Methods and systems for enabling a tunnel between two computers on a network
First Claim
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor and the second processor each identifiable by a name, the method comprising the steps of:
- providing for one or more processors separate from the at least one additional processor a set of one or more names that includes the name of the first processor;
receiving, at the at least one additional processor, information indicating on behalf of the first processor a selection of one or more of the names in the set of names;
receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel extending from the first processor to the second processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel extending from the second processor to the first processor, wherein the indication of consent on behalf of the second processor includes selecting on behalf of the second processor the name of the first processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the additional processor. Further, the additional processor may receive information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network. The additional processor may provide to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
Citations
10 Claims
-
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor and the second processor each identifiable by a name, the method comprising the steps of:
-
providing for one or more processors separate from the at least one additional processor a set of one or more names that includes the name of the first processor;
receiving, at the at least one additional processor, information indicating on behalf of the first processor a selection of one or more of the names in the set of names;
receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel extending from the first processor to the second processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel extending from the second processor to the first processor, wherein the indication of consent on behalf of the second processor includes selecting on behalf of the second processor the name of the first processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors. - View Dependent Claims (2, 4, 5, 6, 7)
establishing, by the first processor, one or more tunnels through the network to the second processor using the first and second virtual addresses.
-
-
5. The method of claim 4, wherein in the step of establishing by the first processor one or more tunnels to the second processor, the tunnel is established through an Internet.
-
6. The method of claim 1, further comprising the steps of:
determining if the consent on behalf of the first processor is authorized.
-
7. The method of claim 1, wherein each of the names includes a two-level naming hierarchy, and wherein at least one level of the two-level naming hierarchy is used for identifying an organization.
-
3. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, the first processor and the second processor each identifiable by a name, the method comprising the steps of:
-
enabling a tunnel between the first processor and the at least one additional processor;
enabling a tunnel between the second processor and the at least one additional processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the first processor for enabling a tunnel extending from the first processor to the second processor, wherein the information indicating a consent on behalf of the first processor, is received through the tunnel between the first processor and the at least one additional processor;
receiving, at the at least one additional processor, information indicating a consent on behalf of the second processor for enabling a tunnel extending from the second processor to the first processor, wherein the information indicating a consent on behalf of the second processor, is received through the tunnel between the second processor and at least one additional processor;
determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
-
8. A system for enabling a network between a first processor and a second processor each identifiable by a name and each independently administered through the system, the method comprising the steps of:
-
means for providing for one or more processors separate from the system a set of one or more names that includes the name of the first processor;
means for receiving information indicating on behalf of the first processor a selection of one or more of the names in the set of names;
means for receiving information indicating a consent on behalf of the first processor to enable a tunnel extending from the first processor to the second processor;
means for receiving information indicating a consent on behalf of the second processor to enable a tunnel extending from the second processor to the first processor, wherein the indication of consent on behalf of the second processor includes selecting the name of the first processor;
means for determining a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
means for sending to the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors. - View Dependent Claims (9)
-
-
10. A system for enabling a network between a first processor and a second processor, wherein the first and second processors are separate from said system and are each identifiable by a name, said system comprising:
-
a tunneling interface that provides for one or more processors separate from the system a set of names that includes the name of the first processor, receives information indicating on behalf of the first processor a selection of one or more of the names in the set of names, receives information indicating a consent on behalf of the first processor for enabling a tunnel extending from the first processor to the second processor, and receives information indicating a consent on behalf of the second processor for enabling a tunnel extending from the second processor to the first processor, wherein the indication of consent on behalf of the second processor includes selecting the name of the first processor; and
a controller that determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network, and that provides to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
Specification