Methods and systems for securing VPN cloud servers
First Claim
Patent Images
1. A computer-implemented method for enhancing security on a network comprising:
- sending, from a virtual private network (VPN) service provider, a request to a cloud provider to create a server on a cloud independent of an enterprise selection of the cloud server;
receiving a notification from the cloud provider that the requested server is available on the cloud;
embedding the server with a VPN service;
sending, from the VPN service provider, a credential of the embedded server to the enterprise on the network;
reviewing, via a graphical user interface (GUI) of the VPN service provider, a list of servers created by the cloud provider;
determining, via the GUI of the VPN service provider, which users in the enterprise to match with the generated servers;
evaluating on a portal on the GUI of the VPN service provider, progress of server generation by the cloud provider and one or more additional cloud providers; and
ranking efficiency of the cloud provider and the one or more additional cloud providers based on the evaluating step.
2 Assignments
0 Petitions
Accused Products
Abstract
The present application is directed a computer-implemented method for enhancing security. The method includes a step of sending, from a VPN service provider, a request to a cloud provider to create a dynamic server on a cloud. Then, the VPN service provider receives a notification from the cloud provider that the requested server is available on the cloud. Subsequently, the VPN service provider embeds the dynamic server with a VPN service. Further, the VPN service provider sends a credential of the dynamic server to an entity on the network. The application is also directed to system for enhancing security on a cloud server.
40 Citations
19 Claims
-
1. A computer-implemented method for enhancing security on a network comprising:
-
sending, from a virtual private network (VPN) service provider, a request to a cloud provider to create a server on a cloud independent of an enterprise selection of the cloud server; receiving a notification from the cloud provider that the requested server is available on the cloud; embedding the server with a VPN service; sending, from the VPN service provider, a credential of the embedded server to the enterprise on the network; reviewing, via a graphical user interface (GUI) of the VPN service provider, a list of servers created by the cloud provider; determining, via the GUI of the VPN service provider, which users in the enterprise to match with the generated servers; evaluating on a portal on the GUI of the VPN service provider, progress of server generation by the cloud provider and one or more additional cloud providers; and ranking efficiency of the cloud provider and the one or more additional cloud providers based on the evaluating step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented system in a cloud computing environment for enhancing network security comprising:
-
a non-transitory memory having instructions stored thereon for embedding a server with a virtual private network (VPN); a transceiver, operably coupled to the memory, for receiving and sending data; and a processor operably coupled to the memory and the transceiver, the processor configured to execute the instructions of; receiving, at a VPN service provider, a request from an enterprise to create a dynamic server that directs traffic of a user on the network to the internet; sending, from the VPN service provider, a request to a cloud provider to create the dynamic server; receiving a notification from the cloud provider that the requested server is available on a cloud; embedding the server with a VPN service; sending, from the VPN service provider, a credential of the embedded server to the enterprise; reviewing, via a graphical user interface of the VPN service provider, a list of generated servers by the cloud provider; determining, via the graphical user interface, users in the enterprise to match with the generated servers; evaluating on a portal on the GUI of the VPN service provider, progress of server generation by the cloud provider and one or more additional cloud providers; and ranking efficiency of the cloud provider and the one or more additional cloud providers based on the evaluating step. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification