|
|
|
|
||
Re: New Patent Adds May Yield New Actions"The Company’s patent portfolio includes 23 U.S. and 41 international patents and over 100 pending applications." As
listed on the World Intellectual Property Organization (WIPO) web site, this is
a sample of the international patents granted so far this year. The following
lists the document numbers, dates, titles and abstracts.
VirnetX
is doing an outstanding job in documenting the secure communications technology
details in current patents. 1. US application 20130091354 - Publication Date: April 11, 2013
Agile
Network Protocol for Secure Communications with Assured System Availability Abstract:
A plurality of computer nodes communicates using seemingly random IP source and
destination addresses and (optionally) a seemingly random discriminator field.
Data packets matching criteria defined by a moving window of valid addresses
are accepted for further processing, while those that do not meet the criteria
are rejected. In addition to “hopping” of IP addresses and discriminator
fields, hardware addresses such as Media Access Control addresses can be
hopped. The hopped addresses are generated by random number generators having
non-repeating sequence lengths that are easily determined a-priori, which can
quickly jump ahead in sequence by an arbitrary number of random steps and which
have the property that future random numbers are difficult to guess without
knowing the random number generator's parameters. Synchronization techniques
can be used to re-establish synchronization between sending and receiving
nodes. 2. US 20130064241 - Publication Date: March 3, 2013 Agile
Network Protocol for Secure Communications using Secure Domain Names Abstract:
A network device comprises a storage device storing an application program for
a secure communications service, and at least one processor configured to
execute the application program for the secure communications service so as to
enable the network device to send a request to look up a network address of a
second device based on an identifier associated with the second device, receive
an indication that the second device is available for the secure communications
service, the indication including the requested network address and
provisioning information for a secure communication link, connect to the second
device over the secure communication link, using the received network address
of the second device and the provisioning information for the secure communication
link, and communicate at least one of video data and audio data with the second
device using the secure communications service via the secure communication
link. 3. US 20130067087 - Publication Date: March 14, 2013 Third
Party VPN Certification Abstract:
A virtual private network (VPN) over a telecommunications network is created by
sending a request from a first VPN device to a second VPN device for
establishing a VPN between the first and second VPN devices. The request
includes a first signed certificate having a verified VPN parameter for the
first VPN device. A reply is received at the first VPN device from the second
VPN device that includes a second signed certificate having a verified VPN
parameter for the second VPN device. The VPN is established between the first
and second VPN devices based on each verified VPN parameter for each of the
first and second VPN devices. 4. US 20130067103 - Publication Date: March 14, 2013 Agile
Network Protocol for Secure Communications using Secure Domain Names Abstract:
A client device comprises: (a) a memory, (b) an application program, and (c) a
signal processing configuration. The memory is configured and arranged to
facilitate a connection of the client device with a target device over a secure
communication link created based on (i) an address request generated by the
client device, and (ii) a determination as a result of the address request that
the target device is a device with which a secure communication link can be
established when the requested address is identified in an address lookup. The
application program is configured and arranged so as to allow participation in
audio/video communications with the target device over the secure communication
link once the secure communication link is established. The signal processing
configuration is arranged to execute the application program. 5. US 20130067222 - Publication Date: March 14, 2013 Agile
Network Protocol for Secure Communications with Assured System Availability Abstract:
A plurality of computer nodes communicates using seemingly random IP source and
destination addresses and (optionally) a seemingly random discriminator field.
Data packets matching criteria defined by a moving window of valid addresses
are accepted for further processing, while those that do not meet the criteria
are rejected. In addition to “hopping” of IP addresses and discriminator
fields, hardware addresses such as Media Access Control addresses can be
hopped. The hopped addresses are generated by random number generators having
non-repeating sequence lengths that are easily determined a-priori, which can
quickly jump ahead in sequence by an arbitrary number of random steps and which
have the property that future random numbers are difficult to guess without
knowing the random number generator's parameters. Synchronization techniques
can be used to re-establish synchronization between sending and receiving
nodes. 6. WO/2013/009682
International Application No: PCT/US2012/045921
- Publication Date: January 17, 2013 Dynamic
VPN Address Allocation Abstract:
Methods and related systems are presented that relate to automatically avoiding
address conflicts when establishing a secure communications link over a public
network between a local computer, associated with a local network, and a remote
computer, located outside the local network. In order to avoid address
conflict, addresses reserved for use by the local network and addresses
reserved for use by the remote network are determined. At least one local
address is selected from among available local addresses such that the selected
local address is an address that does not conflict with the reserved addresses
of the local network and the reserved addresses of the remote network. The
selected local address is used in connection with establishment of the secure
communications link between the local computer and the remote computer. Best
regards to all. |
return to message board, top of board |