Method for establishing secure communication link between computers of virtual private network
DC CAFCFirst Claim
1. A method of accessing a secure network address, comprising:
- sending a query message from a first network device to a secure domain service, the query message requesting from the secure domain service a secure network address for a second network device;
receiving at the first network device a response message from the secure domain name service containing the secure network address for the second network device; and
sending an access request message from the first network device to the secure network address using a virtual private network communication link.
3 Assignments
Litigations
4 Petitions
Accused Products
Abstract
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
159 Citations
18 Claims
-
1. A method of accessing a secure network address, comprising:
-
sending a query message from a first network device to a secure domain service, the query message requesting from the secure domain service a secure network address for a second network device; receiving at the first network device a response message from the secure domain name service containing the secure network address for the second network device; and sending an access request message from the first network device to the secure network address using a virtual private network communication link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification