Method for sending messages over secure mobile communication links
First Claim
1. A method for sending messages over secure communication links in networks comprising at least a first terminal being able to change its method of network access and at least one other terminal with one or more possible intermediate computers between the first terminal and the other terminal performing network address and/or other translations, a secure communication link being established between an initial network address of the first terminal and the address of the other terminal, the link defining at least the addresses of the two terminals, and performing encapsulation in said secure communication link to overcome network address and/or other translations made by said intermediate computers on the route, comprising:
- a) the first terminal moving from said initial network address to a new network address, b) spending a request message using encapsulation from the first terminal to the other terminal to change said secure connection to be between the new address of the first terminal and the other terminal, the request also containing a description of the encapsulation method performed by the first terminal on the basis of which description the other terminal detects translations performed by said intermediate computers, c) the other terminal responding to the first terminal with a reply message with a description about translations made by said possible intermediate computers between the new address of the first terminal and the other terminal and/or encapsulation methods supported by the other terminal, and d) thereafter sending the message from the first terminal to the other terminal by using the information sent with said reply.
3 Assignments
0 Petitions
Accused Products
Abstract
The method is for sending messages over secure communication links in networks with a mobile terminal and at least one other terminal. A secure communication link is established between a given initial network address of the mobile terminal and the address of the other terminal. The secure communication link defines at least the addresses of the two terminals. The secure communication link supports an encapsulation method to overcome network address translations and/or other translations. When the mobile terminal moves from an initial network address to a new network address, a request message is sent from the mobile terminal to the other terminal to change the secure connection to be between the new address of the mobile terminal and the other terminal. The request is sent using said method to overcome network translations. The other terminal responds to the mobile terminal with a reply message with a description about the overcoming methods supported by the other terminal. All messages are thereafter sent from the mobile terminal to the other terminal by using the information sent with said reply.
-
Citations
20 Claims
-
1. A method for sending messages over secure communication links in networks comprising at least a first terminal being able to change its method of network access and at least one other terminal with one or more possible intermediate computers between the first terminal and the other terminal performing network address and/or other translations, a secure communication link being established between an initial network address of the first terminal and the address of the other terminal, the link defining at least the addresses of the two terminals, and performing encapsulation in said secure communication link to overcome network address and/or other translations made by said intermediate computers on the route, comprising:
-
a) the first terminal moving from said initial network address to a new network address, b) spending a request message using encapsulation from the first terminal to the other terminal to change said secure connection to be between the new address of the first terminal and the other terminal, the request also containing a description of the encapsulation method performed by the first terminal on the basis of which description the other terminal detects translations performed by said intermediate computers, c) the other terminal responding to the first terminal with a reply message with a description about translations made by said possible intermediate computers between the new address of the first terminal and the other terminal and/or encapsulation methods supported by the other terminal, and d) thereafter sending the message from the first terminal to the other terminal by using the information sent with said reply. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification