Method for establishing encrypted channel
First Claim
1. A method for accessing a secure computer network address, comprising:
- receiving a secure domain name;
sending a query message to a secure domain name service, the query message requesting from the secure domain name service a secure computer network address corresponding to the secure domain name;
receiving, in response to the query message, the secure computer network address corresponding to the secure domain name and one or more resources provided by the secure domain name service for secure communication;
establishing an encrypted channel based on the one or more resources provided by the secure domain name service;
sending an access request message to the secure computer network address using the encrypted channel; and
communicating at least one of video data or audio data via the encrypted channel;
wherein the secure domain name service receives and evaluates the query message to determine whether the target computer is configured for communicating over the encrypted channel, and further resolves the query into the secure computer network address.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
-
Citations
31 Claims
-
1. A method for accessing a secure computer network address, comprising:
-
receiving a secure domain name; sending a query message to a secure domain name service, the query message requesting from the secure domain name service a secure computer network address corresponding to the secure domain name; receiving, in response to the query message, the secure computer network address corresponding to the secure domain name and one or more resources provided by the secure domain name service for secure communication; establishing an encrypted channel based on the one or more resources provided by the secure domain name service; sending an access request message to the secure computer network address using the encrypted channel; and communicating at least one of video data or audio data via the encrypted channel; wherein the secure domain name service receives and evaluates the query message to determine whether the target computer is configured for communicating over the encrypted channel, and further resolves the query into the secure computer network address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium having software instructions for accessing a secure computer network address stored thereon that when executed cause a system to:
-
receive a secure domain name; send a query message to a secure domain name service, the query message requesting from the secure domain name service a secure computer network address corresponding to the secure domain name; receive, in response to the query message, the secure computer network address corresponding to the secure domain name and resources provided by the secure domain name service for secure communication; establish an encrypted channel based on the resources provided by the secure domain name service; send an access request message to the secure computer network address using the encrypted channel; and communicate at least one of video data or audio data via the encrypted channel; wherein the secure domain name service receives and evaluates the query to determine whether the target computer is configured for communicating over the encrypted channel, and further resolves the query into the secure computer network address. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification