Method and system for exchange multifunction job security using ipv6 neighbor discovery options

ABSTRACT

A method that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, which includes generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.

FIELD OF THE INVENTION

The present invention relates to a method and system for exchange multifunction job security using IPv6 Neighbor Discovery options, and more particularly to a software module or software application associated with a computer device or host device such as an image forming apparatus, which uses IPv6 Neighbor Discovery options for exchange multifunction job security.

BACKGROUND OF THE INVENTION

Networks have enhanced our ability to communicate and access information by allowing one personal computer to communicate over a network (or network connection) with another personal computer and/or other networking devices, using electronic messages. When transferring an electronic message between personal computers or networking devices, the electronic message will often pass through a protocol stack that performs operations on the data within the electronic message (e.g., packetizing, routing, flow control).

The first major version of addressing structure, Internet Protocol Version 4 (IPv4), is still the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is being deployed actively worldwide. The IPv6 network protocol provides that IPv6 hosts or host devices (e.g., image forming apparatuses and other devices) can configure themselves automatically (i.e., stateless address autoconfiguration) when connected to an IPv6 network using ICMPv6 neighbor discovery messages (i.e., Neighbor Discovery Protocol or NDP). When first connected to a network, an IPv6 host sends a link-local multicast neighbor solicitation request advertising its tentative link-local address for double address detection (dad), and if no problem is encountered, the host uses the link-local address. The router solicitations are sent (or router advertisements are received depending on timing) to obtain network-layer configuration parameters, and routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.

With the implementation of IPv6 networks, it would be desirable to add additional security to a computer device and/or host device having IPv6 capabilities by including a software module or software application associated with the computer device and/or host device, and which uses IPv6 Neighbor Discovery Options for exchange multifunction job security.

SUMMARY OF THE INVENTION

In consideration of the above issues, a software module or software application associated with a computer device or host device such as an image forming apparatus, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security is disclosed herein.

In accordance with an exemplary embodiment, a method that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, the method comprises: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.

In accordance with another exemplary embodiment, a system that facilitates exchange multifunction job security using IPv6 Neighbor Discovery for a first and a second node, the system comprises: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.

In accordance with a further exemplary embodiment, a computer program product comprising a non-transitory computer usable medium having a computer readable code embodied therein for a first node and a second, the computer readable code configured to cause the first and second nodes to executed a process for a software module that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, the process comprises: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention. In the drawings,

FIG. 1 is an illustration of a network system with a network communication protocol in accordance with an exemplary embodiment.

FIG. 2 is an illustration of a network stack having an application for filtering data packets in accordance with another exemplary embodiment.

FIG. 3 is a flow chart showing another exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security.

FIG. 4 is a flow chart showing an exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security.

FIG. 5 is a flow chart showing a further exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Reference will now be made in detail to the present preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the description to refer to the same or like parts.

FIG. 1 shows a network system 100 having a normal communication protocol, which includes a host device (node A) 110 in the form of an image forming apparatus or multi-functional device in accordance with an exemplary embodiment. As shown in FIG. 1, the network system 100 is composed of a host device (or node A) 110 and one or more second hosts or client devices (node B) 120. The host device (node A) 110 and the one or more second hosts (node B) 120 are connected to each other through an IPv6 communication network 130 in a state capable of performing data communications. It can be appreciated that in accordance with an exemplary embodiment, the hosts (or nodes) 110, 120 can be any network device, which supports an IPv6 communication protocol (Internet Protocol version 6). Examples of communication networks 130 consistent with embodiments of the invention include, but are not limited to, the Internet, an Intranet, a local area network (LAN) and a wide area network (WAN). The host device (or node A) 110 and the one or more second hosts (node B) 120 can be connected with a wire or can be connected with a wireless connection by using radio frequency (RF), infrared (IR) transmission, USB, IEEE1394 and/or other suitable wireless technology.

It can be appreciated that in accordance with an exemplary embodiment, the host device (node A) 110 may be embodied by a printer, a Multi-Function Peripheral (MFP) and other known image forming apparatuses, which prints an image on a printing medium (or a recording medium) such as a sheet of paper based on printing data generated by the one or more second hosts (or node B) 120. In accordance with an exemplary embodiment, the host device (node A) 110 is a Multi-Function Peripheral (MFP), which includes at least a copy function, an image reading function, and a printer function, and forms an image on a sheet based on a print job (print instruction) sent from the one or more second hosts (or node B) 120, image data read by an image reading section, such as a scanner, provided in the host device (or node A) 110, or the like.

In accordance with an embodiment, the one or more second hosts (or node B) 120, which may be embodied by a computer system, and generates the printing data usable in the host device (or node A) 110 and transmits the generated printing data to the host device (or node A) 110. An example of the one or more second hosts (or node B) 120 may include a computer and/or a portable device such as a notebook personal computer, a cellular phone and a personal digital assistant (PDA). The host device (or node A) 110 and the one or more second hosts (or node B) 120 can constitute an image forming system to install a communication port, to generate printing data, and to perform a printing operation of forming an image on a printing medium according to the printing data.

It can be appreciated that the one or more second hosts (or node B) 120 can be a plurality of personal computers, and has the function of sending a print job to the first host device 110 in the form of an image forming apparatus. A printer driver program (hereinafter, sometimes simply referred to as a printer driver) is installed in the second host 120, and the one or more second hosts 120 uses the function of the printer driver to generate a print job including the data of print conditions to be applied at the time of image formation, image data, and the like, and to send the generated print job to the first host device 110 in the form of an image forming apparatus.

In the IPv6 protocol, the generation of an IP address (or IPv6 address) for an image forming device or other apparatus/device is defined in RFC 2462, entitled “IPv6 Stateless Address Autoconfiguration.” The IPv6 stateless autoconfiguration utilizes several features in IPv6, including link-local addresses, multicasting, the Neighbor Discovery (ND) protocol, and the ability to generate the interface identifier of an address from an underlying data link layer address (or MAC ID). It can be appreciated that the IPv6 protocol provides a computer device or image forming apparatus the ability to generate a temporary address until it can determine the characteristics of the network it is on, and then create a permanent address it can use based on that information. In accordance with an exemplary embodiment, the steps a host device or image forming apparatus takes when using stateless autoconfiguration is generally configured to generate a link-local address, which is one of the two types of local-use IPv6 addresses. The link-local addresses has “1111 1110 10” for the first ten bits. The generated address uses those ten bits followed by 54 zeroes and then the 64-bit interface identifier, which will typically be derived from the data link layer (MAC) address.

A Link-Local Address Uniqueness Test (or Double address detection (DAD)) can be used to tests and to ensure that the address it generated is not for some reason already in use on the local network. The device or apparatus sends a Neighbor Solicitation message using the Neighbor Discovery (ND) protocol, and listens for a Neighbor Advertisement in response that indicates that another device is already using its link-local address; if so, either a new address must be generated, or autoconfiguration fails and another method must be employed.

Assuming the uniqueness test passes, the device assigns the link-local address (i.e., Link-Local Address Assignment) to its IP interface. This address can be used for communication on the local network, however, it cannot be used on the wider Internet (or communication network), since link-local addresses are not routed.

The node next attempts to contact a local router for more information on continuing the configuration. This is done either by listening for Router Advertisement messages sent periodically by routers, or by sending a specific Router Solicitation to ask a router for information on what to do next. The router also provides direction to the node on how to proceed with the autoconfiguration. The router can tell the node that on this network “stateful” autoconfiguration is in use, and tell it the address of a DHCP server to use. Alternately, the router will tell the host how to determine its global Internet address.

Assuming that stateless autoconfiguration is in use on the network, the host will configure itself with its globally-unique Internet address. It can be appreciated that this globally-unique address is generally formed from a network prefix provided to the host by the router, combined with the device's identifier as generated in the first step. In addition, when using the protocol stateless addressing (stateless autoconfiguration) for IPv6, which is required by the IPv6 Ready Logo Program, the link-local addresses and global addresses are determined by concatenating an identifier unique to the adapter. Thus, when a MAC address broadcast is sent out, each network interface card on the local area network will see the broadcast address and automatically pass the information up to the upper layers of the OSI model (Open Systems Interconnection model).

FIG. 2 is an illustration of a network stack for a host device (or node) 200 having an application 210 for filtering data packets in accordance with an exemplary embodiment. As shown in FIG. 2, the host device 200 has a software module (or application) 210 and an IP filter (or packet capture filter) 240, which captures (or intercepts) outgoing and incoming data packets having neighbor solicitation and/or neighbor advertisement requests pursuant to the IPv6 protocol. As shown in FIG. 2, the software module 210 is preferably an application level module, which is configured to modify, drop, change, and judge Neighbor Discovery generated packages (i.e., neighbor solicitation or neighbor advertisement packets) as described herein. It can be appreciated that in accordance with an exemplary embodiment, the software module 210 can be part of the printer driver and/or firmware of a host device, such as a personal computer and/or multifunctional printer, a separate software module or application, or part to the operating system of the host device.

In accordance with an exemplary embodiment, the IP filter 240 forwards the incoming or outgoing packet having a neighbor solicitation or neighbor advertisement packet (or package) to the software module 210, which in combination with the socket layer modifies, changes, drops and/or judges the neighbor discovery generated packages as described herein. Each of the host devices (or nodes) preferably includes a software module (or application) 210, which can perform at least a portion and/or more preferably all of the steps necessary to set and/or decrypt the security options as described herein.

The packets (or packages) are preferably broadcast and/or sent out via a communication network (i.e., IPv6 network) 130. In accordance with an exemplary embodiment, the IP filter 240 preferably captures the IPv6 packet before the initial broadcast (i.e., neighbor discovery) and/or alternatively, before the packet is sent to the Network Stack 230 for processing. It can be appreciated that in accordance with an exemplary embodiment, the software module's 210 functionality also can be enabled or disabled at will by a network administrator or other designated individual.

The host device (or node) 200 includes an operating system 220 (OS), which acts as an interface between the device's hardware and application programs, and which is also responsible for the management and coordination of activities and the sharing of the resources within host devices. In accordance with an exemplary embodiment, the software module 210 runs on the operating system 220 of the computer device (or node), and the network layer is under or a part of the operating system 220. It can be appreciated that by utilizing a software module 210 as described herein, the operating system of the host device 200 does not need to be altered or changed in anyway.

Alternatively, it can be appreciated that in accordance with another exemplary embodiment, the operating system (OS) 220 can be configured to perform the methods as described herein. It can be appreciated that the examples as set forth herein are exemplary only, and as such, additional security options, which use IPv6 Neighbor Discovery messages can be implemented without departing from the present invention.

In accordance with an exemplary embodiment, a job is generated on the first node (or node A) having a software module 210, which creates at least one security option for the job, which is broadcast with the neighbor solicitation request (i.e., Neighbor Discovery request). The neighbor solicitation request is sent with the at least one security option from the first node pursuant to IPv6 protocol to a second node (node B). The neighbor solicitation request is received on the second node and is processed by a software module 210 associated with the second node. The software module 210 on the second node in return sends a neighbor advertisement to the first node, which is received by the first node. In accordance with an exemplary embodiment, if a job identifier for the job is obtained, the job is processed by the first node.

In accordance with another exemplary embodiment, when a job is created, either at node A or B (for this example node A will be the initiator and B the receiver) the software module (or application) chooses a private key. The software module (or application) 210 on node A creates at least one neighbor discovery security option, which is broadcast with the Neighbor Discovery request. In accordance with an exemplary embodiment, the neighbor discovery options includes one option containing a public certificate and a second option containing an encrypted job identifier number with an auto generated random number. The software module (or application) 210 on node A starts a neighbor discovery process between node A and node B by sending a neighbor solicitation with the neighbor discover options.

When the neighbor solicitation option is received at node B, a software module (or application) 210 associated with node B obtains the package via an IP filter 240 associated with node B, which is configured (i.e., has criteria) to capture neighbor solicitation messages and direct them to the software module 210. Once the software module 210 obtains the package, the software module 210 chooses a private key to decrypt the second option based on the certificated obtained. The software module 210 associated with node B decrypts the second option to obtain the job id (i.e., job identifier) and uses (i.e., generated for the response) a random number for the response to node A. In accordance with an exemplary embodiment, any packets (or packages) the software module (or application) 210 associate with node B is unable to decrypt are dropped. Otherwise the packet will be modified, and the neighbor discovery option will be stripped (i.e., removed from the packet), and a new checksum will be created and the packet will be accepted.

The software module (or application) 210 associated with node B then creates a neighbor option with an encrypted job identifier (or job id) and a random identifier. The software module 210 associated with node B obtains the package from the IP filer 240 (or “netfilter”) and adds the neighbor option to the packet. When the software module (or application) 210 associated with node A receives the response, the software module 210 decrypts the packet and compares the random number assigned to the packet with the auto generated random number, and if the random number is confirmed (i.e., matches), the job identifier is obtained, and the job is executed.

In accordance with another exemplary embodiment, a copy of a document can be requested and obtained using Neighbor Discovery by sending a neighbor solicitation with at least one security option. For example, the at least one security option can include at least two security options. Initially, the application (or driver) 210 on node A sends the neighbor solicitation (NS) with the at least two security options, one being the certificate for the job. The other option can be encrypted by the certificate private key, and preferably contains the job id (i.e., job identifier) and/or other security parameters. When node B (i.e., a printer) receives the neighbor solicitation, the at least two security options are processed. The neighbor solicitation packet options are stripped, and the packets are accepted or dropped depending on the contents thereof. If the job identifier is obtained, node B (the printer) provides the copy of the document requested for such job identifier (or “job id”) to node A.

It can be appreciated that in accordance with any of the exemplary embodiments, the at least one security option can include any type of security option including, but not limited to key cryptology, digital certificates, encrypted identifiers, and/or timestamps.

FIG. 3 is a flow chart showing another exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security in accordance with an exemplary embodiment. As shown in FIG. 3, the system preferably includes at least two nodes, each having an application filter for sending and receiving packages (or packets) 310. In step 320, the application associated with one of the at least two nodes (i.e., first node) creates a job identifier (or job id) and simultaneously a Neighbor solicitation is sent with at least two security (or extra security) options (e.g., a private key certificate and an encrypted job identifier). In step 330, the Neighbor Solicitation is received by the other of the at least two nodes (i.e., second node), where the application associated with the other node processes the Neighbor Solicitation. In step 340, the first option certificate is used to locate the private key. In step 350, if the certificate is valid, the private key is used to decrypt the information in the second option (or encrypted job identifier). In step 360, the second option contains the job identifier and other security parameters. In step 370, the application associated with the other node, sends a neighbor advertisement with an option, which contains a job identifier and other security parameters, which are encrypted. In step 380, the application on the first node receives the response, and then the job with the specified job identifier in the response is processed.

FIG. 4 is a flow chart showing another exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security 400. As shown in FIG. 4, in step 410, a job is generated on a first node, the first node having a software module, which creates at least one security option for the job. In step 420, the first node sends a neighbor solicitation request with the at least one security option to a second node. In step 430, the second node receives the neighbor solicitation request, the second node having a software module for processing the neighbor solicitation request with the at least one security option. In step 440, the second node sends a neighbor advertisement to the first node. In step 450, the first node receives the neighbor advertisement from the second node to obtain a job identifier for the job. In step 460, if the job identifier for the job is obtained, the job is processed on the first node.

FIG. 5 is a flow chart showing a further exemplary embodiment of an implementation of an application, which uses IPv6 Neighbor Discovery Options for exchange multifunction job security 500. As shown in FIG. 5, in step 510, a job is generated on a first node, the first node having a software module, which creates at least two security options for the job. In accordance with an exemplary embodiment, the at least two security options include a digital certificate and a first encrypted job identifier. In step 520, the neighbor solicitation request with the at least two security options is send to a second node. In step 530, the neighbor solicitation request is received on the second node. In step 540, the second node has a software module, which processes the neighbor solicitation request with the at least two security options by validating the digital certificate and decrypting the first encrypted job identifier. In step 550, a neighbor advertisement with a second encrypted job identifier for the job is sent to the first node. In step 560, the neighbor advertisement from the second node is received and the first node decrypts the second encrypted job identifier to obtain a job identifier for the job. In step 570, if the job identifier for the job is obtained, the job is processed on the first node.

A computer program product comprising a non-transitory computer usable medium having a computer readable code embodied therein for a first node and a second, the computer readable code configured to cause the first and second nodes to executed a process for a software module that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, the process comprising: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.

The non-transitory computer usable medium, of course, may be a magnetic recording medium, a magneto-optic recording medium, or any other recording medium which will be developed in future, all of which can be considered applicable to the present invention in all the same way. Duplicates of such medium including primary and secondary duplicate products and others are considered equivalent to the above medium without doubt. Furthermore, even if an embodiment of the present invention is a combination of software and hardware, it does not deviate from the concept of the invention at all. The present invention may be implemented such that its software part has been written onto a recording medium in advance and will be read as required in operation.

It will be apparent to those skilled in the art that various modifications and variation can be made to the structure of the present invention without departing from the scope or spirit of the invention. In view of the foregoing, it is intended that the present invention cover modifications and variations of this invention provided they fall within the scope of the following claims and their equivalents. 

1. A method that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, the method comprising: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.
 2. The method of claim 1, wherein the at least one security option comprises a digital certificate and a first encrypted job identifier.
 3. The method of claim 2, wherein the software module on the second node validates the digital certificate and decrypts the first encrypted job identifier.
 4. The method of claim 3, wherein the neighbor advertisement includes a second encrypted job identifier for the job, and wherein the software module on the first node decrypts the second encrypted job identifier to obtain the job identifier.
 5. The method of claim 1, further comprising filtering the neighbor solicitation request and the neighbor advertisement with an IP filter associated with each of the nodes.
 6. The method of claim 5, wherein the IP filter directs the neighbor solicitation request and the neighbor advertisement to the software module associated with each of the nodes.
 7. The method of claim 4, wherein the first and second encrypted job identifiers are auto generated random numbers.
 8. The method of claim 2, wherein the step of sending the neighbor advertisement to the first node further comprises encrypting the first encrypted job identifier with a random number.
 9. The method of claim 3, further comprising dropping any neighbor solicitation request in which the second node is unable to decrypt the digital certificate and the encrypted first job identifier.
 10. The method of claim 3, wherein if the software module is able to decrypt the digital certificate and the first encrypted job identifier, stripping the neighbor solicitation request of the at least one security option and creating a new checksum and accepting the neighbor solicitation request from the first node.
 11. The method of claim 1, wherein step of processing the job on the first node comprises providing a copy of the job to the second node.
 12. The method of claim 1, wherein the neighbor solicitation request is Neighbor Discovery request and the neighbor advertisement is a Neighbor Advertisement pursuant to an IPv6 protocol.
 13. A system that facilitates exchange multifunction job security using IPv6 Neighbor Discovery for a first and a second node, the system comprising: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.
 14. The system of claim 13, wherein the at least one security option comprises a digital certificate and a first encrypted job identifier, and the software module on the second node validates the digital certificate and decrypts the first encrypted job identifier, and the neighbor advertisement includes a second encrypted job identifier for the job, and the software module on the first node decrypts the second encrypted job identifier to obtain the job identifier.
 15. The system of claim 14, wherein each of the nodes has an IP filter, which filters the neighbor solicitation request and the neighbor advertisement, and wherein the IP filter directs the neighbor solicitation request and the neighbor advertisement to the software module associated with each of the nodes.
 16. The system of claim 14, wherein the first and second encrypted job identifiers are auto generated random numbers.
 17. The system of claim 16, wherein the step of sending the neighbor advertisement to the first node further comprises encrypting the first encrypted job identifier with a random number.
 18. The system of claim 17, wherein the software module associated with the second node drops any neighbor solicitation request in which the second node is unable to decrypt the digital certificate and the encrypted first job identifier.
 19. The system of claim 14, wherein if the software module is able to decrypt the digital certificate and the first encrypted job identifier, stripping the neighbor solicitation request of the at least one security option and creating a new checksum and accepting the neighbor solicitation request from the first node.
 20. A computer program product comprising a non-transitory computer usable medium having a computer readable code embodied therein for a first node and a second, the computer readable code configured to cause the first and second nodes to executed a process for a software module that facilitates exchange multifunction job security using IPv6 Neighbor Discovery, the process comprising: generating a job on a first node, the first node having a software module, which creates at least one security option for the job; sending a neighbor solicitation request with the at least one security option to a second node; receiving the neighbor solicitation request on the second node, the second node having a software module for processing the neighbor solicitation request with the at least one security option; sending a neighbor advertisement to the first node; receiving the neighbor advertisement from the second node to obtain a job identifier for the job; and if the job identifier for the job is obtained, processing the job on the first node.
 21. The computer program product of claim 20, wherein the at least one security option comprises a digital certificate and a first encrypted job identifier, and the software module on the second node validates the digital certificate and decrypts the first encrypted job identifier, and the neighbor advertisement includes a second encrypted job identifier for the job, and the software module on the first node decrypts the second encrypted job identifier to obtain the job identifier.
 22. The computer program product of claim 21, wherein each of the nodes has an IP filter, which filters the neighbor solicitation request and the neighbor advertisement, and wherein the IP filter directs the neighbor solicitation request and the neighbor advertisement to the software module associated with each of the nodes.
 23. The computer program product of claim 22, wherein the first and second encrypted job identifiers are auto generated random numbers.
 24. The computer program product of claim 23, wherein the step of sending the neighbor advertisement to the first node further comprises encrypting the first encrypted job identifier with a random number.
 25. The computer program product of claim 24, wherein the software module associated with the second node drops any neighbor solicitation request in which the second node is unable to decrypt the digital certificate and the encrypted first job identifier.
 26. The computer program product of claim 25, wherein if the software module is able to decrypt the digital certificate and the first encrypted job identifier, stripping the neighbor solicitation request of the at least one security option and creating a new checksum and accepting the neighbor solicitation request from the first node. 