Secure login credentials for substantially anonymous users
First Claim
Patent Images
1. A method comprising:
- establishing a first connection with a server;
receiving over the first connection a login credential for the server, generated by the server without the use of any information identifying a computer user; and
establishing a second secure connection with the server using a secure protocol and the login credential provided by the server.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for secure communications. The techniques feature receiving over the first connection a login credential for the server, generated by the server without the use of any information identifying a computer user. The techniques further feature establishing a second secure connection with the server using a secure protocol and the login credential provided by the server.
-
Citations
26 Claims
-
1. A method comprising:
-
establishing a first connection with a server;
receiving over the first connection a login credential for the server, generated by the server without the use of any information identifying a computer user; and
establishing a second secure connection with the server using a secure protocol and the login credential provided by the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving a first request from a client to establish a first secure connection with the client;
establishing the first secure connection with the client;
transmitting to the client over the first secure connection a login credential, generated without reference to any client identifying information;
receiving a second request from the client to establish a second secure connection with the client; and
establishing a second secure connection with the client. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
means for establishing a first connection with a server;
means for receiving over the first connection a login credential for the server, generated by the server without the use of any information identifying a computer user; and
means for establishing a second secure connection with the server using a secure protocol and the login credential provided by the server. - View Dependent Claims (23, 24)
-
-
25. A method comprising:
-
receiving in a user computer a certificate from a virtual private network (VPN) server;
establishing a first secure connection with the VPN server using a Transport Layer Security (TLS) protocol based on the certificate provided by the VPN server;
receiving over the first secure connection from the VPN server a username and password to login to the VPN server, the username and password having been generated by the VPN server and without any identifying information provided to the VPN server;
calculating a secret encryption key based on the username and password;
establishing a second secure connection with the VPN server using a Point-to-Point Tunneling Protocol (PPTP) tunnel based on the username and password and the secret encryption key; and
logging in to the VPN server over the second secure connection using the username and password.
-
-
26. A method comprising:
-
establishing a first secure connection with a user computer using a Transport Layer Security (TLS) protocol;
sending over the first secure connection to the user computer a username and password, without use of any identifying information identifying a computer user;
receiving a login request containing the username and password from the user; and
establishing a second secure connection with the user using a Point-to-Point Tunneling Protocol (PPTP) tunnel based on the username and password.
-
Specification