US 11,930,007 B2
Methods for internet communication security
Mike Clark, Sterling, VA (US); Andrew Gordon, Alexandria, VA (US); and Matt Clark, Sterling, VA (US)
Assigned to Stealthpath, Inc., Vienna, VA (US)
Filed by Stealthpath, Inc., Reston, VA (US)
Filed on Jun. 24, 2019, as Appl. No. 16/450,221.
Application 16/450,221 is a continuation of application No. 15/949,749, filed on Apr. 10, 2018, granted, now 10,367,811.
Claims priority of provisional application 62/609,152, filed on Dec. 21, 2017.
Claims priority of provisional application 62/569,300, filed on Oct. 6, 2017.
Prior Publication US 2020/0153825 A1, May 14, 2020
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01); H04L 67/12 (2022.01); H04W 4/70 (2018.01)
CPC H04L 63/0869 (2013.01) [H04L 9/0838 (2013.01); H04L 63/0236 (2013.01); H04L 63/1441 (2013.01); H04L 67/12 (2013.01); H04W 4/70 (2018.02); H04L 63/0428 (2013.01); H04L 63/168 (2013.01)] 29 Claims
OG exemplary drawing
 
1. A product for securing communications of a plurality of networked computing devices, the product comprising a non-transitory computer-readable storage medium having a kernel loadable module embodied therein, the kernel loadable module executable by a first computing device to perform communication management operations in a kernel of the first computing device, the communication management operations comprising:
i) intercepting a network connection request from a first port assigned to a first user-application, the first port hosted by the first computing device, the request comprising a second port number;
ii) verifying on the first computing device that the first user-application is specifically authorized to communicate with a second port on a second computing device, the second port number assigned to the second port;
iii) receiving a nonpublic second identification code from the second computing device;
iv) passing the nonpublic second identification code to a first network security software, the first network security software cooperatively configured with the kernel loadable module to compare the nonpublic second identification code with a pre-established value for the second computing device;
v) further receiving a second application identifier for a second user-application from the second computing device; and
vi) further passing the second application identifier to a second network security software, the second network security software cooperatively configured with the kernel loadable module on the first computing device to compare the second application identifier with a pre-established value for the second user-application.