Third party VPN certification
First Claim
1. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
- sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; and
receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and
establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
3 Assignments
0 Petitions
Accused Products
Abstract
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
-
Citations
82 Claims
-
1. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; and
receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and
establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
16. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
receiving a request from a first VPN device at a second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; and
sending a reply to the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and
establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
-
-
24. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
sending a certificate request for a virtual private network (VPN) device to a certification authority connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used by the VPN device for establishing a VPN over the telecommunications network;
receiving a signed certification from the certification authority, the signed certification containing the at least one VPN parameter contained in the certificate request; and
configuring the VPN device to operate in accordance with the at least one VPN parameter contained in the signed certificate.
-
-
42. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
receiving at a certification authority a certificate request for a VPN device connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used for establishing a VPN over the telecommunications network;
verifying at the certification authority each VPN parameter contained in the certificate request; and
sending a signed certification to the VPN device when each VPN parameter contained in the certificate request is verified. - View Dependent Claims (43, 44, 45, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
46. A virtual private network (VPN) device, comprising:
-
a memory containing a certificate that has been signed by a certification authority, the signed certificate containing at least one VPN parameter for the VPN device that has been verified by the certification authority; and
a processor receiving a request for establishing a VPN and responds to the request by sending the signed certificate over a telecommunications network to a second VPN device based on the received request.
-
-
60. A computer-readable medium containing computer executable instructions for performing steps of:
-
sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; and
receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and
establishing the VPN between the first and second VPN devices based each verified VPN parameter for each of the first and second VPN devices. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74)
-
-
75. A computer-readable medium containing computer-executable instructions for performing steps of:
-
sending a certificate request for a virtual private network device to a certification authority connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used by the VPN device for establishing a VPN over the telecommunications network;
receiving a signed certification from the certification authority, the signed certification containing the at least one VPN parameter contained in the certificate request; and
configuring the VPN device to operate in accordance with the at least one VPN parameter contained in the signed certificate. - View Dependent Claims (76, 77, 78, 80, 81, 82)
-
-
79. A computer-readable medium containing computer-readable instructions for performing steps of:
-
receiving at a certification authority a certificate request for a VPN device connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used for establishing a VPN over the telecommunications network;
verifying at the certification authority each VPN parameter contained in the certificate request; and
sending a signed certification to the VPN device when each VPN parameter contained in the certificate request is verified.
-
Specification