최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
SAI
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0161091 (2005-07-22) |
등록번호 | US-8363650 (2013-01-29) |
발명자 / 주소 |
|
출원인 / 주소 |
|
인용정보 | 피인용 횟수 : 13 인용 특허 : 406 |
A method for routing packets from a gateway to an endpoint includes the step of associating a private internet protocol (IP) address with an endpoint having a public IP address. A packet addressed to the private IP address of the endpoint is captured. A policy is applied to the packet. The packet is
A method for routing packets from a gateway to an endpoint includes the step of associating a private internet protocol (IP) address with an endpoint having a public IP address. A packet addressed to the private IP address of the endpoint is captured. A policy is applied to the packet. The packet is transmitted to the public IP address of the endpoint, responsive to the application of the policy to the packet.
1. A method for routing packets from a gateway to an endpoint, the method comprising: (a) assigning, by an addressing element executing in user mode memory space of a gateway, a private internet protocol (IP) address of a private network to an endpoint having a public IP address, the gateway not pro
1. A method for routing packets from a gateway to an endpoint, the method comprising: (a) assigning, by an addressing element executing in user mode memory space of a gateway, a private internet protocol (IP) address of a private network to an endpoint having a public IP address, the gateway not providing the private IP address to the endpoint;(b) capturing, by a driver executing in kernel mode memory space of the gateway at a Media Access Control (MAC) layer, a packet from a server on the private network destined for an application of the endpoint communicated via a first transport layer connection between the gateway and the server, to forward to a management process executing in user mode memory space of the gateway, the management process having requested notification from the driver when a packet addressed to the private IP address of the endpoint arrives from the server;(c) applying, by a policy engine executing in user mode memory space of the gateway and in communication with the management process, a policy to the packet to determine whether to transmit the packet to the endpoint based on whether the packet originated from a trusted source;(d) modifying, by the addressing element executing in user mode memory space, responsive to the determination, the packet to be addressed to the public IP address of the endpoint; and(e) transmitting, by the gateway, the packet to the public IP address of the endpoint via a second transport layer connection between the gateway and a client application of the endpoint, responsive to the modification, the client application terminating a third transport layer connection with the application. 2. The method of claim 1, wherein step (b) further comprises capturing, by a driver on the gateway, the packet addressed to the private IP address of the endpoint. 3. The method of claim 2, wherein the driver executes in a kernel of the gateway. 4. The method of claim 3, wherein step (b) further comprises capturing, by the driver, Ethernet traffic addressed to the endpoint, and forwarding the Ethernet traffic to a management process operating in user mode. 5. The method of claim 4, wherein step (b) further comprises forwarding by the management process the Ethernet traffic to a policy engine. 6. The method of claim 1, wherein step (c) further comprises determining by a policy engine whether the packet originated from a trusted source. 7. The method of claim 1, wherein step (c) further comprises applying an access control list to the packet. 8. The method of claim 1, wherein step (e)further comprises performing a network address translation to transform the private IP address of the endpoint to the public IP address of the endpoint. 9. A device for routing packets as a gateway to an endpoint, the device comprising: an addressing element, executing in user mode memory space of the device, assigning a private IP address of a private network to an endpoint having a public IP address, the addressing element not providing the private IP address to the endpoint;a receiver executing in kernel mode memory space, intercepting at a Media Access Control (MAC) layer of the device, a packet from the server destined for an application of the endpoint, to forward to a management process executing in user mode memory space, the management process having requested notification from the receiver when a packet addressed to the private IP address of the endpoint arrives from a server on the private network, the receiver intercepting the packet communicated via a first transport layer connection between the device and the server;a policy engine executing in user mode memory space in communication with the management process, receiving the packet, and applying a policy to the packet to determine whether to transmit the packet to the endpoint based on whether the packet originated from a trusted source,wherein the addressing element executing in user mode memory space modifies the packet to be addressed to the public IP address of the endpoint responsive to the determination; anda transmitter in communication with the addressing element, transmitting the packet to the endpoint via a second transport layer connection between the device and a client application of the endpoint, responsive to the modification, the client application terminating a third transport layer connection with the application. 10. The device of claim 9, wherein the receiver comprises a driver operating in a kernel of the device. 11. The device of claim 9, comprises a driver in compliance with a Network Driver Interface Specification (NDIS). 12. The device of claim 9, wherein the receiver intercepts Ethernet traffic addressed to the endpoint and forwards the Ethernet traffic to a management process operating in user mode. 13. The device of claim 9, wherein the receiver forwards the intercepted packet to the policy engine. 14. The device of claim 13, wherein the receiver process executes in kernel mode. 15. The device of claim 9, wherein the receiver is a process. 16. The device of claim 9, wherein the policy engine is a process. 17. The device of claim 16, wherein the policy engine process executes in user mode. 18. The device of claim 9, wherein the policy engine applies an access control list to the packet. 19. The device of claim 9, wherein the addressing element further comprises transforming a private internet protocol (IP) address of the packet to the public IP address associated with the endpoint. 20. The device of claim 9, wherein the transmitter transmits the packet to an endpoint over a secure sockets layer (SSL) tunnel. 21. The device of claim 9, wherein the transmitter is a process. 22. The device of claim 21, wherein the transmitter process executes in kernel mode. 23. The device of claim 9, wherein the policy is an access control policy. 24. The device of claim 9, wherein the policy determines whether the packet originated from a trusted source. 25. The device of claim 9, wherein the policy engine provides a configuration setting for capturing the packet. 26. The device of claim 9, wherein the application of the policy further comprises performing at least one of: access control list matching and deep packet inspection. 27. A system for routing packets from a gateway to an endpoint, the system comprising: a gateway, in communication with an endpoint on a public network and a server on a private network,an addressing element, executing in user mode memory space of the gateway, assigning a private internet protocol (IP) address of the private network with a public IP address of the endpoint on the public network and establishing a first transport layer connection with the server, the gateway not providing the private IP address to the endpoint:a driver executing in kernel mode memory space of the gateway, intercepting at a Media Access Control (MAC) layer, a packet from a server destined for an application of the endpoint, the packet communicated via the first transport layer connection, to forward to a management process executing in user mode memory space of the gateway, the management process having requested notification from the driver when a packet addressed to the private IP address of the endpoint arrives from the server;a policy engine executing in user mode memory space of the gateway and in communication with the management process, applying a policy to the packet to determine whether to transmit the packet to the endpoint based on whether the packet originated from a trusted source; andwherein the addressing element executing in user mode memory space modifies the packet to be addressed to the public IP address of the endpoint responsive to the determination, and the gateway transmits the packet to the public IP address of the endpoint via a second transport layer connection between the gateway and a client application of the endpoint, responsive to the modification, the client application terminating a third transport layer connection with the application. 28. The system of claim 27, wherein the driver operates in a kernel of the gateway and forwards the packet to the policy engine operating in user mode. 29. The system of claim 27, wherein the policy engine operating in user mode applies the policy to the packet and forwards the packet to a transmitter operating in kernel mode via the addressing element. 30. The system of claim 27, wherein the transmitter transmits the packet via an encrypted tunnel of the second transport layer connection to the client application. 31. The system of claim 27, wherein the gateway terminates the first transport layer connection with the server and terminates the second transport layer connection with the client application. 32. The system of claim 27, wherein the client application provides the packet to the application on the endpoint via the third transport layer connection. 33. A method for routing packets from a gateway to an endpoint, the method comprising: (a) receiving, by a gateway, a request to a server from an application of an endpoint, the application terminating a first transport layer connection with a client application at the endpoint, the client application having a second transport layer connection with the gateway, the gateway having a third transport layer connection with the server in a private network;(b) capturing, by a driver executing in kernel mode memory space of the gateway at a Media Access Control (MAC) layer, a packet from the server communicated via the third transport layer connection, to forward to a management process executing in user mode memory space of the gateway, the management process having requested notification from the driver when a packet addressed to a private internet protocol (IP) address of the endpoint arrives from the server;(c) applying, by a policy engine executing in user mode memory space of the gateway and in communication with the management process, a policy to determine whether to transmit the packet to the endpoint based on whether the packet originated from a trusted source;(d) modifying, by an addressing element executing in user mode memory space of the gateway, the packet to be addressed to a public IP address of the endpoint responsive to the determination; and(e) transmitting, by the gateway via the second transport layer connection, the packet to the public IP address of the endpoint responsive to the modification, the packet destined for the application via the first transport layer connection, wherein the addressing element assigns the public IP address to the endpoint having the private IP address and does not provide the private IP address to the endpoint.
해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
IPC | Description |
---|---|
A | 생활필수품 |
A62 | 인명구조; 소방(사다리 E06C) |
A62B | 인명구조용의 기구, 장치 또는 방법(특히 의료용에 사용되는 밸브 A61M 39/00; 특히 물에서 쓰이는 인명구조 장치 또는 방법 B63C 9/00; 잠수장비 B63C 11/00; 특히 항공기에 쓰는 것, 예. 낙하산, 투출좌석 B64D; 특히 광산에서 쓰이는 구조장치 E21F 11/00) |
A62B-1/08 | .. 윈치 또는 풀리에 제동기구가 있는 것 |
내보내기 구분 |
|
---|---|
구성항목 |
관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표IPC 관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 공고번호, 공고일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표출원인, 출원인국적, 출원인주소, 발명자, 발명자E, 발명자코드, 발명자주소, 발명자 우편번호, 발명자국적, 대표IPC, IPC코드, 요약, 미국특허분류, 대리인주소, 대리인코드, 대리인(한글), 대리인(영문), 국제공개일자, 국제공개번호, 국제출원일자, 국제출원번호, 우선권, 우선권주장일, 우선권국가, 우선권출원번호, 원출원일자, 원출원번호, 지정국, Citing Patents, Cited Patents |
저장형식 |
|
메일정보 |
|
안내 |
총 건의 자료가 검색되었습니다. 다운받으실 자료의 인덱스를 입력하세요. (1-10,000) 검색결과의 순서대로 최대 10,000건 까지 다운로드가 가능합니다. 데이타가 많을 경우 속도가 느려질 수 있습니다.(최대 2~3분 소요) 다운로드 파일은 UTF-8 형태로 저장됩니다. ~ |
Copyright KISTI. All Rights Reserved.
AI-Helper는 오픈소스 모델을 사용합니다. 사용하고 있는 오픈소스 모델과 라이센스는 아래에서 확인할 수 있습니다.
AI-Helper uses Open Source Models. You can find the source code of these open source models, along with applicable license information below. (helpdesk@kisti.re.kr)
OpenAI의 API Key를 브라우저에 등록하여야 ChatGPT 모델을 사용할 수 있습니다.
등록키는 삭제 버튼을 누르거나, PDF 창을 닫으면 삭제됩니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.