Preventing data corruption with transparent network connections
First Claim
1. A method of preventing data corruption, the method comprising:
- establishing an inner connection with a first transparent network device;
creating an inner connection message including inner connection data to be sent to the first transparent network device via the inner connection;
modifying the inner connection message such that the inner connection data will not be accepted by a client and/or a server; and
sending the modified inner connection message including the inner connection data to the first transparent network device via the inner connection;
wherein modifying the inner connection message comprises setting a time stamp value included the inner connection message to a value less than a time stamp value associated with the outer connection.
20 Assignments
0 Petitions
Accused Products
Abstract
Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
43 Citations
17 Claims
-
1. A method of preventing data corruption, the method comprising:
-
establishing an inner connection with a first transparent network device; creating an inner connection message including inner connection data to be sent to the first transparent network device via the inner connection; modifying the inner connection message such that the inner connection data will not be accepted by a client and/or a server; and sending the modified inner connection message including the inner connection data to the first transparent network device via the inner connection; wherein modifying the inner connection message comprises setting a time stamp value included the inner connection message to a value less than a time stamp value associated with the outer connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of preventing data corruption, the method comprising:
-
establishing an inner connection with a first transparent network device; intercepting a first message addressed to a destination address associated with an outer connection and the inner connection; identifying a first time stamp value included in the first message; determining if the first message is associated with the outer connection; and in response to the determination that the first message is associated with the outer connection; determining a modified time stamp value from the first time stamp value; and sending a modified version of the first message including the modified time stamp value towards the destination address; wherein the modified time stamp value is greater than a second time stamp value included in a second message associated with the inner connection and intended to be received by the first transparent network device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of preventing data corruption, the method comprising:
-
establishing an inner connection with a first transparent network device, wherein the inner connection is associated with a first flow control window; intercepting a first message associated with an outer connection between a client and a server; identifying a second flow control window associated with the outer connection from the first message; determining if the first flow control window is near the second flow control window; and in response to the determination that the first flow control window is near the second flow control window, moving the first flow control window away from the second flow control window. - View Dependent Claims (14, 15, 16, 17)
-
Specification