Methods and systems for enabling communication between a processor and a network operations center
First Claim
1. A method for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors, said method comprising the steps of:
- determining, at the at least one additional processor, a first virtual address that identifies the first processor in the virtual network;
providing the determined first virtual address to the first processor;
requesting, from the at least one additional processor, a tunnel between the first processor and the second processor;
authenticating, at the at least one additional processor, the request based on the first virtual address;
determining, at the at least one additional processor, a second virtual address that identifies the second processor in the virtual network; and
providing the second virtual address to the first processor to enable the requested tunnel between the first and second processors, when the at least one additional processor authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors. The additional processor may determine a first virtual address that identifies the first processor in the virtual network and provide the first virtual address to the first processor. When a tunnel between the first processor and the second processor is requested from the additional processor, the additional processor may authenticate the request based on the first virtual address and determine a second virtual address that identifies the second processor in the virtual network. After the additional processor authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors, the additional processor may provide the second virtual address to the first processor to enable the requested tunnel between the first and second processors. filed Apr. 11, 2001, Attorney Docket No. 07937-0002-09, all of which are expressly incorporated herein by reference in their entirety and concurrently filed herewith the present application.
-
Citations
19 Claims
-
1. A method for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors, said method comprising the steps of:
-
determining, at the at least one additional processor, a first virtual address that identifies the first processor in the virtual network;
providing the determined first virtual address to the first processor;
requesting, from the at least one additional processor, a tunnel between the first processor and the second processor;
authenticating, at the at least one additional processor, the request based on the first virtual address;
determining, at the at least one additional processor, a second virtual address that identifies the second processor in the virtual network; and
providing the second virtual address to the first processor to enable the requested tunnel between the first and second processors, when the at least one additional processor authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors, said system comprising:
-
a tunneling interface that receives a request for a tunnel between the first processor and the second processor; and
a controller that determines a first virtual address that identifies the first processor in the virtual network, provides the determined first virtual address to the first processor, authenticates the request based on the first virtual address, determines a second virtual address that identifies the second processor in the virtual network, and provides the second virtual address to the first processor to enable the requested tunnel between the first and second processors, when the controller authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors.
-
-
18. An apparatus for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors, said apparatus comprising:
-
means for determining, at the at least one additional processor, a first virtual address that identifies the first processor in the virtual network;
means for providing the determined first virtual address to the first processor;
means for requesting, from the at least one additional processor, a tunnel between the first processor and the second processor;
means for authenticating, at the least one additional processor, the request based on the first virtual address;
means for determining, at the at least one additional processor, a second virtual address that identifies the second processor in the virtual network; and
means for providing the second virtual address to the first processor to enable the requested tunnel between the first and second processors, when the at least one additional processor authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors.
-
-
19. A computer program product for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors, said computer program product comprising code, said code comprising:
-
code for determining, at the at least one additional processor, a first virtual address that identifies the first processor in the virtual network;
code for providing the determined first virtual address to the first processor;
code for requesting, from the at least one additional processor, a tunnel between the first processor and the second processor;
code for authenticating, at the least one additional processor, the request based on the first virtual address;
code for determining, at the at least one additional processor, a second virtual address that identifies the second processor in the virtual network; and
code for providing the second virtual address to the first processor to enable the requested tunnel between the first and second processors, when the at least one additional processor authenticates the request and determines that the first and second processors have indicated a mutual consent for enabling one or more tunnels between the first and second processors.
-
Specification