US 11,729,143 B2
Methods for internet communication security
Mike Clark, Sterling, VA (US); Andrew Gordon, Alexandria, VA (US); and Matt Clark, Sterling, VA (US)
Assigned to Stealthpath, Inc., Vienna, VA (US)
Filed by Stealthpath, Inc., Reston, VA (US)
Filed on Feb. 17, 2021, as Appl. No. 17/177,666.
Application 17/177,666 is a continuation of application No. 16/450,282, filed on Jun. 24, 2019, granted, now 10,965,646.
Application 16/450,282 is a continuation of application No. 16/153,448, filed on Oct. 5, 2018, granted, now 10,375,019.
Application 16/153,448 is a continuation in part of application No. 15/949,749, filed on Apr. 10, 2018, granted, now 10,367,811.
Claims priority of provisional application 62/731,529, filed on Sep. 14, 2018.
Claims priority of provisional application 62/655,633, filed on Apr. 10, 2018.
Claims priority of provisional application 62/609,252, filed on Dec. 21, 2017.
Claims priority of provisional application 62/609,152, filed on Dec. 21, 2017.
Claims priority of provisional application 62/569,300, filed on Oct. 6, 2017.
Prior Publication US 2022/0014499 A1, Jan. 13, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); H04L 69/22 (2022.01); H04L 9/08 (2006.01); H04L 47/24 (2022.01); H04L 9/16 (2006.01); H04L 47/19 (2022.01); H04L 9/32 (2006.01)
CPC H04L 63/0227 (2013.01) [H04L 9/0861 (2013.01); H04L 9/16 (2013.01); H04L 9/3273 (2013.01); H04L 47/19 (2013.01); H04L 47/24 (2013.01); H04L 63/0236 (2013.01); H04L 63/0876 (2013.01); H04L 63/1441 (2013.01); H04L 69/22 (2013.01); H04L 63/0272 (2013.01); H04L 63/145 (2013.01); H04L 63/164 (2013.01)] 27 Claims
OG exemplary drawing
 
1. A product for securing communications of a plurality of networked computing devices, the product comprising a non-transitory computer-readable storage medium having computer-readable program code embodied therein, the computer-readable program code executable by a processor to perform communication management operations, the communication management operations comprising:
i) consuming a first network packet to obtain a first payload and a destination port number, the destination port number assigned to a destination port on one of the plurality of networked computing devices;
ii) confirming the first payload conforms to at least one of a data model pre-assigned to the destination port number;
iii) after confirmation that the first payload conforms to the data model for the destination port, forming a second network packet comprising a second payload, and at least one of a local program identification code, and a data model identification code; and
iv) executing at least one instruction to send the second network packet to network security software to the destination port on the one of the plurality of networked computing devices via a secure communication pathway.