Agile network protocol for secure communications with assured system availability
First Claim
1. A method for establishing an encrypted channel between a client and a target computer, comprising the steps of:
- (i) intercepting a DNS request sent by the client; and
(ii) based on the DNS request, establishing the encrypted channel between the client and the target.
4 Assignments
0 Petitions
Accused Products
Abstract
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.
228 Citations
20 Claims
-
1. A method for establishing an encrypted channel between a client and a target computer, comprising the steps of:
-
(i) intercepting a DNS request sent by the client; and
(ii) based on the DNS request, establishing the encrypted channel between the client and the target. - View Dependent Claims (2, 3, 4, 5, 6)
-
- 7. A method for establishing an encrypted channel between a client and a secure host, comprising the step of automatically creating the encrypted channel upon intercepting a DNS request for a domain name comprising a predetermined domain name extension.
- 9. A method for establishing an encrypted channel between a client and a secure host, comprising the step of automatically creating the encrypted channel in response to detecting a request for access to a predetermined IP address.
-
11. A data processing device, comprising memory storing a domain name server (DNS) proxy module that intercepts DNS requests sent by a client and, for each intercepted DNS request, performs the steps of:
-
(i) determining whether the intercepted DNS request corresponds to a secure server;
(ii) when the intercepted DNS request does not correspond to a secure server, forwarding the DNS request to a DNS function that returns an IP address of a nonsecure computer; and
(iii) when the intercepted DNS request corresponds to a secure server, automatically initiating an encrypted channel between the client and the secure server. - View Dependent Claims (12, 13, 14)
-
-
15. A data processing device, comprising memory storing a domain name server (DNS) proxy module that intercepts DNS requests sent by a client and, for each intercepted DNS request, when the intercepted DNS request corresponds to a secure server, determines whether the client is authorized to access the secure server and, if so, automatically initiates an encrypted channel between the client and the secure server.
-
16. A computer readable medium storing a domain name server (DNS) proxy module comprised of computer readable instructions that, when executed, cause a data processing device to perform the steps of:
-
(i) intercepting a DNS request sent by a client;
(ii) determining whether the intercepted DNS request corresponds to a secure server;
(iii) when the intercepted DNS request does not correspond to a secure server, forwarding the DNS request to a DNS function that returns an IP address of a nonsecure computer; and
(iv) when the intercepted DNS request corresponds to a secure server, automatically initiating an encrypted channel between the client and the secure server. - View Dependent Claims (17, 18, 19)
-
-
20. A computer readable medium comprising computer readable instructions that, when executed, cause a domain name server (DNS) proxy module to intercept DNS requests sent by a client and, for each intercepted DNS request, when the intercepted DNS request corresponds to a secure server, determines whether the client is authorized to access the secure server and, if so, automatically initiates an encrypted channel between the client and the secure server.
Specification