a secondary response from the second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response;
locating the stored secondary request based on the second token utilized with the secondary request and the secondary response;
locating the stored primary request based on association with the stored secondary request;
creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the address of the first node as a destination address, and the first token as an identifier of the primary response; and
sending to said first node said primary response.
1 Assignment
0 Petitions
Accused Products
Abstract
A client node, a proxy node, and methods therein, as well as a protocol and a computer program for enabling interception of request messages in connection-less protocols. A primary request addressed to a server node is intercepted by a proxy node creating a secondary request based on said request and forwards this secondary request towards the server node. The proxy node receives a secondary response, being a response to the secondary request, creates a primary response based on the secondary response and forwards this primary response to the node from which the primary request was received. A response can thus be sent along the same path as a corresponding request was sent.
23 Citations
18 Claims
-
1. A method in a proxy node for non-transparent interception, the method comprising:
-
receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request; storing the primary request; creating a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, wherein the secondary request is associated with the primary request; storing the secondary request; sending the secondary request to a second node; receiving a secondary response from the second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response; locating the stored secondary request based on the second token utilized with the secondary request and the secondary response; locating the stored primary request based on association with the stored secondary request; creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the address of the first node as a destination address, and the first token as an identifier of the primary response; and sending to said first node said primary response. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A proxy node for a communication network, the proxy node comprising:
-
a processor; and a non-transitory memory storing computer program code which when run on the processor, causes the proxy node to; receive from a first node a primary request comprising an address of the first node as a source address, an address of a server node as a destination address, and first token as an identifier of the primary request; store the primary request; create a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, wherein the secondary request is associated with the primary request; store the secondary request; send the secondary request to a second node; receive a secondary response from the second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response; locate the stored secondary request based on the second token utilized with the secondary request and the secondary response; locate the stored primary request based on association with the stored secondary request; create a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the address of the first node as a destination address, and the first token as an identifier of the primary response; and send to said first node said primary response. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A proxy node for a communication network, the proxy node comprising:
-
a transmitter, a receiver and a processing circuitry that is adapted to; receive via the receiver from a first node a primary request comprising an address of the first node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request; store the primary request; create a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, wherein the secondary request is associated with the primary request; store the secondary request; transmit via the transmitter the secondary request to a second node; receive via the receiver a secondary response from the second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response; locate the stored secondary request based on the second token utilized with the secondary request and the secondary response; locate the stored primary request based on association with the stored secondary request; create a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the address of the first node as a destination address, and the first token as an identifier of the primary response; and transmit via the transmitter said primary response to said first node.
-
-
14. A method in a client node, the method comprising:
-
sending, to a proxy node, a primary request comprising an address of the client node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request, wherein the primary request to cause the proxy node to store the primary request, create a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, in which the secondary request is associated with the primary request, and wherein the proxy node to store the secondary request and send the secondary request to a second node; receiving from the proxy node a primary response comprising an address of the proxy node as a source address, the address of the client node as a destination address, the first token as an identifier of the primary response, and a field instructing the client node to accept the primary response having a source address which is different from the server node that was the destination address of the primary request, wherein the proxy node, in response to sending the secondary request to the second node, is to receive a secondary response from the second node, the secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response, the proxy node to further locate the stored secondary request based on the second token utilized with the secondary request and the secondary response, and to locate the stored primary request based on association with the stored secondary request, and wherein the proxy node to create the primary response based on the primary request and the secondary response; and associating the primary request to the primary response based on the first token received with the primary response to accept the primary response as a reply to the primary request. - View Dependent Claims (15)
-
-
16. A client node for a communication network, the client node comprising:
-
a processor; and a non-transitory memory storing computer program code which when run on the processor, causes the client node to; transmit, to a proxy node, a primary request comprising an address of the client node as source address, an address of a server node as a destination address, and a first token as an identifier of the primary request, wherein the primary request to cause the proxy node to store the primary request, create a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, in which the secondary request is associated with the primary request, and wherein the proxy node to store the secondary request and send the secondary request to a second node; receive, from the proxy node, a primary response comprising an address of the proxy node as a source address, the address of the client node as a destination address, the first token as an identifier of the primary response, and a field instructing the client node to accept the primary response having a source address which is different from the server node that was the destination address of the primary request, wherein the proxy node, in response to sending the secondary request to the second node, to receive a secondary response from the second node, the secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response, the proxy node to further locate the stored secondary request based on the second token utilized with the secondary request and the secondary response, and to locate the stored primary request based on association with the stored secondary request, and wherein the proxy node to create the primary response based on the primary request and the secondary response; and associate the primary request to the primary response based on the first token received with the primary response to accept the primary response as a reply to the primary request. - View Dependent Claims (17)
-
-
18. A client node for a communication network, the client node comprising:
-
a receiver; a transmitter; and a processing circuitry that is adapted to; transmit via the transmitter, to a proxy node, a primary request comprising an address of the client node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request, wherein the primary request to cause the proxy node to store the primary request, create a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, in which the secondary request is associated with the primary request, and wherein the proxy node to store the secondary request and send the secondary request to a second node; receive via the receiver, from the proxy node, a primary response comprising an address of the proxy node as a source address, the address of the client node as a destination address, the first token as an identifier of the primary response, and a field instructing the client node to accept the primary response having a source address which is different from the server node that was the destination address of the primary request, wherein the proxy node, in response to sending the secondary request to the second node, to receive a secondary response from the second node, the secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response, the proxy node to further locate the stored secondary request based on the second token utilized with the secondary request and the secondary response, and to locate the stored primary request based on association with the stored secondary request and wherein the proxy node to create the primary response based on the primary request and the secondary response; and associate the primary request to the primary response based on the first token received with the primary response to accept the primary response as a reply to the primary request.
-
Specification