The present invention relates to communications over communication networks
More specifically, but not exclusively, the present invention relates to a method and system for providing a secured, centrally managed virtual IP network over an IP network infrastructure.
The Internet is based on an open architecture described by the Open Standard Interface (OSI layers). The intention of the OSI layers is to allow for interworking between many different technologies, organizations, businesses and households. It is a network that requires cooperation of all the participants. It is a public network which is not owned by any companies or organizations.
In recent years, the widespread proliferation of the Internet access has brought many households, businesses and organizations to communicate and share information over the public network. Hence spam, virus, phishing are examples of unfortunate by-products that developed.
There is a need for businesses, individuals and organizations to communicate securely, privately while eliminating these undesired by-products.
Various methods have been devised for preventing these problems, or at least reducing the unwanted irritants. To reduce the amount of spam that a person receives, the following methods have been implemented: whitelisting, blacklisting, greylistings and many other methods. To provide secured communications over the Internet, methods like Firewall, VPN (Virtual Private Networks), Secure Peer to Peer networks, and Secured Network Gateway have been crafted.
Firewall is used to protect certain areas of the network from externals attacks by putting up retaining walls, which help minimize damages and exposures to external sources. Firewall enforces security at the data packet level within the IP (Internet Protocol) protocol stack.
A virtual private network (VPN) is a secure method of accessing a private network using a public network. A private network is composed of computers owned by a single organization that share information with each other. Typically, corporate Local Area Network (LAN) or Wide Area Network (WAN) is an example of such private networks. A VPN is basically a way to simulate a private network over a public network, such as the Internet, by way of tunnelling network traffic over a secure communication channel.
A Secure Network Gateway is a secure peer to peer connectivity with security features such as mutual authentication, authorization of a specific access, and end to end auditing. Basically, an authorized service can be used securely through a gateway, across an open network, to a known requester, with confidence that the security or privacy of the server's network is not compromised.
A secure Peer to Peer (P2P) network is designed for sharing information. One main example of sharing information implemented on a peer to peer network is for files sharing, for example Napster. As illustrated in
Conventional methods for dealing with spam include: email confirmations, email filters based on a header analysis and/or text analysis, etc. These methods can be further used in combination with blacklists, whitelists, and/or spam-tracking databases. All these methods contribute to filtering and eliminating some of the spams, but not all. Spammers seem to always find alternatives to circumvent these techniques. The root cause, so to speak, is therefore the spammer; accordingly, the only way to stop spams from propagating into the Internet is to stop spammers from sending unsolicited emails.
Although many of these individual technologies exist, no solution is sufficiently efficient at securing a communication network and providing services to efficiently stop unwanted solicitations. There is a need to overcome the above-discussed drawbacks. Accordingly, a system and method for implementing and establishing a secured, centrally managed virtual IP network on over an IP network infrastructure are sought.
More specifically, in accordance with a first aspect of the present invention, there is provided a method for establishing secure IP communication between at least first and second nodes through a virtual IP network managed by at least one central server. The method comprises: initiating, from one of the at least first and second nodes, a request to the at least one central server for communication between the at least first and second nodes; validating the request for communication between the at least first and second nodes; granting at least one unique identifier to each of the at least first and second nodes upon successful validation; and creating a secure channel for communication between the at least first and second nodes through the virtual IP network using their respective at least one unique identifier.
According to a second aspect of the present invention, there is provided a system for establishing secure IP communication between at least first and second nodes through a virtual IP network managed by at least one central server. The system comprises: means for initiating, from one of the at least first and second nodes, a request to the at least one central server for communication between the at least first and second nodes; means for validating the request for communication between the at least first and second nodes; means for granting at least one unique identifier to each of the at least first and second nodes upon successful validation; and means for creating a secure channel for communication between the at least first and second nodes through the virtual IP network using their respective at least one unique identifier.
According to a third aspect of the present invention, there is also provided a system for establishing secure IP communication between at least first and second nodes through a virtual IP network, The system comprises: an access manager for validating a request, initiated by one of the at least first and second nodes, for communication between the at least first and second nodes, the access manager further granting at least one unique identifier to each of the at least first and second nodes upon successful validation; and a channel for providing the secure IP communication between the at least first and second nodes through the virtual IP network using their respective at least one unique identifier.
The foregoing and other objects, advantages and features of the present invention will become more apparent upon reading of the following non restrictive description of illustrative embodiments thereof, given by way of example only with reference to the accompanying drawings.
In the appended drawings:
Generally stated, a secured virtual IP network according to a non-restrictive illustrative embodiment of the present invention provides a system and method that simplify centrally managed, private and encrypted connections among diverse groups of virtual hosts over any common IP network infrastructures. Furthermore, a non-restrictive illustrative embodiment of the present invention implements and establishes a secured and centrally managed virtual IP network on a traditional IP infrastructure and enables nodes connected to the virtual IP network to communicate securely, with privacy and the ability to control the permission to communicate with each other.
Advantages of the non-restrictive illustrative embodiment of the present invention include:
Turning now to
The SCMVIP network 100 comprises a central server 110, a central database 120 and a plurality of virtual nodes 101, 102, 103 connected to a plurality of hosts. The plurality of virtual nodes allows for a multitude of peer to peer IP connections between the virtual nodes 101, 102, and 103. This multitude of connections between the nodes 101, 102 and 103 define a virtual IP network 130. Also, it is possible that the virtual IP Network 130 be composed of dedicated IP devices, which are optimized to perform routing and forwarding of virtual access control protocol (VACP) packets within the SCMVIP network 100, for example.
The central server 110 includes a Virtual User Account Manager (VUAM) 111 and a Virtual Access Control Manager (VACM) 112.
The Virtual User Access Manager (VUAM) 111 provides the function to register users, businesses and organizations into the virtual IP SCMVIP network 100. Any node, 101, 102 or 103 should be registered within the VUAM 111 in order to benefit and access the services provided by the network 100. If they are not registered, the nodes 101, 102 and 103 can be notified of such situation and may be asked to register with the VUAM 111, which maintains a user registration in the central database 120.
Upon successful registration with the VUAM 111, a profile of the hosts connected to the nodes 101, 102 and 103 is created in the database 120. For example, a user registration is validated against valid participant references, such as credit card information, a valid address of the participant host, official certificates, governmental certificates, etc.
Then, the registered hosts can log into the central server 110 to access the virtual IP network 130. Upon successful login, the VUAM 111 allocates a Virtual User ID (VUID) for each of the hosts and transmits this VUID to the respective participant nodes (101, 102 and 103). Therefore, the participant hosts have access to the virtual IP network 130 through the nodes 101, 102 or 103. A node communicates with the network 130 using a participant VUID. A VUID uniquely identifies a registered host with the SCMVIP network 100. The VUID can be allocated only once during the registration of the host with the VUAM 111.
The Virtual Access Control Manager (VACM) 112 of the central server 110 is responsible for connection request management. For example, node 101, after having successfully logged into the central server 110, could initiate a virtual IP communication with node 102, which has also successfully logged into the central server 110; this communication could include a file transfer (FTP) transaction, a peer to peer communication, or any IP applications. To do so, node 101 makes a connection request to the Virtual Access Control Manager (VACM) 112. The connection request may contain, for example, the VUID of node 101, the virtual IP address of node 101, the virtual IP address of destination node 102 and the requested type of service. The VACM 112 could refuse or authorize the connection request from node 101 based on the information stored in the database 120.
For example, the VACM 112 can refuse the request for communication (or connection) from node 101 if the database 120 indicates that the requested service is not authorized or node 101 is not authorized to communicate with node 102.
The VACM 112 can authorize the request for communication (or connection) from node 101 if the database 102 indicates that the requested service is authorized for node 101 or that node 101 is authorized to communicate with node 102.
For example, by default it can be decided that all the services and all the participants on the nodes are authorized to access the network 130. In this case, each node (101, 102, 103) is responsible for updating the central database 120 with its own preferences and permissions. For example, when node 101 sends SPAM to node 102, node 102 could decide then to stop node 101 from sending unsolicited emails, by updating the central database 120 to block node 101. Accordingly, node 101 will be blocked from communicating with node 102 or from transmitting any emails to any node over the network 130.
More specifically, the database 120 is configured during the host's registration with the central server 110.
The central database 120 contains a User Information Database 121, an Access Control List (ACL) Database 122, an Access Services (AS) Database 123, an Access Blocking List (ABL) Database 124, and an Access Connection Management (ACM) Database 125.
The User Information Database 121 maintains and updates hosts' information and profiles, given upon their registrations. The users' information is necessary to identify each node and participant in the network 130. For example, the user information can be validated and verified for authenticity against official authorities, such as birth certificates. The user information database 121 also contains the VUID of the node, which uniquely identifies each node within the network 130. The VUID is also characterized by the mechanism used to generate it. For example, the VUID can be generated using a predefined static ID or it can be generated using a random scheme which uniquely identifies each node of the virtual IP network 130.
The Access Control List (ACL) database 122 maintains, for each node, a list of nodes which are authorized to access that node. For example, for node 102, the ACL 122 can indicate that node 101 is authorized to communicate with node 102.
The Access Blocking list database (ABL) 124 maintains, for each node, a list of nodes which are not authorized to communicate with that node.
For example, the ABL 124 of node 102 can contain node 103 which is not authorized to communicate with node 102. More specifically, node 103 may be prohibited from accessing node 102 by specifying the virtual IP address or VUID of node 103.
The service database 123 maintains users' information related to supported services for each node. The services could be characterized by supported information specified protocol, supported operation, supported data manipulation, for example. Furthermore, the service database 123 could also indicate which protocols are not authorized to be accessed, or which operations are forbidden.
Furthermore, the central database 120 can also contain registration information that describes the type of services supported and offered by a virtual web site. For example, node 103 can be a web site offering child services while node 102 offer adult online services. In this case, a parent of node 101 could update the central database 120, via the ACL database 122, to allow node 101 to access node 103 since node 103 offers services for children, while blocking access to node 102, via the ABL database 124, since node 102 offers adult services. This is done simply by indicating in the database 120 that node 101 is a child participant and that node 102 indicates services offered to adults only.
Also, the central database 120 can contain additional information as illustrated in
These databases are maintained and managed by the VUAM and the VACM of the central server 802. The VACM mainly manages the database 819, while the VUAM manages the remaining databases.
Turning back to
For example, the VACM 112 can allocate two types of NVID for any node: a source NVID and a destination NVID.
A source node NVID is a unique connection communication identifier associated to a node initiating a communication, i.e. this type of NVID identifier is used to only identify the source node.
A destination node NVID is a unique connection communication identifier associated to a node, this type of NVID is used only to identify the destination node, which receives the communication from the source node.
For example, in the case where the source node 101 communicates with destination node 102, node 101 sends the source node 101 NVID and destination node 102 NVID to node 102. When node 102 responds back to node 101, node 102 transmits a source node 102 NVID and a destination node 101 NVID.
The combination of the source node NVID, destination node NVID, connection or communication request ID and destination real IP address, granted by the VACM 112, could be described as a Virtual Network Connection Stamp (VNCS). A VNCS is a digital stamp that is associated to each connection channel. For example, for a communication propagating through a series of nodes, a VNCS is allocated for each connection pair. For example, in a communication originating from node 101, passing through node 102, which, in this case, performs a role of a proxy forwarder, and terminating on node 103, one VNCS 1 is allocated for the communication channel between node 101 and node 102, and, another VNCS 2 is allocated for the communication channel between node 102 and node 103.
More specifically, the VNCS 1 can contain the request ID 1 for communication (or connection), a source node 101 NVID, a destination node 102 NVID, and the real IP address of node 102. The VNCS 2 contains the request ID 2 for communication (or connection), a source node 102 NVID, a destination node 103 NVID, and the real IP address of node 103.
Alternatively, the VACM 112 can allocate only one type of NVID, i.e. the NVID could be used interchangeably for a source node and a destination node.
It should be noted that the NVID can also correspond to the VUID of a registered node in the network 100.
Also, VUAM 111 and VACM 112 of the central server 110 can include distributed elements, so that each of the VUAM 111 and VACM 112 manages a smaller subset of the virtual IP SCMVIP network 100.
It should be noted that a plurality of central servers such as 110 can be also implemented in the virtual network 100.
Furthermore, a plurality of secured centrally managed virtual IP networks 100 could be created, each one of them dedicated to a specific organization, business, enterprise or household. Interfacing between the plurality of such networks 100 is performed by a node or a gateway. Another example could include a network 100 with a gateway or node that performs a proxy operation between the virtual IP network 100 and a real IP network, such as the Internet.
Turning now to
S1, S2, S3 and S4 as illustrated in
For example, the encapsulation of the VACP packet could be performed over TCP (Transport Control Protocol), UDP (User Datagram Protocol), HTTP (HyperText Transfer Protocol), or any transport protocols. Furthermore, the VACP packet could be transmitted over a secured channel using any known encryption schemes such as IPsec.
Also, the tunnels could encapsulate Ethernet communications inside the VACP packets, within the virtual network 100 of
It should be noted that the operations required to encapsulate, de-capsulate, process VACP packets, validate VNCS, create encrypted peer to peer tunnels, etc., can be performed by a processor referred to as a Virtual IP Messenger (VIPM). A VIPM is present on each virtual IP host. Of course, a plurality of VIPM may be present as well.
The data flow originating from Host A and terminating on Host B proceeds schematically as follows:
It should be noted that the authorization 3A corresponds to the virtual network connection stamp (VNCS), which is further described as a combination of identifiers as mentioned hereinabove. In one approach, to minimize the impact on the performance due to the potential large number of transactions with S1, Host B and S1 use the same algorithm to generate the authorization 3A, for example. In another approach, Host B can also perform a validation of the authorization 3A with S1 to ensure that 3A is not forged or corrupted. This solution ensures validity of the authorization 3A; however additional transactions between Host B and the central server S1 occur in this case.
Referring to
Furthermore,
Interactions and sequence of operations in the virtual IP network 400 can be described as follows:
In this example, the validation of the VNCSs has not been illustrated for simplification purposes. It is assumed that the VNCSs are distributed and each component of the virtual network performs the appropriate validation of the VNCSs before authorizing any request for communication (or connection).
The use of a proxy server allows for performing the forwarding operation. In this example, the nodes 451, 452 and 454 are assumed to have a valid user account in the virtual IP network 450.
Interactions and sequence of operations in the virtual IP network 450 can be described as follows:
Now more specifically, with reference to
It should be noted that VNCS 510 can be used to trace the path of communication exchanges between different nodes within a virtual IP network. For example, the VNCS 510 can include the following fields: 1) a connection request identification 511, 2) a source NVID 512, 3) a destination NVID 513 and 4) a destination real IP address 514. The VNCS 510 can further include a time stamp field and/or any other relevant information.
Node A 501 is assumed to be the initiator of the communication between Node A 501 and Node D 504. To initiate the communication in the virtual IP network, Node A transmits the VNCS 510 to node D 504, by providing enough information for Node D 504 to be able to authorize the connection. As illustrated in
In another non-restrictive illustrative embodiment of the present invention, the concept of gateway between a virtual IP network 200 and a real IP network 210 could be implemented, as shown in
For example, a participant host 201 desires to access the web server 213 within the real IP network 210. The participant host 201 could do so through a server 202. The server 202 performs the NAT (Network Address Translation) operation necessary to forward virtual IP packets from the participant host 201 to a server 211. It should be noted that the servers 202 and 211 could be viewed as the same server, with one interface interacting with the virtual IP network 200 and another interface interacting with the real IP network 210. Elements 212 can represent routers in a traditional IP network infrastructure.
An example of applications of virtual IP communication between two nodes may include a virtual IP Node A sending emails to a virtual IP node B. Generally, the email exchanges pass through an email transmit server P1, such as a SMTP (Simple Mail Transfer Protocol) server and through an email receiver server P2, such as a POP (Post Office Protocol) server. Also, the communication exchanges are performed in collaboration with a virtual access control manager (VACM), as will be explained hereinbelow.
The electronic mail (email) transaction can be described as in the following steps:
The above procedure may seem simple at the virtual IP network layer, corresponding to Layer 1 in
More specifically, in Step (1), the email transmission request made by Node A 501, using the VIPM of Node A 501 for example, triggers two requests C1 and C2 (not shown) for communication (or connection) from Node A 501 to the VACM 502 of the central server. The request C1 for communication (or connection) contains: 1) the VUID of Node A 501, 2) the virtual IP address of Node A 501, 3) the virtual IP address of Node B 503, and 4) the real IP address of Node A 501. The second request C2 for communication (or connection) contains: 1) the participant VUID of Node A 501, 2) the virtual IP address of Node A 501, 3) the virtual IP address of proxy P1504, and 4) the real IP address of Node A 501.
The VACM 502 authorizes Node A 501 to communicate with Node B 503 depending on the configuration stored in the database (not shown) of the central server. If Node B 503 configures the central server database to authorize this communication, then, the VACM 502 authorizes the request for communication (or connection). Upon successful authorization, the VACM 502 creates a VNCS A (not shown) for this connection. The VNCS A contains: 1) a connection request identifier, which uniquely identifies the communication between Node A 501 and Node B 503, 2) a source NVID, which uniquely identifies Node A 501, 3) a destination NVID, which uniquely identifies Node B 503, and 4) a real IP address of Node B 503.
Similarly, the VACM 502 also authorizes Node A 501 to communicate with proxy P1504 depending on the configuration stored in the central server. Upon successful authorization, the VACM 502 creates a VNCS B (not shown) for this connection or communication. The VNCS B contains: 1) a connection request identifier, which uniquely identifies the communication between Node A 501 and P1504, 2) a source NVID, which uniquely identifies Node A 501, 3) a destination NVID, which uniquely identifies P1504, and 4) a real IP address of proxy P1504.
The VNCS A and B are stored into the central server database (not shown) and are transmitted to Node A 501. As depicted in
After Node A 501 receives the connection or communication authorization, Node A 501 establishes an encrypted peer to peer link 506 with the transmit email agent P1504. Then, the VNCS A and B are transmitted to P1504 from Node A 501 using the peer to peer link 506. Once the VNCS are received, P1504 validates the VNCS B. Upon successful validation, all the virtual IP packets, coming from Node A 501, are processed, with each packet containing the VNCS A and B. Node A 501 continues to transmit the email message to P1504 until completion.
In step (2), P1504 stores the received email message in a storage medium 508. The storage 508 for emails includes the email message with the addition of the VNCS A and VNCS B. Also alternatively, the VIPM, implemented in P1 for example, is responsible for the storage of the VNCS A and B. It is noted that the VIPM should be in this case implemented to support electronic mail protocol and be able to associate a VNCS within an email message.
In step (3), P1504 processes the stored email message, which will be sent to proxy P2507. To do so, a request C3 (not shown) for communication (or connection) between P1504 and the VACM 502 of the central server is initiated by P1504. Indeed, P1504 sends to the VACM 502 the request for communication (or connection) containing 1) the participant VUID of P1504, 2) the virtual IP address of P1504, 3) the virtual IP address of proxy P2507, and 4) the real IP address of P1504. Upon reception, the VACM 502 authorizes the request for communication (or connection) and sends back the VNCS C containing 1) a connection request identifier, which uniquely identifies the communication between P1504 and proxy P2507, 2) a source NVID, uniquely identifying P1504, 3) a destination NVID, uniquely identifying P2507, and 4) a real IP address of P2507. Once the VNCS C has been received, P1504 establishes a peer to peer link with P2507, based on the destination email address. Also, the VIPM of P1504 extracts the VNCS A and VNCS B from the received email message and then transmits the extracted VNCS A and VNCS B and the VNCS C to P2507. Once P2507 receives the three VNCSs, P2507 validates the VNCS C and VNCS A on behalf of its client and authorizes the email reception process. Then P1504 transmits the rest of the email message to P2507 until completion.
In step (4), P2507 stores the complete received email message into the client's inbox 509. P2507 could also store the VNCS A, B and C for monitoring and auditing purposes.
In step (5), the host connected to Node B 503 checks for emails in the inbox 509. This operation triggers a request C4 (not shown) for communication (or connection) from Node B 503 to the VACM 502. The connection or communication request C4 contains 1) the VUID of Node B 503, 2) the virtual IP address of Node B 503, 3) the virtual IP address of P1504, and 4) the real IP address of Node B 503. The VACM 502 checks and authorizes the request C4 for communication (or connection) against its central database. Upon successful validation and authorization, the VACM 502 sends back the VNCS D (not shown) to Node B 503. The VNCS D contains 1) a connection request identifier, uniquely identifying the communication between Node B 503 and P2507, 2) a source NVID, uniquely identifying Node B 503, 3) a destination NVID, uniquely identifying P2507, and 4) a real IP address of P2507. Once Node B receives the VNCS D, Node B 503 establishes a peer to peer tunnel (not shown) with P2507. Node B 503 also transmits the VNCS D to P2507 for verification. P2507 verifies the VNCS D and then authorizes the communication. Finally, Node B 503 extracts the email message from P2507.
Now turning to
Generally, the virtual IP network 100 runs over the traditional IP network. Layer 1 as shown in
Layer 2 is the secured VACP network layer. It provides a secured peer to peer connection between virtual hosts and enables virtual IP hosts to communicate securely, privately over a virtual IP network. It provides also the ability to manage this communication, to authorize participant hosts to enter into communication with a node, to indicate which services are supported by a host, to forbid participant hosts to communicate with a node, etc.
Layer 3 is the established virtual IP network 100. In this network layer, applications and services are executed and processed similarly to any traditional IP network. The difference is characterized by the IP address of each host, which represents a virtual IP address, thus not reachable from a real IP network. Also, the routers are absent in the virtual IP network. Furthermore, the virtual IP network could be viewed as a closed virtual Internet where the participant hosts are protected from the outside world and could communicate with each other securely with control over access and communication permissions.
It should be noted that a telegram format can be used in the description of the Virtual Access Control Protocol (VACP). Turning to
The VACP telegram 700 includes a VACP header 701, a plurality of VNCSs (702, 703, 704) and the payload 705.
The telegram header 701 includes the following fields:
Each of the plurality of the VNCS 702-704 describes a virtual network connection stamp allocated to each connection channel. Each VNCS includes:
Now turning to
The module 601 represents the protocol stack 610 framework of Host A, which is formed of a plurality of layers. The module 601 includes an application service layer 611, which sits on top of the TCP layer 612 and the UDP layer 613. The TCP 612 and UDP 613 layers sit on top of the IP layer 614. The application service layer 611 could include any application protocols such as FTP, HTTP, SNMP (Simple Network Management Protocol), Instant Messaging, SMTP, POP, etc. The application service layer 611, the TCP layer 612, the UDP layer 613 and the IP layer 614 form the set of layers 609. These layers sit on top of the VACP layer 615. The VACP layer 615 corresponds to a secured control protocol stack. For example, this layer handles peer to peer tunnelling, connection management on behalf of a higher layer, etc. The VACP layer 615 itself lies on top of another set of layers 608. The set of layers 608 includes the TCP layer 616 and UDP layer 617, the IPsec layer 618 and the IP layer 619. As shown in
The module 602 illustrates a protocol stack of Proxy 1 performing forwarding of the received virtual IP packets from Host A. The module 602 is the simplest form of a proxy virtual host. For example, the module 602 handles the data packets only at the IP layer 620. All virtual IP packets received by Proxy 1 are forwarded to the next host, Proxy 2.
The module 603 illustrates a complex virtual IP host protocol stack, for Proxy 2. Proxy 2 performs forwarding of the virtual IP packets, received from Proxy 1 and based at the application service layer 630. It stores the received application service data into its storage medium before transmitting them to the next Host B. The received packets from Proxy 1 are analyzed in collaboration with VIPM from layers 630 to 633, which correspond to the application, TCP, UDP and IP layers respectively. This analysis allows for mapping the application services with the VACP layer 634 in such a way that the communication at the application layer 630 are linked to the communication at the VACP layer 634.
Finally, the module 604 illustrates the stack of protocols of the virtual Host B on which the communication channel is terminated. The module 604 is similar to the stack 601. As illustrated in
Finally, turning to
The method 900 assumes that the first and second nodes have already an account created on the central server 110 through the VUAM 111. therefore, they correspond to a first and second virtual IP nodes.
In step 901, the first virtual IP node and the second virtual IP node are authorized into the virtual IP network 100 and are then granted with a unique VUID for each node.
In step 902, the first virtual IP node can start initiating a communication with the second virtual IP node. For example, the virtual network 100 can be a virtual local area network (Virtual LAN), in this case, the VACP protocol stack encapsulates the Ethernet packets over the VACP packets.
When initiating the communication, in step 903 the first virtual IP node first sends a request to the central server VUAM/VACM 110 for authorization to communicate with the second virtual IP node.
In step 904, if the central server 110 refuses to grant the authorization to communicate between the first and second virtual IP nodes, then method 900 ends. On the contrary, if the authorization is successfully granted, method 900 proceeds with step 905.
In step 905, the central server 110 allocates a virtual network connection stamp (VNCS) for the communication channel between the first virtual IP node and the second virtual IP node, and then transmits the VNCS to the first virtual IP node.
In step 906, upon receiving the VNCS from the central server 110, the first virtual IP node establishes a secure peer to peer tunnel with the second virtual IP node.
Then, in step 907, the first virtual IP node transmits the VNCS to the second virtual IP node for verification and validation. In another example, this step is not implemented; instead the VNCS is simply embedded into the VACP packet.
In step 908, the second virtual IP node receives the VNCS from the first virtual IP node, verifies and validates the received VNCS in collaboration with the central server 110. If the validation fails, the communication exchanges through the peer to peer tunnel are discarded and method 900 ends. If the validation is successful, method 900 proceeds to the following step.
Finally, in step 910, the virtual IP transactions between the first virtual IP node and the second virtual IP node occur through the peer to peer tunnel. The virtual IP packets exchanged between the first virtual IP node and the second virtual IP node are encapsulated over the VACP packets.
Generally stated, the method 900 and system 100 according to a non-restrictive illustrative embodiment of the present invention provides secure virtual IP communications (peer to peer communications) between a first virtual IP node and a second virtual IP node, while maintaining privacy over the Internet. The method 900 and system 100 allow a virtual IP node to access a virtual access control manager (VACM) and to configure the database of the VACM so as to authorize or forbid access to services or to a specific virtual host. Furthermore, the propagation of the virtual network connection stamp (VNCS) within a communication channel provides a procedure to trace and audit communication exchanges between a first node and a second within the virtual IP network. In this way, it is apparent that problems related to un-authorized communications can be stopped while securing and maintaining privacy of a virtual IP communication channel.
It should be understood that even though the Virtual IP network was described in a context of an IP network, the present can be also used in other kinds of networks, which are within the scope and nature of the present invention.
Although the present invention has been described in the foregoing specification by means of a non-restrictive illustrative embodiment, this illustrative embodiment can be modified at will within the scope of the appended claims without departing from the spirit and nature of the subject invention.
Number | Date | Country | Kind |
---|---|---|---|
2,585,808 | Mar 2007 | CA | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CA2008/000565 | 3/26/2008 | WO | 00 | 3/18/2010 |