Methods and systems for redirecting data
First Claim
1. A method for redirecting data in a network, the network connecting a first gateway and a second gateway, wherein the first gateway comprises a first node and a third node and the second gateway comprises a second node and a fourth node, the method comprising:
- receiving a first data to be transmitted over the network from a first workstation associated with the first gateway to a second workstation associated with the second gateway;
configuring the first node of the first gateway and the fourth node of the second gateway to send and receive data encrypted with a security protocol via a first tunnel, the security protocol comprising;
encrypting the address of the first workstation and the address of the second workstation, andsecuring the data so that only the address of the first gateway and the address of the second gateway is available to other users of the network;
configuring the third node of the first gateway and the second node of the second gateway to send and receive data encrypted with the security protocol via a second configuring the first data to be transmitted between the third node of the first gateway and the second node of the second gateway via the second tunnel using the security protocol;
detecting a failure of the third node of the first gateway;
transmitting over the network an encrypted indication from the first node of the first gateway to the second node of the second gateway that the third node of the first gateway has failed;
reconfiguring the first data to be transmitted over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol after the encrypted indication has been received by the second node of the second gateway;
transmitting the first data over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for redirecting data. These systems and methods may include transmitting over a network an indication from a first node to a second node that a third node has failed. In addition, a first data may be reconfigured to be transmitted over the network between a fourth node and the first node after the indication has been received by the second node. The first data may be initially configured to be transmitted over the network between the second node and the third node. Furthermore, the disclosed systems and methods may include configuring the first node and the fourth node to send and receive the reconfigured first data as encrypted data via a first tunnel and configuring the second node and the third node to send and receive the first data as encrypted data via a second tunnel.
8 Citations
15 Claims
-
1. A method for redirecting data in a network, the network connecting a first gateway and a second gateway, wherein the first gateway comprises a first node and a third node and the second gateway comprises a second node and a fourth node, the method comprising:
-
receiving a first data to be transmitted over the network from a first workstation associated with the first gateway to a second workstation associated with the second gateway; configuring the first node of the first gateway and the fourth node of the second gateway to send and receive data encrypted with a security protocol via a first tunnel, the security protocol comprising; encrypting the address of the first workstation and the address of the second workstation, and securing the data so that only the address of the first gateway and the address of the second gateway is available to other users of the network; configuring the third node of the first gateway and the second node of the second gateway to send and receive data encrypted with the security protocol via a second configuring the first data to be transmitted between the third node of the first gateway and the second node of the second gateway via the second tunnel using the security protocol; detecting a failure of the third node of the first gateway; transmitting over the network an encrypted indication from the first node of the first gateway to the second node of the second gateway that the third node of the first gateway has failed; reconfiguring the first data to be transmitted over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol after the encrypted indication has been received by the second node of the second gateway; transmitting the first data over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol. - View Dependent Claims (2, 3, 4, 13)
-
-
5. A system for redirecting data in a network, the system comprising:
-
a first gateway associated with a first plurality of workstations, the first gateway comprising a first node and a third node; a second gateway associated with a second plurality of workstations, the second gateway comprising a second node and a fourth node, wherein the first node of the first gateway and the fourth node of the second gateway are configured to send and receive data encrypted with a security protocol via a first tunnel, the security protocol comprising; encrypting the address of a first workstation among the first plurality of workstations and the address of a second workstation among the second plurality of workstations and securing the data so that only the address of the first gateway and the address of the second gateway is available to other users of the network; and wherein the third node of the first gateway and the second node of the second gateway are configured to send and receive data encrypted with the security protocol via a second tunnel; at least one electronic processor that executes instructions comprising; electronically executable instructions for receiving a first data to be transmitted over the network from the first workstation to the second workstation; electronically executable instructions for configuring the first data to be transmitted between the third node of the first gateway and the second node of the second gateway via the second tunnel using the security protocol; electronically executable instructions for detecting a failure of the third node of the first gateway; electronically executable instructions for transmitting over the network an encrypted indication from the first node of the first gateway to the second node of the second gateway that the third node of the first gateway has failed; and electronically executable instructions for reconfiguring the first data to be transmitted over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol after the encrypted indication has been received by the second node of the second gateway; electronically executable instructions for transmitting the first data over the network between the first node in the first gateway and the fourth node in the second gateway via the first tunnel using the security protocol. - View Dependent Claims (6, 7, 8, 14)
-
-
9. A computer-readable storage device on which is stored a set of instructions for redirecting data in a network, the network connecting a first gateway and a second gateway, wherein the first gateway comprises a first node and a third node and the second gateway comprises a second node and a fourth node, which when executed perform stages comprising:
-
receiving a first data to be transmitted over the network from a first workstation associated with the first gateway to a second workstation associated with the second gateway; configuring the first node of the first gateway and the fourth node of the second gateway to send and receive data encrypted with a security protocol via a first tunnel, the security protocol comprising; encrypting the address of the first workstation and the address of the second workstation, and securing the data so that only the address of the first gateway and the address of the second gateway is available to other users of the network; configuring the third node of the first gateway and the second node of the second gateway to send and receive data encrypted with the security protocol via a second configuring the first data to be transmitted between the third node of the first gateway and the second node of the second gateway via the second tunnel using the security protocol; detecting a failure of the third node of the first gateway; transmitting over the network an encrypted indication from the first node of the first gateway to the second node of the second gateway that the third node of the first gateway has failed; reconfiguring the first data to be transmitted over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol after the encrypted indication has been received by the second node of the second gateway; transmitting the first data over the network between the first node of the first gateway and the fourth node of the second gateway via the first tunnel using the security protocol. - View Dependent Claims (10, 11, 12, 15)
-
Specification