×

Establishing tunnels between selective endpoint devices along communication paths

  • US 8,949,446 B2
  • Filed: 06/03/2013
  • Issued: 02/03/2015
  • Est. Priority Date: 05/05/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • by a first computing device,receiving a first communication packet from a second computing device and addressed to a third computing device;

    if the first communication packet is a connection-initiating packet having no customization indicator, then;

    generating a second connection-initiating packet having a customization indicator with a first value and addressed to the third computing device; and

    sending the second connection-initiating packet to the third computing device;

    if the first communication packet is a connection-initiating packet having a customization indicator with the first value, then;

    generating a third connection-initiating packet having a customization indicator with a second value and addressed to the third computing device; and

    sending the third connection-initiating packet to the third computing device;

    if the first communication packet is a connection-initiating packet having a customization indicator with the second value, then;

    generating a first connection-acknowledgement packet having a customization indicator with the second value and addressed to the second computing device; and

    sending the first connection-acknowledgement packet to the second computing device;

    if the first communication packet is a connection-acknowledgement packet having no customization indicator, then;

    installing an intercept rule;

    generating a second connection-acknowledgement packet having a customization indicator with the second value and addressed to the second computing device; and

    sending the second connection-acknowledgement packet to the second computing device; and

    if the first communication packet is a connection-acknowledgement packet having a customization indicator with the second value, then;

    installing a bypass rule.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×