throbber
USOO6970941B1
`
`(12) United States Patent
`Caronni et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,970,941 B1
`Nov. 29, 2005
`
`(54) SYSTEM AND METHOD FOR SEPARATING
`ADDRESSES FROM THE DELIVERY
`SCHEME IN A VIRTUAL PRIVATE
`NETWORK
`
`(75) Inventors: Germano Caronni, Palo Alto, CA
`(US); Amit Gupta, Fremont, CA (US);
`Sandeep Kulmar, Santa Clara, CA
`(US); Tom R. Markson, San Mateo,
`CA (US); Christoph L. Schuba,
`Mountain View, CA (US); Glenn C.
`Scott, Mountain View, CA (US)
`(73) Assignee: Sun Microsystems, Inc., Santa Clara,
`CA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 09/458,043
`
`(22) Filed:
`
`Dec. 10, 1999
`
`7
`
`(51) Int. Cl. ....................... G06F 15/173; G06F 15/16
`(52) U.S. Cl. ...................... 709/238; 709/227; 709/228;
`709/231
`(58) Field of Search ................................ 709/203, 212,
`709/217-219, 225, 249,213-216, 223-224,
`709/227–231, 238
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,825,354 A 4/1989 Agrawal et al.
`5,115,466 A 5/1992 Presttun et al.
`5,144,665 A 9/1992 Takaragi et al.
`5,220,604 A 6/1993 Gasser et al.
`5,241,599 A 8/1993 Bellovin et al.
`5,331,637 A 7/1994 Francis et al. .............. 370/408
`56. A
`to: R et al.
`5,570,366 A 10/1996 Baker et al. ................ 370/312
`5,572,528. A 11/1996 Shuen ........................ 370/402
`5,623,601 A 4/1997 Vu
`
`
`
`5,636,371 A 6/1997 Yu
`5,664,191 A 9/1997 Davidson et al.
`5,696,763 A 12/1997 Gang, Jr. .................... 370/390
`5,719,942 A 2/1998 Aldred et al.
`5,720,035 A 2/1998 Allegreet al.
`
`3. A As Aziz - - - - - - - - - - - - - - - - - - - - - - - - - - 713/155
`2
`Y-2
`f1998 Mittra
`5,802,320 A 9/1998 Baehr et al.
`5,806,042 A 9/1998 Kelly et al.
`5,832,529 A 11/1998 Wollrath et al.
`5.835,723. A 11/1998 Andrews et al. ............ 709/226
`(Continued)
`FOREIGN PATENT DOCUMENTS
`O 702 477 A2
`3/1996
`........... HO4L 29/06
`
`EP
`
`(Continued)
`OTHER PUBLICATIONS
`“Virtual Private Networks on Vendor Independent Net
`works”, IBM Technical Disclosure Bulletin, vol. 35, No. 4A,
`pp. 326-329 (1992).
`
`(Continued)
`Primary Examiner-Ario Etienne
`ASSistant Examiner-Hussein El-chanti
`(74) Attorney, Agent, or Firm-Finnegan, Henderson,
`Farabow, Garrett & Dunner, LLP
`
`(57)
`
`ABSTRACT
`
`Methods and Systems consistent with the present invention
`establish a virtual network on top of current IP network
`naming Schemes. The Virtual network uses a separate layer
`to create a modification to the IP packet format that is used
`to Separate network behavior from addressing. As a result of
`the modification to the packet format, any type of delivery
`method may be assigned to any address or group of
`addresses. The virtual network also maintains Secure com
`munications between nodes, while providing the flexibility
`signing delivery methods independent of the delivery
`
`7 Claims, 12 Drawing Sheets
`
`812Y- NEXTHEADER =SUPERNET
`614Y- REALSOURCENODED E \to
`616Y-REALDESTINATIONNOBED
`
`822Y-
`
`NEXTHEADER=AH
`
`KEYINFORMATION
`870- 824
`826N SUPERNETNUBERD
`
`SE" \-620
`
`NETHEAER = ESP
`
`SPI
`SESN0.
`
`AUTHENTICATIONCAA
`
`AUTHENTICATION
`HEADER
`
`A.
`
`642^N. WRTASOURCENODEID
`
`ENCAPSULATING
`
`passages 640
`
`880 - 844Y-VIRTUALDESTNATONNEED
`
`852-
`
`3541\
`
`TCP
`
`DAA
`
`PAYLCA
`DAA
`
`\-650
`
`---
`
`AA/SWA Ex. 1003, p.1 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`US 6,970,941 B1
`Page 2
`
`WO
`WO
`WO
`
`12/1998 ........... HO4L 12/46
`WO 98/57464
`U.S. PATENT DOCUMENTS
`3/1999 ............. HO4L 9/00
`WO 99/11019
`370/392
`5856.974 A 1/1999 Gervais et all
`7/1999 ........... GO6F 13/00
`WO 99/38081
`... 713/201
`5.884,024 A 3/1999 Lim et al. ....
`OTHER PUBLICATIONS
`... 713/201
`5,931,947 A 8/1999 Burns et al. ....
`5,933,420 A
`8/1999 Jaszewski et al. .......... 370/329
`“V-One's SmartGate VPN”, V-One Corporation Advertise
`5,960,177 A 9/1999 Tanno
`ment, pp. A5-A6.
`5.987,453 A 11/1999 Krishna et al.
`Pakstas, A., “Towards Electronic Commerce Via Science
`5.987,506 A 11/1999 Carter et al.
`Park Multi-Extranets, Computer Communications, vol. 22,
`3. A E Real...
`pp. 1351-1363 (1999).
`6,026,430 A 2/2000 Butman et al.
`Wright, Michele, “Using Policies for Effective Network
`6,049,878 A 4/2000 Caronni et al.
`Management”, International Journal of Network Manage
`6,055,575 A
`4/2000 Paulsen et al.
`ment, vol. 9, pp. 118-125 (1999).
`6,061,346 A 5/2000 Nordman .................... 370/352
`Perkins, Charles E., “Mobile IP," IEEE Communication
`6,061,796 A 5/2000 Chen et al.
`Magazine, pp. 8498 (1997).
`E. A 3: plan et al. ............ 370/395.2
`Perkins, C., “IP Mobility Support," ftp://ftp.isi.edu/in-notes/
`6,128.29s. A 10/2000 Wootton et al. ... zoo
`rfc2002.txt, pp. 1-79 (1996).
`6,130,892. A 10/2000 Short et al. ................. 370401
`Laborde, D., “Understanding and Implementing Effective
`6,141,755. A 10/2000 Dowd et al. ................ 713/200
`VPNS,” Computer Technology Review, Westworld Produc
`6,148,323 A 11/2000 Whitner et al. ............. 718/105
`tion Co., Los Angeles, vol. 18, pp. 12, 14 & 16 (1998).
`6,158,011 A 12/2000 Chen et al.
`Armitage, “IP Multicasting Over ATM Networks," IEEE
`6,173,399 B1
`1/2001 Gilbrech
`6,175,917 B1
`1/2001 Arrow et al.
`Journal On Selected Areas in Communications, Vol. 15, pp.
`6.212,558 B1
`4/2001 Antur et al. ................ 709/221
`445-457 (1997).
`6.212,633 B1
`4/2001 Levy et al.
`Chua et al., “On a Linux Implementation of Mobile IP and
`6.215,877 B1
`4/2001 Matsumoto
`its Effects on TCP Performance,” Computer Communica
`6,219,694 B1
`4/2001 Lazaridis et al. ........... 709/206
`tions, vol. 22, pp. 568-588 (1999).
`6,226,751 B1
`5/2001 Arrow et al. ............... 713/201
`Chung et al., “DCOM and CORBA, Side by Side, Step by
`6,236,652 B1
`5/2001 Preston et al. .............. 370/349
`Step, and Layer by Layer, C Plus Plus Report, Sigs.
`6.243,814 B1
`6/2001 Matena
`Publications, vol. 10 (1998).
`6.279,029 B1
`8/2001 Sampat et al.............. 709203
`De Lima et al., “An Effective Selective Repeat ARQ
`6,292,934 B1
`9/2001 Davidson et al.
`Strategv for High Speed Point-to-Multipoint Communica
`6,304,973 B1 10/2001 Williams
`trategy
`g) Spe
`p
`6,307,837 B1 10/2001 Ichikawa et al. ........... 370/230
`tions." IEEE 47" Vehicular Technology Conference, pp.
`6,308,282 B1
`10/2001 Huang et al. .................. 71,
`1059-1063 (1996).
`6,327,252 B1 12/2001 Silton et al. ................ 370,256
`Deng et al., “Integrating Security in CORBA Based Object
`6,330,671 B1 12/2001 Aziz ..........
`... 713/163
`Architectures, "IEEE. pp. 50-61 (1995).
`6,333,918 B1 12/2001 Hummel .....
`... 370/238
`Edwards, K., “Core Jini,” Prentice Hall PTR, (1999).
`6,335,926 B1
`1/2002 Silton et al. ................ 370/351
`Freier et. A., “The SSL Protocol Version 3.0', Internet Draft,
`6,370.552 B1
`4/2002 Bloomfield
`Netscape Communications, Nov. 18, 1996, pp. Abstract,
`6,374,298 B2
`4/2002 Tanno
`1-72.
`6,377,811 B1
`4/2002 Sood et al.
`3. R s: Man, 0. r r 2: Gleeson, Heinanen, Armitage, “A Framework for IP Based
`6415,323 B1
`7/2002 McCanne et al. ........... 709/225
`Virtual Private Networks’ Online, retrieved from the
`6,452.925 B1* 9/2002 Sistanizadeh et al........ 370/352
`Internet:
`<URL:http://www.alternic.org/drafts/drafts-g-h/
`6,453,419 B1
`9/2002 Flint et al.
`draft-gleeson-vpn-framework-00.txts, retrieved Jun. 27,
`6,463,061 B1 10/2002 Rekhter et al.
`2001.
`6,470,375 B1 10/2002 Whitner et al. ............. 718/105
`Perkins, C.E., “Mobile Networking Through Mobile IP",
`6,484.257 B1 11/2002 Ellis
`IEEE Internet Computing, IEEE Service Center, Piscataway,
`6,487.600 B1* 11/2002 Lynch ........................ 222 New Jersey, vol. 2, No. 1, 1998, pp 1-12.
`E. E. E. E. O. E. Ricciuti M., long Makes CORBA Net Friendly." CNET
`6,515,974 B1
`2/2003 Inoue et al. ................ 370,
`News.Com, pp. 1-2 (1997).
`6,532,543 B1
`3/2003 Smith et al.
`Stevenson et al., “Design of a Key Agile Cryptographic
`6,557,037 B1
`4/2003 Provino
`System for OC-12c Rate ATM," IEEE (1995).
`6,560,707 B2
`5/2003 Curtis et al.
`Teraoka, “VIP: A Protocol Providing Host Migration
`6,567,405 B1* 5/2003 Borella et al. .............. 370/389
`Transparency,” Internetworking. Research and Experience,
`6,600,733 B2
`7/2003 Deng
`vol. 4, pp. 195-221 (1993).
`6,606.708 B1
`8/2003 Devine et al.
`Teraoka, “Host Migration Transparency in IP Networks: The
`6,615,349 B1
`9/2003 Hair
`VIP Approach,” Computer Communications Review, pp.
`6,631,416 B2 10/2003 Bendinelli et al.
`44-65.
`6,693.878 B1
`2/2004 Daruwalla et al.
`Teraoka, “A Network Architecture Providing Host Migra
`FOREIGN PATENT DOCUMENTS
`tion Transparency,” Computer Communication Review, No.
`O813 327 A2 12/1997 ........... HO4L 29/06
`4, pp. 209-220 (1991).
`22
`O 887981 A2 12/1998 .
`HO4L 29/06
`Zhao et al., “Flexible Network Support for Mobility.” A CM,
`WO 89/08887
`9/1989 ........... GoF 13/14
`pp. 145-155 (1998).
`WO/97/48210
`12/1997 ........... HO4L 12/46
`DCOM Technical Overview, Microsoft Corporation (1996).
`WO 98/18269
`4/1998 .
`HO4O 3/OO
`Introduction to OrbixOTM, IONA Technologies PLC
`WO 98/32301
`7/1998 ............ HO4O 7/22
`(1999).
`
`EP
`EP
`WO
`WO
`WO
`WO
`
`
`
`AA/SWA Ex. 1003, p.2 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`US 6,970,941 B1
`Page 3
`
`Orbix C++ Administrator's Guide, IOWATechnologies PLC
`(1999).
`OrbixNames Programmer's Administrator's Guide, IONA
`Technologies PLC (1999).
`Forman, George H., et al., “The Challenges of Mobile
`Computing,” University of Washington Computer Science &
`Engineering, pp. 1-16 (1994).
`Pike, Rob et al., “Plan 9 from Bell Labs”, 1995, Lucent
`Technologies, pp. 1-25.
`Waldvogel, Marcel et al., “The VersaKey Framework:
`Versatile Group Key Management”, Sep., 1999, Computer
`Engineering and Networks Laboratory (TIK), Eth Zürich,
`
`Switzerland and Sun Microsystems Inc., Network Security
`Group, Palo Alto, California, pp. 1-27.
`SSHIPSEC Express, White Paper, Version 2.0, Mar, 1999,
`SSH Communications Security Ltd., pp. 1-23.
`Aziz, Ashar et al., “Simple Key-Management for Internet
`Protocols (SKIP)", http://www.tik.ee.ethZ.ch/-skip/SKIP.
`html, Sep., 1999, pp. 1-19.
`Aziz, Ashar et al., “Design and Implementation of SKIP',
`INET '95 Conference, Jun. 28, 1995, pp. 1-12.
`Kent, S. et al., “IP Authentication Header', ftp://ftp.lisi.edu/
`in-notes/rfc2402.txt, Nov., 1998, pp. 1.-19.
`* cited by examiner
`
`AA/SWA Ex. 1003, p.3 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 1 of 12
`
`US 6,970,941 B1
`
`
`
`AA/SWA Ex. 1003, p.4 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`
`
`2005 NOW. 29
`
`Sheet 2 of 12
`
`US 6,970,941 B1
`
`
`
`,
`
`ZOZ
`
`ZOZ
`
`AA/SWA Ex. 1003, p.5 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 3 of 12
`
`US 6,970,941 B1
`
`O
`
`S. CY)
`
`4.
`d
`O
`CC
`
`&
`C)
`
`OO O
`v.
`CN
`cr)
`Cy)
`
`On O
`
`99
`
`OO
`
`S
`
`st Cy)
`
`O
`V
`cy)
`
`CY
`
`9
`
`CN
`cy
`
`S
`cy
`
`CC
`
`O
`Z
`
`CN
`CN
`cy)
`
`AA/SWA Ex. 1003, p.6 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 4 of 12
`
`US 6,970,941 B1
`
`&
`cy
`
`O
`
`OO
`V CY)
`
`CO
`v
`cy)
`
`O
`?
`O
`Z
`
`?h
`
`9
`
`O O
`2
`
`CC
`
`O
`O
`Z
`
`N
`(5
`N
`U
`
`S
`
`s
`
`AA/SWA Ex. 1003, p.7 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 5 of 12
`
`970,941 B1
`US 6
`9
`
`
`
`BOJOW HEST)
`
`
`
`ECOW TENYJE)Z99
`
`079OSWS
`
`
`
`909
`
`Z09
`
`AA/SWA Ex. 1003, p.8 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 6 of 12
`
`US 6,970,941 B1
`
`
`
`612
`
`614
`
`NEXT HEADER = SUPERNET
`
`REAL SOURCE NODED
`
`
`
`OUTERP
`HEADER
`
`610
`
`616
`
`REALDESTINATIONNODEID
`
`622
`
`624
`
`626
`
`670
`
`NEXT HEADER = AH
`
`KEY INFORMATION
`
`SUPERNET NUMBERD
`
`NEXT HEADER = ESP
`
`SUPERNET
`HEADER
`
`620
`
`
`
`SEGNO.
`
`AUTHENTICATION
`HEADER
`
`630
`
`
`
`AUTHENTICATION DATA
`
`642
`
`VIRTUAL SOURCE NODE ID
`
`660
`
`
`
`644
`
`652
`
`654
`
`ENCAPSULATING
`SECURITY
`PAYLOAD HEADER
`
`640
`
`VIRTUAL DESTINATION NODEID
`
`TCP
`
`DATA
`
`PAYLOAD
`DATA
`
`650
`
`FIG. 6
`
`AA/SWA Ex. 1003, p.9 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 7 of 12
`
`US 6,970,941 B1
`
`
`
`RECEIVE AND AUTHENTICATE
`SUPERNET NAME, USERID,
`PASSWORD AND VADDR
`
`702
`
`
`
`AUTHENTICATED
`BY SASD?
`
`
`
`704
`
`YES
`
`SASD CREATES ADDRESS
`MAPPNG
`
`SASD TRANSMITS ADDRESSING
`INFORMATION TO KMS
`
`KMD GENERATES A KEY ID AND A
`KEY, RETURNS KEY ID AND KEY TO
`KMS AND MULTICASTS INFO
`
`7O6
`
`708
`
`710
`
`SASD RETURNS INFO TO SNLOGIN
`
`712
`
`SNLOGIN TRANSMITS INFO TO
`KMC
`
`714
`
`KMC REGISTERS WITH KMD AND
`KMS
`
`716
`
`N
`
`FIG. 7A
`
`AA/SWA Ex. 1003, p.10 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 8 of 12
`
`US 6,970,941 B1
`
`
`
`SNLOGIN CONFIGURES SNSL
`
`718
`
`SNLOGIN RUNS IN SUPERNET
`CONTEXT
`
`720
`
`SNLOGIN SPAWNS SHELL
`
`722
`
`
`
`
`
`AA/SWA Ex. 1003, p.11 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 9 of 12
`
`US 6,970,941 B1
`
`SEND PACKET
`
`RECEIVE PACKET FROM NODE A
`
`802
`
`ACCESSADDRESS MAPPING
`
`804
`
`
`
`
`
`
`
`
`
`
`
`
`
`NO
`
`SNSL
`CONFIGURED 2
`
`806
`
`YES
`
`OBTAIN KEY
`
`808
`
`ENCRYPT PACKET
`
`810
`
`AUTHENTICATE SENDER
`
`812
`
`PASS TO PLAYER
`
`814
`
`END
`
`FIG. 8
`
`AA/SWA Ex. 1003, p.12 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 10 of 12
`
`US 6,970,941 B1
`
`RECEIVE PACKET
`
`RECEIVE PACKET
`
`901
`
`NO
`
`SNSL
`CONFIGURED?
`
`902
`
`YES
`
`OBTAIN KEY
`
`904
`
`DECRYPT
`
`906
`
`AUTHENTICATE SENDER
`
`908
`
`PASS PACKET TO PLAYER
`
`910
`
`
`
`
`
`
`
`
`
`END
`
`FIG. 9
`
`AA/SWA Ex. 1003, p.13 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 11 of 12
`
`US 6,970,941 B1
`
`LOGOUT
`
`SNLOGOUT RECEIVES NODE ID
`
`1OO2
`
`SNOGOUT REQUESTS LOGOUT
`
`1004
`
`SASD REMOVES ADDRESS
`MAPPING
`
`1 OO6
`
`SASD INFORMS KMS AND
`TERMINATE KMC
`
`1008
`
`KMS CHANGES KEY
`
`1010
`
`END
`
`FIG. 10
`
`AA/SWA Ex. 1003, p.14 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`U.S. Patent
`
`Nov. 29, 2005
`
`Sheet 12 of 12
`
`US 6,970,941 B1
`
`WELSÅS
`
`
`
`8E/W|
`
`|NEITO
`
`_LNE|TO 8 ENW
`
`AA/SWA Ex. 1003, p.15 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`US 6,970,941 B1
`
`1
`SYSTEMAND METHOD FOR SEPARATING
`ADDRESSES FROM THE DELIVERY
`SCHEME IN A VIRTUAL PRIVATE
`NETWORK
`
`RELATED APPLICATIONS
`
`2
`very expensive and require a Staff of information technology
`perSonnel to maintain them. This maintenance requirement
`is burdensome on many organizations whose main business
`is not related to the data processing industry (e.g., a clothing
`manufacturer) because they are not well Suited to handle
`Such data processing needs.
`Another drawback to enterprise networks is that they are
`geographically restrictive. The term “geographically restric
`tive' refers to the requirement that if a user is not physically
`located Such that they can plug their device directly into the
`enterprise network, the user cannot typically utilize it. To
`alleviate the problem of geographic restrictiveneSS, Virtual
`private networks have been developed.
`In a virtual private network (VPN), a remote device or
`network connected to the Internet may connect to the
`enterprise network through a firewall. This allows the
`remote device to access resources on the enterprise network
`even though it may not be located near any component of the
`enterprise network. For example, FIG. 1 depicts a VPN 100,
`where enterprise network 102 is connected to the Internet
`104 via firewall 106. By using VPN 100, a remote device
`D 108 may communicate with enterprise network 102 via
`Internet 104 and firewall 106. Thus, D, 108 may be plugged
`into an Internet portal virtually anywhere within the world
`and make use of the resources on enterprise network 102.
`To perform this functionality, D 108 utilizes a technique
`known as tunneling to ensure that the communication
`between itself and enterprise network 102 is secure in that it
`cannot be viewed by an interloper. “Tunneling” refers to
`encapsulating one packet inside another when packets are
`transferred between two end points (e.g., D 108 and VPN
`software 109 running on firewall 106). The packets may be
`encrypted at their origin and decrypted at their destination.
`For example, FIG. 2A depicts a packet 200 with a source
`Internet protocol (IP) address 202, a destination IP address
`204, and data 206. It should be appreciated that packet 200
`contains other information not depicted, Such as the Source
`and destination port. As shown in FIG. 2B, the tunneling
`technique forms a new packet 208 out of packet 200 by
`encrypting it and adding both a new Source IP address 210
`and a new destination IP address 212. In this manner, the
`contents of the original packet (i.e., 202, 204, and 206) are
`not visible to any entity other than the destination. Referring
`back to FIG. 1, by using tunneling, remote device D 108
`may communicate and utilize the resources of the enterprise
`network 102 in a secure manner.
`Although VPNs alleviate the problem of geographic
`restrictiveness, they impose Significant processing overhead
`when two remote devices communicate. For example, if
`remote device D 108 wants to communicate with remote
`device D. 110, D sends a packet using tunneling to VPN
`Software 109, where the packet is decrypted and then
`transferred to the enterprise network 102. Then, the enter
`prise network 102 sends the packet to VPN software 109,
`where it is encrypted again and transferred to D. Given this
`processing overhead, it is burdensome for two remote
`devices to communicate in a VPN environment.
`Each address used by the VPN contains implicit infor
`mation as to the delivery Scheme (e.g., broadcast, mutlicast,
`or unicast) to use. For example, the well-known “224.X.X.x”
`IP range relates to multicast addresses. Some addresses are
`even bound to a designated interface. For example, the
`“127.X.X.x” IP range is bound to a loopback interface on the
`Internet. Forcing an address to be associated with a delivery
`method unnecessarily restricts addressing Schema. In the
`example mentioned above, a destination address in the
`"127.X.X.X' range always refers to the loopback interface
`
`U.S. patent application Ser. No. 09/457,917, entitled
`“TRULY ANONYMOUS COMMUNICATIONS USING
`SUPERNETS WITH THE PROVISION OF TOPOLOGY
`HIDING, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457.889, entitled
`“METHOD AND SYSTEM FOR FACILITATING RELO
`CATION OF DEVICES ON ANETWORK,” filed Dec. 10,
`1999.
`U.S. patent application Ser. No. 09/457,916, entitled
`“SANDBOXING APPLICATIONS IN A PRIVATE NET
`WORK USING A PUBLIC-NETWORK INFRASTRUC
`TURE, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457,894, entitled
`“SECURE ADDRESS RESOLUTION FOR A PRIVATE
`NETWORK USING A PUBLIC NETWORK INFRA
`STRUCTURE, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/458,020, entitled
`“DECOUPLING ACCESS CONTROL FROM KEY MAN
`25
`AGEMENT IN A NETWORK, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457,895, entitled
`“CHANNEL-SPECIFICFILE SYSTEM VIEWS IN APRI
`VATE NETWORK USING A PUBLIC NETWORK
`INFRASTRUCTURE, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/458,040, entitled
`“PRIVATE NETWORK USING A PUBLIC-NETWORK
`INFRASTRUCTURE, filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457,914, entitled
`“SYSTEMAND METHOD FORENABLING SCALABLE
`35
`SECURITY IN A VIRTUAL PRIVATE NETWORK, filed
`Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457,915, entitled
`“USING MULTICASTING TO PROVIDE ETHERNET
`LIKE COMMUNICATION BEHAVIOR TO SELECTED
`PEERS ON A NETWORK,” filed Dec. 10, 1999.
`U.S. patent application Ser. No. 09/457,896, entitled
`“ANYCASTING IN A PRIVATE NETWORK USING A
`PUBLIC NETWORKINFRASTRUCTURE,” filed Dec. 10,
`1999.
`U.S. patent application Ser. No. 09/458,021, entitled
`“SCALABLE SECURITY ASSOCIATIONS FOR
`GROUPS FOR USE IN A PRIVATE NETWORK USINGA
`PUBLIC-NETWORK INFRASTRUCTURE,” filed Dec.
`10, 1999.
`U.S. patent application Ser. No. 09/458,044, entitled
`“ENABLING SIMULTANEOUS PROVISION OF INFRA
`STRUCTURE SERVICES.” filed Dec. 10, 1999.
`
`15
`
`40
`
`45
`
`50
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to data processing
`Systems and, more particularly, to a private network using a
`public-network infrastructure.
`
`BACKGROUND OF THE INVENTION
`
`AS part of their day-to-day business, many organizations
`require an enterprise network, a private network with lease
`lines, dedicated channels, and network connectivity devices,
`Such as routers, Switches, and bridges. These components,
`collectively known as the network’s “infrastructure,” are
`
`55
`
`60
`
`65
`
`AA/SWA Ex. 1003, p.16 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`3
`and can never be changed. Because of this limitation, it is
`extremely hard to experiment with new or different address
`ing Schemes on a large Scale. For example, IPv6, a new
`addressing Scheme has yet to be fully deployed on the
`Internet because of the different addressing scheme. IPv6 is
`described in greater detail in "ftp://ftp.lisi.edu/in-notes/
`rfc2373.txt.
`Therefore, it is desirable to provide addressing function
`ality that easily integrates and Supports existing infrastruc
`ture Services while at the same time allows for multiple
`delivery Schemes.
`
`SUMMARY OF THE INVENTION
`
`Methods and Systems consistent with the present inven
`tion overcome the shortcomings of existing delivery
`Schemes and addressing by establishing a virtual network on
`top of current IP network delivery schemes. The virtual
`network uses a separate layer to create a modification to the
`IP packet format that is used to separate network behavior
`from addressing. As a result of the modification to the packet
`format, any type of delivery Scheme may be assigned to any
`address or group of addresses. The Virtual network also
`maintains Secure communications between nodes, while
`providing the flexibility of assigning delivery methods inde
`pendent of the delivery addresses.
`In accordance with the purpose of the invention as
`embodied and broadly described herein, a computer is
`connected to a public network infrastructure over which a
`private network operates. The private network has a plurality
`of nodes, and the computer comprises a memory and a
`processor. The memory contains one of the plurality of
`nodes for communicating over the private network. The
`memory also contains a Security layer that receives from the
`one node communications containing internal addresses that
`are Suitable for use in communicating within the private
`network, and that translates the internal addresses into
`external addresses that are Suitable for use in communicating
`over the public-network infrastructure. The internal address
`does not identify a delivery Scheme used by the computer.
`The Security layer also encrypts the communications, and
`that transmits the communications over the public network
`to destinations of the communications. The processor runs
`the one node and the Security layer.
`In another implementation, a method in a public network
`having a network infrastructure that is used by a private
`network over which a plurality of clients communicate with
`a plurality of web server. The private network uses a
`plurality of delivery Schemes to communicate between the
`clients and web servers in the private network, and each of
`the Web Servers have a corresponding external address. The
`method requests an internal address from an address Server.
`The internal address corresponds to a set of Web Servers and
`is not associated with a delivery Scheme. Based on the
`Selected delivery Scheme, the method places the client in a
`context Such that the client is capable of communicating
`with the set of web servers on the private network. Once
`placed, the method Sends the packet from the client to the Set
`of Web Servers by accessing the address mapping and adding
`the external address to the packet and by causing delivery of
`the packet to the Web Server to occur in a Secure manner.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`This invention is pointed out with particularity in the
`appended claims. The above and further advantages of this
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,970,941 B1
`
`4
`invention may be better understood by referring to the
`following description taken in conjunction with the accom
`panying drawings, in which:
`FIG. 1 depicts a conventional virtual private network
`(VPN) system;
`FIG. 2A depicts a conventional network packet;
`FIG. 2B depicts the packet of FIG. 2A after it has been
`encrypted in accordance with a conventional tunneling tech
`nique;
`FIG. 3 depicts a data processing System Suitable for use
`with methods and Systems consistent with the present inven
`tion;
`FIG. 4 depicts the nodes depicted in FIG. 3 communicat
`ing over multiple channels,
`FIG. 5 depicts two devices depicted in FIG. 3 in greater
`detail;
`FIG. 6 depicts a datagram packet used by the present
`invention;
`FIGS. 7A and 7B depict a flow chart of the steps per
`formed when a VPN in a manner consistent with the present
`invention;
`FIG. 8 depicts a flow chart of the steps performed when
`sending a packet from a node of the VPN in a manner
`consistent with the present invention;
`FIG. 9 depicts a flow chart of the steps performed when
`receiving a packet by a node of the VPN in a manner
`consistent with the present invention;
`FIG. 10 depicts a flow chart of the steps performed when
`logging out of a VPN in a manner consistent with the present
`invention; and
`FIG. 11 depicts an embodiment of a web server environ
`ment System for use with the invention.
`
`DETAILED DESCRIPTION
`
`Methods and Systems consistent with the present inven
`tion overcome the Shortcomings of existing networks by
`establishing a “Supernet,” which is a private network that
`uses components from a public-network infrastructure. A
`Supernet allows an organization to utilize a public-network
`infrastructure for its enterprise network So that the organi
`Zation no longer has to maintain a private network infra
`Structure; instead, the organization may have the infrastruc
`ture maintained for them by one or more Service providers
`or other organizations that Specialize in Such connectivity
`matters. AS Such, the burden of maintaining an enterprise
`network is greatly reduced. Moreover, a Supernet is not
`geographically restrictive, So a user may plug their device
`into the Internet from virtually any portal in the world and
`still be able to use the resources of their private network in
`a Secure and robust manner.
`Supernets also provide heterogeneous addressing func
`tionality. The Supernet uses a separate layer that isolates
`address names of nodes from addressing Schemes and deliv
`ery schemes. The Supernet contains a modification to the IP
`packet format that can be used to Separate network behavior
`from addressing. As a result of the modification, any deliv
`ery Scheme may be assigned to any address, or group of
`addresses.
`
`Overview
`FIG. 3 depicts a data processing system 300 suitable for
`use with methods and Systems consistent with the present
`invention. Data processing System 300 comprises a number
`of devices, such as computers 302-312, connected to a
`public network, such as the Internet 314. A Supernet's
`infrastructure uses components from the Internet because
`
`AA/SWA Ex. 1003, p.17 of 23
`American Airlines, et. al. v. Intellectual Ventures, et.al.
`IPR2025-00786
`
`

`

`US 6,970,941 B1
`
`15
`
`S
`devices 302,304, and 312 contain nodes that together form
`a Supernet and that communicate by using the infrastructure
`of the Internet. These nodes 316, 318, 320, and 322 are
`communicative entities (e.g., processes) running within a
`particular device and are able to communicate among them
`Selves as well as access the resources of the Supernet in a
`Secure manner. When communicating among themselves,
`the nodes 316, 318,320, and 322 serve as end points for the
`communications, and no other processes or devices that are
`not part of the Supernet are able to communicate with the
`Supernet's nodes or utilize the Supernet's resources. The
`Supernet also includes an administrative node 306 to admin
`ister to the needs of the Supernet.
`It should be noted that since the nodes of the Supernet rely
`on the Internet for connectivity, if the device on which a
`node is running relocates to another geographic location, the
`device can be plugged into an Internet portal and the node
`running on that device can quickly resume the use of the
`resources of the Supernet. It should also be noted that Since
`a Supernet is layered on top of an existing network, it
`operates independently of the transport layer. Thus, the
`nodes of a Supernet may communicate over different trans
`ports, such as IP, IPX, X.25, or ATM, as well as different
`physical layers, Such as RF communication, cellular com
`munication, Satellite links, or land-based linkS.
`25
`As shown in FIG. 4, a Supernet includes a number of
`channels that its nodes 316-322 can communicate over. A
`“channel” refers to a collection of virtual links through the
`public-network infrastructure that connect the nodes on the
`channel Such that only these nodes can communicate over it.
`A node on a channel may send a message to another node on
`that channel, known as a unicast message, or it can send a
`message to all other nodes on that channel, known as a
`multicast message. For example, channel 1 402 connects
`node A 316 and node C 320, and channel 2 404 connects
`node B318, node C320, and node D322. Each Supernet has
`any number of preconfigured channels over which the nodes
`on that channel can communicate. In an alternative embodi
`ment, the channels are dynamically defined.
`In addition to communication, the channels may be used
`to share resources. For example, channel 1 402 may be
`configured to share a file system as part of node C 320 such
`that node A 316 can utilize the file system of node C in a
`Secure manner. In this case, node C 320 Serves as a file
`System manager by receiving file System requests (e.g.,
`open, close, read, write, etc.) and by Satisfying the requests
`by manipulating a portion of the Secondary Storage on its
`local machine. To maintain security, node C 320 stores the
`data in an encrypted form So that it is unreadable by others.
`Such Security is important because the Secondary Storage
`may not be under the control of the owners of the Supernet,
`but may instead be leased from a Service provider. Addi
`tionally, channel 2 404 may be configured to share the
`computing resources of node D 322 such that nodes B318
`and C 320 send code to node D for execution. By using
`channels in this manner, resources on a public network can
`be shared in a Secure manner.
`A Supernet provides a number of features to ensure Secure
`and robust communication among its nodes. First, the SyS
`tem provides authentication and admission control So that
`nodes become members of the Supernet under Strict control
`to prevent unauthorized acceSS. Second, the Supernet pro
`vides communication Security Services So that the Sender of
`a message is authenticated and communication between end
`points occurs in a Secure manner by using encryption. Third,
`the System provides key management to reduce the possi
`bility of an intruder obtaining an encryption key and pen
`
`35
`
`6
`etrating a Secure communication Session. The System does
`So by providing one key per channel and by changing the
`key for a channel whenever a node joins or leaves the
`channel. Alternatively, the System may use a different Secu
`rity policy.
`Fourth, the System provides address translation in a trans
`parent manner. Since the Supernet is a private network
`constructed from the infrastructure of another network, the
`Supernet has its own internal addressing Scheme, Separate
`from the addressing Scheme of the underlying public net
`work. Thus, when a packet from a Supernet node is Sent to
`another Supernet node, it travels through the public network.
`To do So, the Supernet performs address transla

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket