VIRTUAL PRIVATE NETWORK FOR REAL-TIME DATA
First Claim
1. A method for protecting real-time data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network, the method comprising:
- establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using a first key-based encryption algorithm to protect data exchanged therethrough;
establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using a second key-based encryption algorithm to protect data exchanged therethrough, wherein the second algorithm comprises a lower-bit encryption algorithm than the first algorithm; and
exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection.
4 Assignments
0 Petitions
Accused Products
Abstract
Protection of real-time data such as voice data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network. A first VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using key-based encryption to protect data exchanged therethrough. While the first VPN connection is established, a second VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using key-based encryption to protect data exchanged therethrough. Real-time data packets are exchanged between the mobile electronic device and the VPN gateway through the second VPN connection.
31 Citations
17 Claims
-
1. A method for protecting real-time data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network, the method comprising:
-
establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using a first key-based encryption algorithm to protect data exchanged therethrough; establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using a second key-based encryption algorithm to protect data exchanged therethrough, wherein the second algorithm comprises a lower-bit encryption algorithm than the first algorithm; and exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile electronic device for engaging in a media session in which real-time data packets are exchanged with a remote location, the mobile device comprising:
-
a wireless communications subsystem for exchanging data packets with the remote location through a communications link that includes a wireless network; a processor for controlling the communications subsystem; and a VPN module associated with the processor for establishing co-existing first and second VPN connections through the communications link between the mobile electronic device and the remote location and exchanging there-between real-time data through the second VPN connection protected by a less resource-intensive encryption algorithm than the data sent through the first VPN connection. - View Dependent Claims (10, 11, 12)
-
- 13. A VPN gateway for exchanging real-time data packets with a remote device over a communications link, the gateway having means for establishing co-existing first and second VPN connections through the communications link between the VPN gateway and the remote device location and exchanging therebetween real-time data through the second VPN connection protected by a less resource-intensive encryption algorithm than the data sent through the first VPN connection.
Specification