LAN-based UMA network controller with aggregated transport
First Claim
1. A method comprising:
- receiving, at a first device, from a second device, first keying information that the second device uses at least to encrypt packets destined for a third device;
receiving, at the first device, from the third device, second keying information that the third device uses at least to encrypt packets destined for the second device;
intercepting a first encrypted packet at the first device;
decrypting the first encrypted packet at the first device using the first keying information or the second keying information;
processing, at the first device, data resulting from the decrypting;
encrypting, at the first device, using the first keying information or the second keying information, data resulting from the processing;
sending, from the first device, toward a destination specified for the first encrypted packet, a second packet containing data resulting from the encrypting;
intercepting, at the first device, an Extensible Authentication Protocol (EAP) response message that the third device sent toward the second device;
storing, at the first device, a value of a parameter that is indicated in the EAP response message; and
forwarding the EAP response message from the first device to the second device.
9 Assignments
0 Petitions
Accused Products
Abstract
A method for managing UMA communications within a local area network and a network controller includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.
-
Citations
15 Claims
-
1. A method comprising:
-
receiving, at a first device, from a second device, first keying information that the second device uses at least to encrypt packets destined for a third device; receiving, at the first device, from the third device, second keying information that the third device uses at least to encrypt packets destined for the second device; intercepting a first encrypted packet at the first device; decrypting the first encrypted packet at the first device using the first keying information or the second keying information; processing, at the first device, data resulting from the decrypting; encrypting, at the first device, using the first keying information or the second keying information, data resulting from the processing; sending, from the first device, toward a destination specified for the first encrypted packet, a second packet containing data resulting from the encrypting; intercepting, at the first device, an Extensible Authentication Protocol (EAP) response message that the third device sent toward the second device; storing, at the first device, a value of a parameter that is indicated in the EAP response message; and forwarding the EAP response message from the first device to the second device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network device comprising:
-
means for receiving, from a second device, first keying information that the second device uses at least to encrypt packets destined for a third device; means for receiving, from the third device, second keying information that the third device uses at least to encrypt packets destined for the second device; means for intercepting a first encrypted packet; means for decrypting the first encrypted packet using the first keying information or the second keying information; means for processing data resulting from the decrypting; means for encrypting, using the first keying information or the second keying information, data resulting from the processing; means for sending, toward a destination specified for the first encrypted packet, a second packet containing data resulting from the encrypting; means for intercepting an Extensible Authentication Protocol (EAP) response message that the third device sent toward the second device; means for storing a value of a parameter that is indicated in the EAP response message; and means for forwarding the EAP response message to the second device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform steps comprising:
-
receiving, at a first device, from a second device, first keying information that the second device uses at least to encrypt packets destined for a third device; receiving, at the first device, from the third device, second keying information that the third device uses at least to encrypt packets destined for the second device; intercepting a first encrypted packet at the first device; decrypting the first encrypted packet at the first device using the first keying information or the second keying information; processing, at the first device, data resulting from the decrypting; encrypting, at the first device, using the first keying information or the second keying information, data resulting from the processing; sending, from the first device, toward a destination specified for the first encrypted packet, a second packet containing data resulting from the encrypting; intercepting, at the first device, an Extensible Authentication Protocol (EAP) response message that the third device sent toward the second device; storing, at the first device, a value of a parameter that is indicated in the EAP response message; and forwarding the EAP response message from the first device to the second device. - View Dependent Claims (12, 13, 14, 15)
-
Specification