Abstract:
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
Abstract:
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link.
Abstract:
A device and method for establishing a connection between devices is disclosed. A first device receives a request to connect to a second network device and, based on the request, a determination is made as to whether the first device is set to a first communication mode or a second communication mode. If the first device is set to the first communication mode then a first name associated with the second device is sent to a first name service, the first name service supporting establishing an encrypted connection to the second device, a resource for the encrypted connection to the second device is received at the first device, and communication with the second device is established over the network via the encrypted connection using the received resource. If the first device is set to the second communication mode then communication with the second device is established via a second connection.
Abstract:
A network device stores an application program for a secure communications service and has processor configured to execute the application program. The execution causes the processor to send a request to look up an internet protocol (IP) address of a second network device based on an identifier associated with the second network device, to receive, following a determination by a name service that the second network device is available for the secure communications service, the determination by the name service being based on the identifier in the request: (1) an indication that the second network device is available for the secure communications service, (2) the requested IP address of the second network device, and (3) provisioning information for an encrypted communication link. The execution further enables the processor to connect to the second network device and to communicate data with the second network via the encrypted communication link. The network device is a device at which a user uses the secure communications service to access the encrypted communication link.
Abstract:
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
Abstract:
A network device comprises a storage device storing an application program for a secure communications service; and at least one processor configured to execute the application program enabling the network device to: (a) send a request to look up a network address of a second network device based on an identifier; (b) receive an indication that the second network device is available for the secure communications service, the indication including the requested network address of the second network device and provisioning information for a secure communication link; (c) connect to the second network device over the secure communication link, using the received network address of the second network device and the provisioning information for the secure communication link; and (d) communicate at least one of video data and audio data with the second network device using the secure communications service via the secure communication link.
Abstract:
A network device comprises a storage device storing an application program for a secure communications service, and at least one processor configured to execute the application program for the secure communications service so as to enable the network device to send a request to look up a network address of a second device based on an identifier associated with the second device, receive an indication that the second device is available for the secure communications service, the indication including the requested network address and provisioning information for a secure communication link, connect to the second device over the secure communication link, using the received network address of the second device and the provisioning information for the secure communication link, and communicate at least one of video data and audio data with the second device using the secure communications service via the secure communication link.
Abstract:
A method of establishing a secure communication link includes receiving, at a domain name server (DNS), a request to communicate securely, the request including an identifier of a client device and having been sent in response to a determination that a DNS request from the client device corresponds to a first computer configured to communicate securely. The method includes sending a second request to a server computer. In response to second request, the server computer compares the received client device identifier to one or more stored client device identifiers to determine a security level of the client device and determines a security level of the first computer. The sever computer determines, based on a comparison of the security level of the client device and the security level of the first computer, whether the client device is authorized to communicate with the first computer, and generates a resource used to establish the secure communication link between the client device and the first computer. The server computer generates a message in response to determining that the client device is not authorized to communicate with the first compute. The server computer, in response to determining that the client device is authorized to communicate with the first computer, makes the resource available to the client device to automatically establish the secure communication link.
Abstract:
A method performed by a first network device for communicating over a network, the method includes receiving, at the first network device, a request to connect to a second network device. The method includes, based on the request to connect, determining whether the first network device is set to an encrypted communication mode. The method further includes, based on a determination that the first network device is set to the encrypted communication mode, sending, to a first name service, a first name associated with the second network device and for which the first name service supports establishing an encrypted connection to the second network device. The method further includes receiving, at the first network device, a resource for the encrypted connection to the second network device, wherein the resource indicates a quality of service level for the encrypted connection determined by the first name service, and communicating with the second network device over the network via the encrypted connection using the received resource indicating the determined service level for the encrypted connection.
Abstract:
Systems and methods for connecting a first network device and a second network device over a communication network are disclosed. An exemplary method includes receiving, from the first network device, a request to look up a network address of the second network and evaluating the request to determine whether an identifier associated with the second network device is registered with a name service that facilitates resolving the identifier and further facilitates establishing direct encrypted communication links. It is determined whether the second network device is available to communicate through a direct encrypted communication link facilitated by the name service, the establishment of the direct encrypted communication link between the first network device and the second network device is facilitated. This includes provisioning the first network device or the second network device with one or more resources for the direct encrypted communication link. The established direct encrypted communication link carries encrypted data communicated between the first network device and the second network device, and the first network device is a user device.