×

Tunnel interface for securing traffic over a network

  • US 9,258,280 B1
  • Filed: 09/26/2015
  • Issued: 02/09/2016
  • Est. Priority Date: 09/13/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, by a service management system (SMS) of a managed security service provider, a request to establish an Internet Protocol (IP) connection between a first location of the managed security service provider and a second location of the managed security service provider; and

    establishing, by the SMS, a tunnel between a first service processing switch of the managed security service provider and a second service processing switch of the managed security service provider coupled in communication with the first service processing switch through a public network byassociating a first packet routing node within the first service processing switch with the first location;

    associating a second packet routing node within the second service processing switch with the second location;

    binding an encryption configuration decision associated with the request with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting an encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting a decryption node of the first service processing switch into a second path between the second location and the first location; and

    binding the encryption configuration decision with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×