×

Tunnel interface for securing traffic over a network

  • US 9,391,964 B2
  • Filed: 01/27/2016
  • Issued: 07/12/2016
  • Est. Priority Date: 09/13/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method comprising:

  • instantiating, within each of a plurality of service processing switches of a service provider, a plurality of virtual routers (VRs), wherein each VR of the plurality of VRs is supported by an object group and each object of the object group supports a network service;

    assigning one or more VRs of the plurality of VRs to a subscriber of a plurality of subscribers of the service provider;

    receiving, by a service management system (SMS) of the service provider, a request to establish an Internet Protocol (IP) connection between a first location of the subscriber and a second location of the subscriber; and

    establishing a tunnel between a first service processing switch of the plurality of service processing switches and a second service processing switch of the plurality of service processing switches coupled in communication with the first service processing switch through a public network, including;

    binding an encryption configuration decision associated with the request with a routing configuration of a first packet routing node of the first service processing switch, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network; and

    binding the encryption configuration decision with a routing configuration of a second packet routing node of the second service processing switch, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×