×

Methods and systems for redirecting data

  • US 7,734,907 B2
  • Filed: 12/08/2003
  • Issued: 06/08/2010
  • Est. Priority Date: 12/08/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for redirecting data in a network, the network connecting a first gateway and a second gateway, wherein the first gateway comprises a first node and a third node and the second gateway comprises a second node and a fourth node, the method comprising:

  • receiving a first data to be transmitted over the network from a first workstation associated with the first gateway to a second workstation associated with the second gateway;

    configuring the first node of the first gateway and the fourth node of the second gateway to send and receive data encrypted with a security protocol via a first tunnel, the security protocol comprising;

    encrypting the address of the first workstation and the address of the second workstation, andsecuring the data so that only the address of the first gateway and the address of the second gateway is available to other users of the network;

    configuring the third node of the first gateway and the second node of the second gateway to send and receive data encrypted with the security protocol via a second configuring the first data to be transmitted between the third node of the first gateway and the second node of the second gateway via the second tunnel using the security protocol;

    detecting a failure of the third node of the first gateway;

    transmitting over the network an encrypted indication from the first node of the first gateway to the second node of the second gateway that the third node of the first gateway has failed;

    reconfiguring the first data to be transmitted over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol after the encrypted indication has been received by the second node of the second gateway;

    transmitting the first data over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×