Network-based machine-to-machine (M2M) private networking system
First Claim
Patent Images
1. A private networking system to connect devices operating on a carrier network to a customer enterprise network, comprising:
- a router to terminate a first tunnel originating on the carrier network; and
a VPN server to create a second tunnel which is terminated at the customer enterprise network,wherein the router and the VPN server are in communication with one another, and wherein the private networking system is not part of the carrier network nor part of the customer enterprise network.
1 Assignment
0 Petitions
Accused Products
Abstract
An architecture for the creation of a private network for a customer, suitable for use for machine to machine communications and the Internet of Things, is disclosed. The system includes a private networking system, which includes routers for connection to a carrier core network, and VPN servers, capable of securely connecting to a customer'"'"'s enterprise network. The private networking system also includes security appliances and a controller to configure and operate the system. Through use of this private networking system, customers may easily create private networks for their enterprises.
69 Citations
16 Claims
-
1. A private networking system to connect devices operating on a carrier network to a customer enterprise network, comprising:
-
a router to terminate a first tunnel originating on the carrier network; and a VPN server to create a second tunnel which is terminated at the customer enterprise network, wherein the router and the VPN server are in communication with one another, and wherein the private networking system is not part of the carrier network nor part of the customer enterprise network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A communication system, comprising:
-
a carrier network; a customer enterprise network; and a private networking system disposed between the carrier network and the customer enterprise network, wherein the private networking system terminates a first tunnel that originates in the carrier network and creates a second tunnel that terminates in the customer enterprise network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification