Virtual private network for real-time data
First Claim
1. A method for protecting real-time data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network, including:
- establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using a key-based encryption algorithm to protect data exchanged therethrough;
establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using a key-based encryption algorithm to protect data exchanged therethrough;
exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection;
providing key information for the second VPN connection to at least one of the mobile electronic device or VPN gateway through the first VPN connection, wherein undated key information for the second VPN connection is provided through the first VPN connection at intervals while the second VPN connection is established.
4 Assignments
0 Petitions
Accused Products
Abstract
Protection of real-time data such as voice data exchanged as packets between a mobile electronic device (10) and a VPN gateway (122) during a media session over a communications link (130) that includes a wireless network (132). A first VPN connection (136) is established between the mobile electronic device (10) and the VPN gateway (122) through the communications link (130), the first VPN connection (136) using key-based encryption to protect data exchanged therethrough. While the first VPN connection (136) is established, a second VPN connection (138) is established between the mobile electronic device (10) and the VPN gateway (122) through the communications link (130), the second VPN connection (138) using key-based encryption to protect data exchanged therethrough. Real-time data packets are exchanged between the mobile electronic device (10) and the VPN gateway (122) through the second VPN connection (138).
22 Citations
15 Claims
-
1. A method for protecting real-time data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network, including:
-
establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using a key-based encryption algorithm to protect data exchanged therethrough; establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using a key-based encryption algorithm to protect data exchanged therethrough; exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection; providing key information for the second VPN connection to at least one of the mobile electronic device or VPN gateway through the first VPN connection, wherein undated key information for the second VPN connection is provided through the first VPN connection at intervals while the second VPN connection is established. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile electronic device for engaging in a media session in which real-time data packets are exchanged with a remote location, the mobile device comprising:
-
a wireless communications subsystem for exchanging data packets with the remote location through a communications link that includes a wireless network; a processor for controlling the communications subsystem; and a VPN module associated with the processor for establishing co-existing first and second VPN connections through the communications link between the mobile electronic device and the remote location and exchanging there-between real-time data through the second VPN connection, wherein the VPN module is configured for generating encryption key information for the second VPN connection and for sending the generated encryption key information through the first VPN connection to the remote location, wherein the VPN module is configured for generating and sending up-dated encryption key information for the second VPN connection at intervals while the second VPN connection is established. - View Dependent Claims (10, 11)
-
- 12. A VPN gateway for exchanging real-time data packets with a remote device over a communications link, the gateway having means for establishing co-existing first and second VPN connections through the communications link between the VPN gateway and the remote device location and exchanging there-between real-time data through the second VPN connection, wherein the gateway is configured for generating encryption key information for the second VPN connection and for sending the generated encryption key information through the first VPN connection to the remote location, wherein the gateway is configured for generating and sending up-dated encryption key information for the second VPN connection at intervals while the second VPN connection is established.
Specification