20130133063 | TUNNELING-BASED METHOD OF BYPASSING INTERNET ACCESS DENIAL - The tunneling-based method of bypassing Internet access denial allows for the re-routing of communication between a local system and a destination system when the local system's Internet Protocol (IP) address has been blocked by a malicious higher-tier Internet service provider (ISP). If it is determined that the local system is blocked from communicating with the destination system, then it is determined if a malicious higher-tier ISP is responsible for the blockage of service. If the local system is blocked by the ISP, then the ISP is identified and communication is established between the local system and a neighboring system that is not blocked by the ISP. Finally, communications are then transmitted from the local system to the destination system, through the established tunnel, by first transmitting from the local system to the neighboring system, and then transmitting from the neighboring system through the ISP to the destination system. | 05-23-2013 |
20130304927 | NETWORK ADDRESS TRANSLATION-BASED METHOD OF BYPASSING INTERNET ACCESS DENIAL - The network address translation (NAT)-based method of bypassing Internet access denial uses NAT as an identity-hiding technique to bypass Internet access denial. The victim network uses NAT routers as a gateway to connect to neighboring networks, and uses a set of non-blocked Internet protocol (IP) addresses as the NAT routers' external public IP addresses. These addresses are not part of the IP ranges registered to the victim network. Rather, they are obtained from a neighboring network. The outgoing packets, therefore, will not be blocked by the malicious ISP, as they will not be recognized as part of the victim network. The method is scalable and has minimal network performance impact. Although NAT introduces some connectivity limitations, these are overcome by using application-layer routing for server reachability behind NAT, and NAT traversal techniques for peer-to-peer (P2P) applications. | 11-14-2013 |