09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable communication software for providing access to
the Internet; downloadable communications software for
connecting users with Internet sites; downloadable computer
application software for mobile phones for ensuring user
security and privacy; downloadable computer software for
controlling and managing access server applications;
downloadable computer software for encryption; downloadable
computer software for use in the safeguarding of digital
files, including audio, video, text, binary, still images,
graphics and multimedia files; downloadable software in the
nature of a mobile application for ensuring user security
and privacy; downloadable network access server operating
software; downloadable VPN (virtual private network)
operating software. Providing temporary use of non-downloadable web applications
for use in ensuring security and privacy, the safeguarding
of digital files, and controlling and managing access server
applications; software as a service (SaaS) services
featuring software for use in ensuring security and privacy,
the safeguarding of digital files, and controlling and
managing access server applications; providing online
non-downloadable security and privacy software for use in
managing access to data, devices and networks, preventing
unauthorized access to data, devices and networks, securing
data, protecting online anonymity, and protecting data,
devices and networks against spam and malicious activity.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software Providing virtual private network (VPN) services Providing temporary use of non-downloadable web applications for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Software as a service (SaaS) services featuring software for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Providing online non-downloadable security and privacy software for use in managing access to data, devices and networks, preventing unauthorized access to data, devices and networks, securing data, protecting online anonymity, and protecting data, devices and networks against spam and malicious activity
A client node (CN) requests content from an access node (AN). Rule set ACR_CN is provided to CN and AN and ACR_AN is used by AN. A request sent by CN in violation of ACR_CN may be blocked and cause AN to block subsequent requests from CN that would be allowed per ACR_CN. A request blocked according to ACR_AN but not ACR_CN is blocked but subsequent requests may still be allowed according to ACR_CN and ACR_AN. Authenticated distribution of the ACR_CN and ACR_AN may be performed in cooperation with a controller using authenticated tokens (AT).
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
A client node (CN) requests content from an access node (AN). Rule set ACR_CN is provided to CN and AN and ACR_AN is used by AN. A request sent by CN in violation of ACR_CN may be blocked and cause AN to block subsequent requests from CN that would be allowed per ACR_CN. A request blocked according to ACR_AN but not ACR_CN is blocked but subsequent requests may still be allowed according to ACR_CN and ACR_AN. Authenticated distribution of the ACR_CN and ACR_AN may be performed in cooperation with a controller using authenticated tokens (AT).
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Anti-spyware software; communication software for providing
access to the internet; communications software for
connecting users with internet sites; computer application
software for mobile phones for ensuring user security and
privacy; computer software for controlling and managing
access server applications; computer software for
encryption; computer software for use in the safeguarding of
digital files, including audio, video, text, binary, still
images, graphics and multimedia files; downloadable software
in the nature of a mobile application for ensuring user
security and privacy; network access server operating
software; VPN (virtual private network) operating software;
downloadable computer application software for mobile
phones, namely, software for detecting and blocking trackers
and malicious websites known to host malware, viruses, and
other online threats; downloadable computer software for
detecting and blocking trackers and malicious websites known
to host malware, viruses, and other online threats. Providing virtual private network (VPN) services. Providing temporary use of non-downloadable web applications
for use in ensuring security and privacy, the safeguarding
of digital files, and controlling and managing access server
applications; software as a service (SaaS) services
featuring software for use in ensuring security and privacy,
the safeguarding of digital files, and controlling and
managing access server applications; providing computer
security-related services for others; providing security and
privacy services for others.
6.
Private exchange of encrypted data over a computer network
A handshake message includes a field containing random data that is filled with data used to derive keying material on the source and destination computers. The data may be elliptic curve data and may include a representation of the data used by the destination computer to verify that elliptic curve data is present. The data may additionally include data for deriving second keying material on a second destination computer that the first destination computer forwards to the second computer, receives a response, and returns data from the response as part of its own handshake message.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable anti-spyware software; downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; Computer software for use in the safeguarding of digital audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software; downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats. (1) Providing virtual private network (VPN) services.
(2) Providing temporary use of non-downloadable web application software for use in ensuring user security and privacy, safeguarding digital audio, video, text, still images, graphics and multimedia files, and controlling and managing access server applications; software as a service (SaaS) services featuring software for use in ensuring user security and privacy, safeguarding of digital, audio, video, text, still images, graphics and multimedia files, and controlling and managing network access server applications; providing online non-downloadable security and privacy software for use in managing access to data, devices and networks, preventing unauthorized access to data, devices and networks, securing data, protecting online anonymity, and protecting data, devices and networks against spam and malicious activity; providing online non-downloadable anti-spyware software.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software Providing virtual private network (VPN) services Providing temporary use of non-downloadable web applications for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Software as a service (SaaS) services featuring software for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Providing online non-downloadable security and privacy software for use in managing access to data, devices and networks, preventing unauthorized access to data, devices and networks, securing data, protecting online anonymity, and protecting data, devices and networks against spam and malicious activity
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable anti-spyware software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats Providing online non-downloadable anti-spyware software
10.
System and method for improving an aggregated throughput of simultaneous connections
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 12/891 - Flow control of aggregated links or flows
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 1/18 - Automatic repetition systems, e.g. Van Duuren systems
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 12/807 - Calculation or update of the congestion window
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
11.
Local interception of traffic to a remote forward proxy
An application using a VPN is programmed to transmit proxy traffic to a remote proxy server. Traffic to the proxy server is intercepted, shifted to user space, and processed according to one or more options. Traffic may be terminated by a local proxy that resolves domain names in traffic and requests referenced content. Intercepted traffic may include plain text data in headers that is encrypted before forwarding to a different proxy server. Traffic may be evaluated, such as a User Agent string in order to determine routing choices, such as blocking, throttling, local termination, transmitting through a VPN, or other options. Multiple VPNs may operate on the same user computer and proxy traffic may be intercepted and processed by transmitting it through a VPN, bypassing all VPNs, or routing through a different VPN.
An application using a VPN is programmed to transmit proxy traffic to a remote proxy server. Traffic to the proxy server is intercepted, shifted to user space, and processed according to one or more options. Traffic may be terminated by a local proxy that resolves domain names in traffic and requests referenced content. Intercepted traffic may include plain text data in headers that is encrypted before forwarding to a different proxy server. Traffic may be evaluated, such as a User Agent string in order to determine routing choices, such as blocking, throttling, local termination, transmitting through a VPN, or other options. Multiple VPNs may operate on the same user computer and proxy traffic may be intercepted and processed by transmitting it through a VPN, bypassing all VPNs, or routing through a different VPN.
An application using a virtual private network (VPN) is programmed to transmit proxy traffic to a remote proxy server. Traffic to the proxy server is intercepted, shifted to user space, and processed according to one or more options. Traffic may be terminated by a local proxy that resolves domain names in traffic and requests referenced content. Intercepted traffic may include plain text data in headers that is encrypted before forwarding to a different proxy server. Traffic may be evaluated, such as a User Agent string in order to determine routing choices, such as blocking, throttling, local termination, transmitting through a VPN, or other options. Multiple VPNs may operate on the same user computer and proxy traffic may be intercepted and processed by transmitting it through a VPN, bypassing all VPNs, or routing through a different VPN.
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
16.
Secure communications with internet-enabled devices
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 12/807 - Calculation or update of the congestion window
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
H04L 12/891 - Flow control of aggregated links or flows
18.
System and method for virtual multipath data transport
A computer system splits data to be transmitted into a plurality of reliable connections which are multiplexed through a smaller number of unacknowledged connections, such as connections that do not require acknowledgment and which may be VPN tunnels. A receiver then demultiplexes data received to obtain data flows over the reliable connections and transmits separate acknowledgements for each reliable connection. The computer system demultiplexes the acknowledgments and provides them to the corresponding reliable connections, which then retransmit any unacknowledged data. Delivery controllers executing on the computer system may be coupled to corresponding controllers executing on the receiver, with traffic between the delivery controllers (payload and acknowledgments) being multiplexed over one or more unacknowledged connections. In some embodiments, acknowledgments may be transmitted over a connection that is not multiplexed over the unacknowledged connections.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy
H04L 1/18 - Automatic repetition systems, e.g. Van Duuren systems
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
G01R 31/08 - Locating faults in cables, transmission lines, or networks
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 12/807 - Calculation or update of the congestion window
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
H04L 12/891 - Flow control of aggregated links or flows
20.
System and method for improving an aggregated throughput of simultaneous connections
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 12/807 - Calculation or update of the congestion window
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
H04L 12/891 - Flow control of aggregated links or flows
21.
System and method for virtual multipath data transport
A computer system splits data to be transmitted into a plurality of reliable connections which are multiplexed through a smaller number of unacknowledged connections, such as connections that do not require acknowledgment and which may be VPN tunnels. A receiver then demultiplexes data received to obtain data flows over the reliable connections and transmits separate acknowledgements for each reliable connection. The computer system demultiplexes the acknowledgments and provides them to the corresponding reliable connections, which then retransmit any unacknowledged data. Delivery controllers executing on the computer system may be coupled to corresponding controllers executing on the receiver, with traffic between the delivery controllers (payload and acknowledgments) being multiplexed over one or more unacknowledged connections. In some embodiments, acknowledgments may be transmitted over a connection that is not multiplexed over the unacknowledged connections.
A computer system splits data to be transmitted into a plurality of reliable connections which are multiplexed through a smaller number of unacknowledged connections, such as connections that do not require acknowledgment and which may be VPN tunnels. A receiver then demultiplexes data received to obtain data flows over the reliable connections and transmits separate acknowledgements for each reliable connection. The computer system demultiplexes the acknowledgments and provides them to the corresponding reliable connections, which then retransmit any unacknowledged data. Delivery controllers executing on the computer system may be coupled to corresponding controllers executing on the receiver, with traffic between the delivery controllers (payload and acknowledgments) being multiplexed over one or more unacknowledged connections. In some embodiments, acknowledgments may be transmitted over a connection that is not multiplexed over the unacknowledged connections.
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
H04L 12/807 - Calculation or update of the congestion window
H04L 12/891 - Flow control of aggregated links or flows
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
24.
System and method for improving an aggregated throughput of simultaneous connections
A client and content provider are connected by a plurality of simultaneous transport connections. The number of the transport connections that are used to transfer data is selected based on the size of the data to be transferred and may change after transfer of data has commenced based on the amount of data left and the attributes of the transport connections. In another aspect, data to be transmitted over the transport connections is organized into frames such that each frame includes data from only one data stream. The frames are sized to be less than or equal to a control window of the transport connection over which they are transmitted. Each frame may be assigned to a transport connection in a round robin fashion or based on the size of the frame and the sizes of the control windows of the transport connections.
H04L 12/16 - Arrangements for providing special services to substations
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04L 12/807 - Calculation or update of the congestion window
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
H04L 12/891 - Flow control of aggregated links or flows
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a domain name in the request. Requests for content including the pseudo IP address are modified to include the corresponding domain name and transmitted to an intermediary server, which resolves the domain name to a real IP address and forwards the content request. The content is received by the intermediary server, which returns it to the requesting application, such as by way of the VPR. Real IP addresses may be returned by the intermediary server such that subsequent content requests to the domain name may bypass the intermediary server. Requests for certain domains, ports, and/or protocols may bypass the intermediary server such that the VPR resolves the domain names to real IP addresses.
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
A network device allows inbound connections from external addresses to a computer on a local network while forbidding output connections from the computer to that external address unless preceded by an inbound connection therefrom. In some embodiments, the computer is allowed to accept inbound connections from external addresses but is not permitted to initiate outbound connections to other computers in the local network unless preceded by an inbound connection. In some embodiments, a request from an external address is processed by the network device by transmitting network information for the computer to the external address and temporarily changes network rules to allow connections from the external address. In some embodiments, if the computer attempts a disallowed connection, the connection attempt is routed through a proxy server by providing network data for the proxy server to the computer.
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a domain name in the request. Requests for content including the pseudo IP address are modified to include the corresponding domain name and transmitted to an intermediary server, which resolves the domain name to a real IP address and forwards the content request. The content is received by the intermediary server, which returns it to the requesting application, such as by way of the VPR. Real IP addresses may be returned by the intermediary server such that subsequent content requests to the domain name may bypass the intermediary server. Requests for certain domains, ports, and/or protocols may bypass the intermediary server such that the VPR resolves the domain names to real IP addresses.
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a domain name in the request. Requests for content including the pseudo IP address are modified to include the corresponding domain name and transmitted to an intermediary server, which resolves the domain name to a real IP address and forwards the content request. The content is received by the intermediary server, which returns it to the requesting application, such as by way of the VPR. Real IP addresses may be returned by the intermediary server such that subsequent content requests to the domain name may bypass the intermediary server. Requests for certain domains, ports, and/or protocols may bypass the intermediary server such that the VPR resolves the domain names to real IP addresses.
A virtual private router (VPR) intercepts DNS requests and returns a pseudo IP address to the requesting application and the pseudo IP address is mapped to a domain name in the request. Requests for content including the pseudo IP address are modified to include the corresponding domain name and transmitted to an intermediary server, which resolves the domain name to a real IP address and forwards the content request. The content is received by the intermediary server, which returns it to the requesting application, such as by way of the VPR. Real IP addresses may be returned by the intermediary server such that subsequent content requests to the domain name may bypass the intermediary server. Requests for certain domains, ports, and/or protocols may bypass the intermediary server such that the VPR resolves the domain names to real IP addresses.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs