Methods, communication networks, and computer program products for configuring a communication tunnel for traffic based on whether a network element can be trusted
First Claim
Patent Images
1. A method of operating a communication network, comprising:
- determining whether a network element can be trusted; and
configuring a tunnel for traffic associated with the network element based on whether the network element can be trusted.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication network is operated by determining whether a network element can be trusted and configuring a tunnel for traffic associated with the network element based on whether the network element can be trusted operates a communication network.
-
Citations
20 Claims
-
1. A method of operating a communication network, comprising:
-
determining whether a network element can be trusted; and
configuring a tunnel for traffic associated with the network element based on whether the network element can be trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A communication network, comprising:
-
a verification system that is configured to determine whether a network element can be trusted; and
a tunnel controller that is configured to configure a tunnel for traffic associated with the network element based on whether the network element can be trusted. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification