Agile network protocol for secure communications using secure domain names
First Claim
1. A first network device configured to connect to a second network device over a network, comprising:
- a storage device storing an application program for a secure communications service; and
at least one processor configured to execute the application program for the secure communications service so as to cause the first network device to;
send a request to look up a network address of the second network device based on an identifier associated with the second network device;
receive, in response to the request, the network address of the second network device;
receive provisioning information for a communication link that uses encryption to protect data in response to a name service (i) receiving the request to look up the network address and (ii) evaluating the request to look up the network address to determine that the identifier associated with the second network device is registered with the name service and to determine that the second network device is enabled for the communication link, wherein the name service facilitates resolving identifiers associated with network devices and facilitates establishing communication links that use encryption to protect data;
connect to the second network device over the network via the communication link, using the received network address of the second network device and the provisioning information for the communication link; and
communicate data with the second network device using the secure communications service via the communication link, wherein the communicated data is encrypted over at least a portion of the communication link, the first network device is a user device, and the communication link enables the first network device to directly communicate with the second network device over the network.
2 Assignments
0 Petitions
Accused Products
Abstract
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute the application program for the secure communications service so as to enable the network device to send a request to look up a network address of a second device based on an identifier associated with the second device, receive an indication that the second device is available for the secure communications service, the indication including the requested network address and provisioning information for a secure communication link, connect to the second device over the secure communication link, using the received network address of the second device and the provisioning information for the secure communication link, and communicate at least one of video data and audio data with the second device using the secure communications service via the secure communication link.
310 Citations
26 Claims
-
1. A first network device configured to connect to a second network device over a network, comprising:
-
a storage device storing an application program for a secure communications service; and at least one processor configured to execute the application program for the secure communications service so as to cause the first network device to; send a request to look up a network address of the second network device based on an identifier associated with the second network device; receive, in response to the request, the network address of the second network device; receive provisioning information for a communication link that uses encryption to protect data in response to a name service (i) receiving the request to look up the network address and (ii) evaluating the request to look up the network address to determine that the identifier associated with the second network device is registered with the name service and to determine that the second network device is enabled for the communication link, wherein the name service facilitates resolving identifiers associated with network devices and facilitates establishing communication links that use encryption to protect data; connect to the second network device over the network via the communication link, using the received network address of the second network device and the provisioning information for the communication link; and communicate data with the second network device using the secure communications service via the communication link, wherein the communicated data is encrypted over at least a portion of the communication link, the first network device is a user device, and the communication link enables the first network device to directly communicate with the second network device over the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method executed by a first network device for communicating with a second network device over a network, the method comprising:
-
executing an application program for a secure communication service; sending a request to look up a network address of a second network device based on an identifier associated with the second network device; receiving, in response to the request, the network address of the second network device; receiving provisioning information for a communication link that uses encryption to protect data in response to a name service (i) receiving the request to look up the network address and (ii) evaluating the request to look up the network address to determine that the identifier associated with the second network device is registered with the name service and to determine that the second network device is enabled for the communication link, wherein the name service facilitates resolving identifiers associated with network devices and facilitates establishing communication links that use encryption to protect data; connecting to the second network device over the network via the communication link, using the received network address of the second network device and the provisioning information for the communication link; and communicating data with the second network device using the secure communications service via the communication link, wherein the communicated data is encrypted over at least a portion of the communication link, the first network device is a user device, and the communication link enables the first network device to directly communicate with the second network device over the network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification