Method for establishing secure communication link between computers of virtual private network
First Claim
1. A method of transparently establishing an encrypted communication link with a remote network device, the method comprising:
- from a user network device;
sending a query message to a domain name service to resolve a domain name; and
automatically initiating the encrypted communication link between the user network device and the remote network device based on;
an evaluation of the query message to resolve the domain name to determine that the domain name is a secure domain name, anda determination, based on a comparison between an identifier associated with the user network device and one or more user network device identifiers, that the user network device is authorized to connect to the remote network device via the encrypted communication link.
3 Assignments
0 Petitions
Accused Products
Abstract
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
-
Citations
42 Claims
-
1. A method of transparently establishing an encrypted communication link with a remote network device, the method comprising:
from a user network device; sending a query message to a domain name service to resolve a domain name; and automatically initiating the encrypted communication link between the user network device and the remote network device based on; an evaluation of the query message to resolve the domain name to determine that the domain name is a secure domain name, and a determination, based on a comparison between an identifier associated with the user network device and one or more user network device identifiers, that the user network device is authorized to connect to the remote network device via the encrypted communication link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A non-transitory machine-readable medium storing machine-readable instructions for performing a method for transparently establishing an encrypted communication link with a remote network device, the method comprising:
-
sending a query message to a domain name service to resolve a domain name; and automatically initiating the encrypted communication link between the user network device and the remote network device based on; an evaluation of the query to resolve the domain name to determine that the domain name is a secure domain name, and a determination, based on a comparison between an identifier associated with the user network device and one or more user network device identifiers, that the user network device is authorized to connect to the remote network device via the encrypted communication link. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A network device configured to transparently establish an encrypted communication link with a remote network device, the network device including a memory storing instructions and a processor configured to execute the instructions to:
-
send a query message to a domain name service to resolve a domain name; and automatically initiate the encrypted communication link between the user network device and the remote network device based on; an evaluation of the query to resolve the domain name to determine that the domain name is a secure domain name, and a determination, based on a comparison between an identifier associated with the user network device and one or more user network device identifiers, that the user network device is authorized to connect to the remote network device via the encrypted communication link. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification