Abstract: A method for authenticating packet communication traffic includes receiving a data packet sent over a network from a source address to a destination address and reading from the packet a value of a field that is indicative of a number of hops traversed by the packet since having been sent from the source address. The authenticity of the source address is assessed responsive to the value.
Type:
Grant
Filed:
August 29, 2002
Date of Patent:
January 30, 2007
Assignee:
Riverhead Networks Inc.
Inventors:
Guy Pazi, Anat Bremler-Bar, Rami Rivlin, Dan Touitou
Abstract: A method for communication includes coupling a first port of a Layer-3 packet router to receive communication traffic from a network, the traffic including packets destined for a target address, which is accessible via a second port of the router. At the router, the packets that are destined for the target address are diverted to a traffic processor via a third port of the router. The diverted packets are processed at the traffic processor, and returning the processed packets to the router via the third port. At the router, the processed packets are conveyed from the third port to the second port for delivery to the target address.
Type:
Application
Filed:
January 26, 2005
Publication date:
March 9, 2006
Applicant:
Riverhead Networks, Inc.
Inventors:
Anat Barr, Hank Nussbacher, Roi Hermoni, Dan Touitou
Abstract: A method for authenticating communication traffic includes receiving a first request, such as a DNS request, sent over a network from a source address, to provide network information regarding a given domain name. A response is sent to the source address in reply to the first request. When a second request is from the source address in reply to the response, the authenticity of the first request is assessed based on the second request.
Type:
Grant
Filed:
September 20, 2002
Date of Patent:
June 14, 2005
Assignee:
Riverhead Networks Inc.
Inventors:
Guy Pazi, Dan Touitou, Alon Golan, Yehuda Afek
Abstract: A method for authenticating communication traffic includes receiving a first request, such as a DNS request, sent over a network from a source address, to provide network information regarding a given domain name. A response is sent to the source address in reply to the first request. When a second request is from the source address in reply to the response, the authenticity of the first request is assessed based on the second request.
Type:
Application
Filed:
September 17, 2004
Publication date:
February 24, 2005
Applicant:
Riverhead Networks, Inc.
Inventors:
Guy Pazi, Dan Touitou, Alon Golan, Yehuda Afek
Abstract: A method for authenticating communication traffic includes receiving a first request, such as a DNS request, sent over a network from a source address, to provide network information regarding a given domain name. A response is sent to the source address in reply to the first request. When a second request is from the source address in reply to the response, the authenticity of the first request is assessed based on the second request.
Type:
Application
Filed:
September 20, 2002
Publication date:
April 10, 2003
Applicant:
Riverhead Networks Inc.
Inventors:
Guy Pazi, Dan Touitou, Alon Golan, Yehuda Afek