System and method employing an agile network protocol for secure communications using secure domain names
CAFCFirst Claim
1. A system for connecting a first network device and a second network device, the system including one or more servers configured to:
- intercept, from the first network device, a request to look up an internet protocol (IP) address of the second network device based on an identifier associated with the second network device;
determine, in response to the request, whether the second network device is available for a secure communications service; and
initiate an encrypted communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, whereinthe secure communications service communicates using the encrypted communication link,the first network device is a device at which a user uses the secure communications service to access the encrypted communication link, and;
the one or more servers includes one or more processors.
1 Assignment
1 Petition
Accused Products
Abstract
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link.
289 Citations
28 Claims
-
1. A system for connecting a first network device and a second network device, the system including one or more servers configured to:
-
intercept, from the first network device, a request to look up an internet protocol (IP) address of the second network device based on an identifier associated with the second network device; determine, in response to the request, whether the second network device is available for a secure communications service; and initiate an encrypted communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service communicates using the encrypted communication link, the first network device is a device at which a user uses the secure communications service to access the encrypted communication link, and; the one or more servers includes one or more processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of connecting a first network device and a second network device, the method performed by one or more processors and comprising:
-
intercepting, from the first network device, a request to look up an internet protocol (IP) address of the second network device based on an identifier associated with the second network device; determining, in response to the request, whether the second network device is available for a secure communications service; and initiating an encrypted communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service communicates using the encrypted communication link, and the first network device is a device at which a user uses the secure communications service to access the encrypted communication link. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification