Many-to-One Mapping of Host Identities
First Claim
1. A computer-implemented method comprising:
- sending, from a first node to a second node, an initiator message to open a connection between the first node and the second node;
receiving, at the first node, a responder message sent from the second node, wherein the responder message comprises a responder certificate;
converting the responder certificate to a responder canonical identifier;
comparing the responder canonical identifier to a stored canonical identifier; and
establishing the connection between the first node and the second node over a pre-existing session corresponding to the stored canonical identifier, when the responder canonical identifier matches the stored canonical identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes sending, from a first node to a second node, an initiator message to open a connection between the first node and the second node, receiving, at the first node, a responder message sent from the second node, in which the responder message comprises a responder certificate, converting the responder certificate to a responder canonical identifier, comparing the responder canonical identifier to a stored canonical identifier, and establishing the connection between the first node and the second node over a pre-existing session corresponding to the stored canonical identifier, when the responder canonical identifier matches the stored canonical identifier.
59 Citations
30 Claims
-
1. A computer-implemented method comprising:
-
sending, from a first node to a second node, an initiator message to open a connection between the first node and the second node; receiving, at the first node, a responder message sent from the second node, wherein the responder message comprises a responder certificate; converting the responder certificate to a responder canonical identifier; comparing the responder canonical identifier to a stored canonical identifier; and establishing the connection between the first node and the second node over a pre-existing session corresponding to the stored canonical identifier, when the responder canonical identifier matches the stored canonical identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, encoded on a computer-readable medium, operable to cause data processing apparatus to perform operations comprising:
-
sending, from a first node to a second node, an initiator message to open a connection between the first node and the second node; receiving, at the first node, a responder message sent from the second node, wherein the responder message comprises a responder certificate; converting the responder certificate to a responder canonical identifier; comparing the responder canonical identifier to a stored canonical identifier; and establishing the connection between the first node and the second node over a pre-existing session corresponding to the stored canonical identifier, when the responder canonical identifier matches the stored canonical identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
a processor to transmit information to and receive information from a network, wherein the processor is operable to perform operations comprising; sending, from a first node to a second node, an initiator message to open a connection between the first node and the second node; receiving, at the first node, a responder message sent from the second node, wherein the responder message comprises a responder certificate; converting the responder certificate to a responder canonical identifier; comparing the responder canonical identifier to a stored canonical identifier; and establishing the connection between the first node and the second node over a pre-existing session corresponding to the stored canonical identifier, when the responder canonical identifier matches the stored canonical identifier. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
Specification