×

Tunnel interface for securing traffic over a network

  • US 8,650,390 B2
  • Filed: 08/14/2012
  • Issued: 02/11/2014
  • Est. Priority Date: 09/13/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method comprising:

  • receiving, at a service management system (SMS) of a managed security service provider, a request to establish an Internet Protocol (IP) connection between a first location of a first subscriber of a plurality of subscribers of the managed security service provider and a second location of the first subscriber; and

    establishing a tunnel between a first service processing switch of the managed security service provider and a second service processing switch of the managed security service provider coupled in communication with the first service processing switch through a public network byassociating a first packet routing node within the first service processing switch with the first location;

    associating a second packet routing node within the second service processing switch with the second location;

    binding an encryption configuration decision associated with the request with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting an encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting a decryption node of the first service processing switch into a second path between the second location and the first location; and

    binding the encryption configuration decision with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×