Methods and systems for controlling traffic to VPN servers
First Claim
1. A computer-implemented method for managing traffic in a network comprising:
- receiving, at a computer including a graphical user interface from a user on the network, a request to access the internet;
determining, via the computer, information of the user based upon the request, the information including security access in the network;
reviewing, via the graphical user interface, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network;
ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network;
matching the determined information of the user with the selection criteria and the ranking efficiency; and
sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step, whereinan active session of the one of the dynamic VPN cloud servers lasts until a predetermined condition is met,a graphical user interface displays a current, dynamically changing list of users matched with respective VPN cloud servers, andthe graphical user interface displays a current, dynamically changing queue list of other users still to be matched with VPN cloud servers.
2 Assignments
0 Petitions
Accused Products
Abstract
The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of receiving, from a user on the network, a request to access the internet. The method also includes a step of determining information of the user based upon the request. The information includes a security privilege of the user in the network. The method also includes a step of reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The method also includes a step of matching the determined information of the user with the selection criteria. Further, the method includes a step of sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step. The application is also directed to a system for securing web traffic on a network including a policy controller and router.
-
Citations
19 Claims
-
1. A computer-implemented method for managing traffic in a network comprising:
-
receiving, at a computer including a graphical user interface from a user on the network, a request to access the internet; determining, via the computer, information of the user based upon the request, the information including security access in the network; reviewing, via the graphical user interface, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network; ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network; matching the determined information of the user with the selection criteria and the ranking efficiency; and sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step, wherein an active session of the one of the dynamic VPN cloud servers lasts until a predetermined condition is met, a graphical user interface displays a current, dynamically changing list of users matched with respective VPN cloud servers, and the graphical user interface displays a current, dynamically changing queue list of other users still to be matched with VPN cloud servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented system for enhancing security of traffic on a network comprising:
-
a non-transitory memory having instructions stored thereon for dynamically managing web traffic of user equipment on the network; a display including a graphical user interface; and a processor, operably coupled to the memory and the display, the processor configured to execute the instructions of; receiving, from a user on the network, a request to access the internet; determining information of the user based upon the request, the information including security access in the network; reviewing, via the graphical user interface, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network; ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network; and matching the determined information of the user with the selection criteria and the ranking efficiency, wherein an active session of the one of the dynamic VPN cloud servers lasts until a predetermined condition is met, the graphical user interface displays a current, dynamically changing list of users matched with respective VPN cloud servers, and the graphical user interface displays a current, dynamically changing queue list of other users still to be matched with VPN cloud servers. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system for securing web traffic on a network comprising:
-
a policy controller including; a non-transitory memory having instructions stored thereon for dynamically managing the web traffic of user equipment on the network; a display including a graphical user interface; and a processor, operably coupled to the memory and the display, the processor configured to execute the instructions of; determining information of a user based upon a request, the information including security access in the network; reviewing, via the graphical user interface, selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network; ranking efficiency of the plural, dynamic, virtual VPN cloud servers in the network; and matching the determined information of the user with one of the plural, dynamic VPN cloud servers in the network with the selection criteria and the ranking efficiency; and a router operably coupled to the policy controller for directing traffic of the user to the one dynamic VPN cloud server, wherein an active session of the one of the dynamic VPN cloud servers lasts until a predetermined condition is met, the graphical user interface displays a current, dynamically changing list of users matched with respective VPN cloud servers, and the graphical user interface displays a current, dynamically changing queue list of other users still to be matched with VPN cloud servers. - View Dependent Claims (18)
-
-
19. The system 18, wherein a second user having information is unauthorized to connect with the one of the dynamic VPN cloud servers based upon the security access.
Specification