Overlay networks for application groups
First Claim
Patent Images
1. A computer-implemented method, comprising:
- detecting, at a computing device, a communication to a network location via a first communications channel, the network location associated with an encryption configuration for communications from the computing device to the network location;
determining at least in part on whether the network location is at a different computing device from the computing device, that the communication is to be encrypted;
generating an encrypted communication by encrypting the communication according to the encryption configuration of the network location; and
routing the encrypted communication via a different second communications channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication to a network location is detected at a computing device. The communication to the network location is encrypted dependent at least in part on whether the network location is at a different computing device from the computing device.
11 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
detecting, at a computing device, a communication to a network location via a first communications channel, the network location associated with an encryption configuration for communications from the computing device to the network location; determining at least in part on whether the network location is at a different computing device from the computing device, that the communication is to be encrypted; generating an encrypted communication by encrypting the communication according to the encryption configuration of the network location; and routing the encrypted communication via a different second communications channel. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
memory to store computer-executable instructions, which, if performed by one or more processors, cause the system to at least; detect, at a computing device, a communication to a network location associated with an encryption configuration for communications from the computing device to the network location; select a communications channel based at least in part on whether the network location is at a different computing device from the computing device; generate an encrypted communication by encrypting the communication according to the encryption configuration of the network location; and route the encrypted communication via the communications channel. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable storage medium that stores executable instructions, which, if executed by one or more processors of a computer system, cause the computer system to at least:
-
detect, at a computing device, a communication to a network location associated with an encryption configuration for communications from the computing device to the network location; select a communications channel based at least in part on whether the network location is at a different computing device from the computing device; and route the communication via the communications channel. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification