Methods and systems for an extranet
First Claim
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor and the second processor each identifiable by a name and each independently administered through the at least one additional processor, the method comprising the steps of:
- receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel to the second processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel to the first processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network; and
sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the additional processor. Further, the additional processor may receive information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network. The additional processor may provide to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
Citations
17 Claims
-
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor and the second processor each identifiable by a name and each independently administered through the at least one additional processor, the method comprising the steps of:
-
receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel to the second processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel to the first processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network; and
sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor interfacing a first network using a first address space and the second processor interfacing a second network using a second address space, the method comprising the steps of:
-
receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel to the second processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel to the first processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network;
providing to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors;
identifying, by the first processor, a conflict between the first address space and the second address space; and
resolving, by the first and second processors, the conflict between the first address space and the second address space. - View Dependent Claims (10, 11, 12, 14)
-
-
13. A system for enabling a network between a first processor and a second processor each identifiable by a name and each independently administered through the system, the method comprising the steps of:
-
means for receiving information indicating a consent on behalf of the first processor to enable a tunnel to the second processor;
means for receiving information indicating a consent on behalf of the second processor to enable a tunnel to the first processor;
means for determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network, and means for sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
-
15. A system for enabling a network between a first processor and a second processor, the first processor interfacing a first network using a first address space and the second processor interfacing a second network using a second address space, the system comprising:
-
means for receiving information indicating a consent on behalf of the first processor to enable a tunnel to the second processor;
means for receiving information indicating a consent on behalf of the second processor to enable a tunnel to the first processor;
means for determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network;
means for providing to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors;
means for providing information to the first processor, such that the first processor is capable of identifying a conflict between the first address space and the second address space, and is capable of resolving with the second processor the conflict between the first address space and the second address space.
-
-
16. A system for enabling a network between a first processor and a second processor, wherein the first and second processors are separate from said system, are each identifiable by a name, and are each independently administered through the system, said system:
-
a tunneling interface that receives information indicating a consent on behalf of the first processor for enabling a tunnel between the first processor and the second processor, and receives information indicating a consent on behalf of the second processor for enabling a tunnel between the second processor and the first processor; and
a controller that determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network, and that provides to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
-
17. A system for enabling a network between a first processor and a second processor, wherein the first and second processors are separate from said system, the first processor interfacing a first network using a first address space and the second processor interfacing a second network using a second address space, said system:
-
a tunneling interface that receives information indicating a consent on behalf of the first processor for enabling a tunnel between the first processor and the second processor, and receives information indicating a consent on behalf of the second processor for enabling a tunnel between the second processor and the first processor; and
a controller that determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through a base network, that provides to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors, and that provides information to the first processor, such that the first processor is capable of identifying a conflict between the first address space and the second address space and resolving with the second processor the conflict between the first address space and the second address space.
-
Specification