Agile network protocol for secure video communications with assured system availability
First Claim
1. A system for connecting devices over a network, the system comprising:
- a memory storing instructions; and
one or more processors configured to execute the instructions to;
receive a request from a first device for a network address associated with a second device, wherein the request includes a name associated with the second device, and further wherein the second device is associated with a first predetermined name and a second predetermined name;
analyze the name included in the request;
if, based on the analysis of the name, the name included in the request is the first predetermined name, resolve the first predetermined name into a first network address associated with the second device, wherein the first network address is used for encrypted communications with the second device, and provide the first device with one or more resources used for communicating with the second device over a communication link that uses encryption; and
if, based on the analysis of the name, the name included in the request is the second predetermined name, resolve the second predetermined name into a second network address associated with the second device,wherein the communication link goes through one or more intermediate devices that provide anonymity of at least one of the first device and the second device by receiving packets communicated between the first device and the second device over the communication link, translating one or more network addresses contained in the received packets, and transmitting packets containing the translated one or more network addresses.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for video conferencing over a secure communication link is disclosed. In various implementations, the system is configured connect to a communication network, store a plurality of network addresses of devices of registered users, each device of a registered user having an application program for conducting video conferencing between, the client device and the target device, and establish a secure communication link between the client device and the target device. The secure communication link is established in response to a query (a) generated by the client device and (b) including an identifier associated with a network address of the target device, the establishment of the secure communication link being based on a determination that the target device can accept a secure communication link connection with the client device. Video conferencing is conducted over the secure communication link connection between the client device and the target device.
308 Citations
50 Claims
-
1. A system for connecting devices over a network, the system comprising:
-
a memory storing instructions; and one or more processors configured to execute the instructions to; receive a request from a first device for a network address associated with a second device, wherein the request includes a name associated with the second device, and further wherein the second device is associated with a first predetermined name and a second predetermined name; analyze the name included in the request; if, based on the analysis of the name, the name included in the request is the first predetermined name, resolve the first predetermined name into a first network address associated with the second device, wherein the first network address is used for encrypted communications with the second device, and provide the first device with one or more resources used for communicating with the second device over a communication link that uses encryption; and if, based on the analysis of the name, the name included in the request is the second predetermined name, resolve the second predetermined name into a second network address associated with the second device, wherein the communication link goes through one or more intermediate devices that provide anonymity of at least one of the first device and the second device by receiving packets communicated between the first device and the second device over the communication link, translating one or more network addresses contained in the received packets, and transmitting packets containing the translated one or more network addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for connecting devices over a network, the method comprising:
-
receiving a request from a first device for a network address associated with a second device, wherein the request includes a name associated with the second device, and further wherein the second device is associated with a first predetermined name and a second predetermined name; analyzing the name included in the request; if, based on the analysis of the name, the name included in the request is the first predetermined name, resolving the first predetermined name into a first network address associated with the second device, wherein the first network address is used for encrypted communications with the second device, and provide the first device with one or more resources used for communicating with the second device over a communication link that uses encryption; and if, based on the analysis of the name, the name included in the request is the second predetermined name, resolving the second predetermined name into a second network address associated with the second device, wherein the communication link goes through one or more intermediate devices that provide anonymity of at least one of the first device and the second device by receiving packets communicated between the first device and the second device over the communication link, translating one or more network addresses contained in the received packets, and transmitting packets containing the translated one or more network addresses. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A system for connecting devices over a network, the system comprising:
-
a memory storing instructions; and one or more processors configured to execute the instructions to; receive a request from a first device for a network address associated with a second device, wherein the request includes a name associated with the second device, and further wherein the second device is associated with a first predetermined name and a second predetermined name; analyze the name included in the request; if, based on the analysis of the name, the name included in the request is the first predetermined name, resolve the first predetermined name into a first network address associated with the second device, wherein the first network address is used for encrypted communications with the second device, and provide the first device with one or more resources used for communicating with the second device over a communication link that uses encryption; and if, based on the analysis of the name, the name included in the request is the second predetermined name, resolve the second predetermined name into a second network address associated with the second device, wherein the communication link goes through one or more intermediate devices that provide anonymity of at least one of the first device and the second device by receiving packets communicated between the first device and the second device over the communication link, translating one or more network addresses contained in the received packets, and transmitting packets containing the translated one or more network addresses. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50)
-
Specification