×

Establishing tunnels between selective endpoint devices along communication paths

  • US 8,458,344 B2
  • Filed: 05/05/2011
  • Issued: 06/04/2013
  • Est. Priority Date: 05/05/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • by a first computing device,receiving a first communication packet from a second computing device destined to a third computing device;

    if the first communication packet is a connection-initiating packet having no customization indicator, then;

    generating a second connection-initiating packet having a customization indicator and addressed to the third computing device;

    setting a value of the customization indicator of the second connection-initiating packet to 0; and

    sending the second connection-initiating packet to the third computing device;

    if the first communication packet is a connection-initiating packet having a customization indicator with a value of 0, then;

    generating a third connection-initiating packet having a customization indicator and addressed to the third computing device;

    setting a value of the customization indicator of the third connection-initiating packet to 1; and

    sending the third connection-initiating packet to the third computing device;

    if the first communication packet is a connection-initiating packet having a customization indicator with a value of 1, then;

    generating a first connection-acknowledgement packet having a customization indicator and addressed to the second computing device;

    setting a value of the customization indicator of the first connection-acknowledgement packet to 1; and

    sending the first connection-acknowledgement packet to the second computing device;

    if the first communication packet is a connection-acknowledgement packet having no customization indicator, then;

    installing an intercept rule;

    generating a second connection-acknowledgement packet having a customization indicator and addressed to the second computing device;

    setting a value of the customization indicator of the second connection-acknowledgement packet to 1; and

    sending the second connection-acknowledgement packet to the second computing device; and

    if the first communication packet is a connection-acknowledgement packet having a customization indicator with a value of 1, then;

    installing a bypass rule.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×