Method and apparatus to facilitate virtual transport layer security on a virtual network
First Claim
1. A method to facilitate virtual transport layer security on a virtual network, wherein the virtual network allows peer-to-peer communications, comprising:
- creating a first pipe at a first peer, wherein a pipe is a one-way input channel into a peer, and wherein the peer is any type of computer system;
associating a first peer identifier with the first pipe;
advertising an availability of the first pipe, thereby allowing other peers to discover the first peer and to initiate secure direct peer-to-peer communications with the first peer;
connecting to the first pipe from a second peer;
creating a second pipe at the second peer;
associating a second peer identifier with the second pipe;
connecting to the second pipe from the first peer;
wherein the first pipe and the second pipe form a virtual connection between the first peer and the second peer; and
initiating secure communications on the virtual connection between the first peer and the second peer without the assistance of a server, and by using an available underlying transport layer, wherein the transport layer does not require robust transport services.
2 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that provides virtual transport layer security on a virtual network to facilitate peer-to-peer communications. The system creates a first pipe that functions as a one-way input channel into a first peer. Next, the system associates a first peer identifier with the first pipe and advertises the availability of this first pipe. A second peer connects to this first pipe to communicate with the first peer. The system also creates a second pipe at the second peer, and a second peer identifier is associated with this second pipe. The first peer connects to this second pipe to communicate with the second peer. The first pipe and the second pipe form a virtual connection through which the first peer and the second peer can communicate securely.
-
Citations
21 Claims
-
1. A method to facilitate virtual transport layer security on a virtual network, wherein the virtual network allows peer-to-peer communications, comprising:
-
creating a first pipe at a first peer, wherein a pipe is a one-way input channel into a peer, and wherein the peer is any type of computer system; associating a first peer identifier with the first pipe; advertising an availability of the first pipe, thereby allowing other peers to discover the first peer and to initiate secure direct peer-to-peer communications with the first peer; connecting to the first pipe from a second peer; creating a second pipe at the second peer; associating a second peer identifier with the second pipe; connecting to the second pipe from the first peer; wherein the first pipe and the second pipe form a virtual connection between the first peer and the second peer; and initiating secure communications on the virtual connection between the first peer and the second peer without the assistance of a server, and by using an available underlying transport layer, wherein the transport layer does not require robust transport services. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method to facilitate virtual transport layer security on a virtual network, wherein the virtual network allows peer-to-peer communications, comprising:
-
creating a first pipe at a first peer, wherein a pipe is a one-way input channel into a peer, and wherein the peer is any type of computer system; associating a first peer identifier with the first pipe; advertising an availability of the first pipe, thereby allowing other peers to discover the first peer and to initiate secure direct peer-to-peer communications with the first peer; connecting to the first pipe from a second peer; creating a second pipe at the second peer; associating a second peer identifier with the second pipe; connecting to the second pipe from the first peer; wherein the first pipe and the second pipe form a virtual connection between the first peer and the second peer; and initiating secure communications on the virtual connection between the first peer and the second peer without the assistance of a server, and by using an available underlying transport layer, wherein the transport layer does not require robust transport services. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus to facilitate virtual transport layer security on a virtual network, wherein the virtual network allows peer-to-peer communications, comprising:
-
a creating mechanism that is configured to create a first pipe at a first peer, wherein a pipe is a one-way input channel into a peer, and wherein the peer is any type of computer system; an associating mechanism that is configured to associate a first peer identifier with the first pipe; an advertising mechanism that is configured to advertise an availability of the first pipe, thereby allowing other peers to discover the first peer and to initiate secure direct peer-to-peer communications with the first peer; a connecting mechanism that is configured to connect to the first pipe from a second peer; wherein the creating mechanism is further configured to create a second pipe at the second peer; wherein the associating mechanism is further configured to associate a second peer identifier with the second pipe; wherein the connecting mechanism is further configured to connect to the second pipe from the first peer; wherein the first pipe and the second pipe form a virtual connection between the first peer and the second peer; and an initiating mechanism that is configured to initiate secure communications on the virtual connection between the first peer and the second peer without the assistance of a server, and by using an available underlying transport layer, wherein the transport layer does not require robust transport services. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification