Virtual private network between computing network and remote device
First Claim
1. A method for transmitting data in a secure manner between a computing network and a remote device, each of the computing network and the remote device including a tunneling client, the method comprising:
- establishing a first data tunnel leg between a tunneling client of the computing network and a tunneling server of a carrier network;
establishing a second data tunnel leg between the tunneling server of the carrier network and a tunneling client of the remote device; and
transmitting data between the remote device and the computing network via the first and second data tunnel legs and the carrier network using a first template associated with a first protocol, the first template being used by the tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by the tunneling of the remote device.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure connection between a computer network and a remote device is provided by a carrier network between the computer network and the remote device. The secure connection includes data tunnels that operate as virtual private networks between the corporate network and the carrier network and between the remote device and the carrier network. In addition, communication protocols can be used to enable data requests and data transmission over the secure connection, optionally through ports on the computer network that are opened for Web traffic.
-
Citations
48 Claims
-
1. A method for transmitting data in a secure manner between a computing network and a remote device, each of the computing network and the remote device including a tunneling client, the method comprising:
-
establishing a first data tunnel leg between a tunneling client of the computing network and a tunneling server of a carrier network;
establishing a second data tunnel leg between the tunneling server of the carrier network and a tunneling client of the remote device; and
transmitting data between the remote device and the computing network via the first and second data tunnel legs and the carrier network using a first template associated with a first protocol, the first template being used by the tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by the tunneling of the remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. In a carrier network capable of communicating with a computing network and a remote device, a method for enabling the remote device to access network data of the computing network, the method comprising:
-
receiving a first connection signal from a computing network;
in response to the first connection signal, establishing a first data tunnel leg between the carrier network and the computing network;
receiving a second connection signal from a remote device; and
in response to the second connection signal, establishing a second data tunnel leg between the carrier network and the remote device, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. In a device having a tunneling client, a method for enabling a user operating the device to access network data of a remote computing network, the method comprising:
-
transmitting a connection signal from the tunneling client of the device to a tunneling server of the carrier network, wherein a first data tunnel leg has already been established between the tunneling server and the remote computing network; and
upon the establishment of a second data tunnel leg between the computing network and the carrier network in response to the connection signal, transmitting a data request via the second data tunnel leg to the carrier network using a first template that is associated with a first protocol and is used by the tunneling client of the device, wherein;
the remote computing network receives the data request from the carrier network via the first data tunnel leg; and
the remote computing network processes the data request using a second template associated with the first protocol. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. In a computing network capable of communicating with a remote carrier network, a method for enabling a user operating a remote device to access network data of the computing network, the method comprising:
-
transmitting a first connection signal from a tunneling client of the computing network to a carrier network;
upon the establishment of a first data tunnel leg between the computing network and the carrier network, transmitting a keep alive signal from the computing network to the carrier network to maintain the first data tunnel leg; and
receiving a data request from a remote device via the first data tunnel leg and a second data tunnel leg located between the carrier network and a remote device, wherein;
the data request is transmitted using a first template associated with a first protocol, the first template being used by the tunneling client or the computing network, and a second template associated with the first protocol, the second template being used by a tunneling client of the remote device.
-
-
38. In a carrier network capable of communicating with a computing network and a remote device, a computer program product for implementing a method suitable for enabling the remote device to access network data of the computing network, the computer program product comprising:
a computer readable medium carrying computer executable instructions for performing the method, wherein the method comprises;
upon receiving a first connection signal from a computing network, establishing a first data tunnel leg between the carrier network and the computing network; and
upon receiving a second connection signal from a remote device, establishing a second data tunnel leg between the carrier network and the remote device, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network. - View Dependent Claims (39, 40, 41, 42, 43, 44)
-
45. A system for enabling a user of a remote device to access network data and software, applications stored on a computer network, the system comprising:
-
a first tunneling client on a computer network;
a tunneling server on a carrier network, wherein;
the first tunneling client and the tunneling server are configured to communicate with each other and maintain a first data tunnel leg therebetween; and
the tunneling server is configured to, upon receiving a connection signal from a remote device, establish a second data tunnel leg between the carrier network and the remote device, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network. - View Dependent Claims (46, 47, 48)
-
Specification