×

Methods for internet communication security

  • US 10,375,019 B2
  • Filed: 10/05/2018
  • Issued: 08/06/2019
  • Est. Priority Date: 10/06/2017
  • Status: Active Grant
First Claim
Patent Images

1. A product for securing communications of a plurality of networked computing devices, the product comprising a non-transitory computer-readable storage medium having computer-readable program code embodied therein, the computer-readable program code executable by a first computing device to perform communication management operations, the communication management operations comprising:

  • i) consuming a first network packet to obtain an application layer first payload and a first port number, the first port number assigned to a transport layer first port for an end-user application program on a second computing device;

    ii) decrypting an encrypted read-only first file and identifying a data record in the first file that contains the first port number in a first port number field of the identified data record in the first file, the first file stored locally on the first computing device;

    iii) confirming the application layer first payload conforms to one or more formatting requirements named in the identified data record in the first file;

    iv) negotiating an encrypted TCP connection with a network security software running on the second computing device, the encrypted TCP connection dedicated exclusively to routing communications that are a) directed to and/or originating from the transport layer first port, and b) formatted according to the named formatting requirements;

    v) forming a second network packet, comprising;

    inserting into an application layer portion of the second network packet;

    a) at least a portion of the application layer first payload, b) a nonpublic identifier that is unique to the program code executable by the first computing device, c) a nonpublic user-identifier for a process owner running the program code executable by the first computing device, and d) an identifier for the one or more formatting requirements; and

    vi) sending the second network packet to the network security software via the encrypted TCP connection.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×