PROXY INTERCEPTION
First Claim
1. A method in a proxy node for non-transparent interception, the method comprising:
- receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as destination address, and an identifier of the primary request;
creating a secondary request based on the primary request, the secondary request comprising an address to the proxy node as a source address, the address of the server node as destination address, and an identifier of the second request;
sending the secondary request to the server node;
receiving a secondary response from a second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as destination address, and an identifier of the secondary response;
checking whether the secondary response matches the secondary request;
when the secondary response matches the secondary request,identifying the primary request on which the secondary request is based;
creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the source address of the primary request as destination address of the primary response, and the identifier of the primary request; and
sending to said first node said primary response.
1 Assignment
0 Petitions
Accused Products
Abstract
A client node, a proxy node, and methods therein, as well as a protocol and a computer program for enabling interception of request messages in connection-less protocols. A primary request addressed to a server node is intercepted by a proxy node creating a secondary request based on said request and forwards this secondary request towards the server node. The proxy node receives a secondary response, being a response to the secondary request, creates a primary response based on the secondary response and forwards this primary response to the node from which the primary request was received. A response can thus be sent along the same path as a corresponding request was sent.
131 Citations
21 Claims
-
1. A method in a proxy node for non-transparent interception, the method comprising:
-
receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as destination address, and an identifier of the primary request; creating a secondary request based on the primary request, the secondary request comprising an address to the proxy node as a source address, the address of the server node as destination address, and an identifier of the second request; sending the secondary request to the server node; receiving a secondary response from a second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as destination address, and an identifier of the secondary response; checking whether the secondary response matches the secondary request; when the secondary response matches the secondary request, identifying the primary request on which the secondary request is based; creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the source address of the primary request as destination address of the primary response, and the identifier of the primary request; and sending to said first node said primary response. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A proxy node for a communication network, the proxy node comprising:
-
a processor; and a non-transitory memory storing computer program code which when run on the processor, causes the proxy node to; receive from a first node a primary request comprising an address of the first node as a source address, an address of a server node as destination address, and an identifier of the primary request; create a secondary request based on the primary request, the secondary request comprising an address to the proxy node as a source address, the address of the server node as destination address, and an identifier of the second request; send the secondary request to the server node; receive a secondary response from a second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as destination address, and an identifier of the secondary response; check whether the secondary response matches the secondary request; when the secondary response matches the secondary request, identify the primary request on which the secondary request is based; create a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the source address of the primary request as destination address of the primary response, and the identifier of the primary request; and send to said first node said primary response. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A proxy node for a communication network, the proxy node comprising:
-
a transmitter, a receiver and a processing circuitry that is adapted to; receive via the receiver from a first node a primary request comprising an address of the first node as a source address, an address of a server node as destination address, and an identifier of the primary request; create a secondary request based on the primary request, the secondary request comprising an address to the proxy node as a source address, the address of the server node as destination address, and an identifier of the second request; transmit via the transmitter the secondary request to the server node; receive via the receiver a secondary response from a second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as destination address, and an identifier of the secondary response; check whether the secondary response matches the secondary request; when the secondary response matches the secondary request, identify the primary request on which the secondary request is based, create a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the source address of the primary request as destination address of the primary response, and the identifier of the primary request; and transmit via the transmitter said primary response to said first node.
-
-
14. (canceled)
-
15. A method in a client node, the method comprising:
-
sending, to a proxy node, a request comprising an address of the client node as source address, an address of a server node as destination address, and a first identifier of the request; receiving from the proxy node a response comprising an address of the proxy node as a source address, the address of the client node as the destination address, a second identifier, and a field instructing the client node to accept said response having a source address different from the destination address of the request, as a response to the request; checking whether the response matches the request, by using said first and second identifiers; and when the response matches the request, accepting the response as the response to the request. - View Dependent Claims (16)
-
-
17. A client node for a communication network, the client node comprising:
-
a processor; and a non-transitory memory storing computer program code which when run on the processor, causes the client node to; transmit, to a proxy node, a request comprising an address of the client node as source address, an address of a server node as destination address, a first identifier of the request, and a field instructing the client node to accept a response having a source address different from the destination address of the request, as a response to said request; receive, from the proxy node, a response comprising an address of the proxy node as a source address, the address of the client node as the destination address, and a second identifier; check whether the response matches the request, by using said first and second identifiers; and when the response matches the request, accept the response as the response to the request. - View Dependent Claims (18)
-
-
19. A client node for a communication network, the client node comprising a receiver, a transmitter and a processing circuitry that is adapted to:
-
transmit via the transmitter, to a proxy node, a request comprising an address of the client node as source address, an address of a server node as destination address, and a first identifier of the request; receive via the receiver, from the proxy node, a response comprising an address of the proxy node as a source address, the address of the client node as the destination address, a second identifier, and a field instructing the client node to accept said response having a source address different from the destination address of the request, as a response to said request; check whether the response matches the request, by using said first and second identifiers; and when the response matches the request, accept response as the response to the request.
-
-
20. (canceled)
-
21. A method for connectionless communication comprising a field in a response, the field being arranged to indicate a network node that is sending a request towards a destination address to accept a response having a source address different from the destination address of the request, as a response to said request.
Specification