System and methods for enabling customer network control in third-party computing environments
First Claim
1. A network system for allowing a user control over user'"'"'s assets in a third-party computing environment, said third party having control over most of said third-party computing environment, the system comprising a microprocessor, an input device, a memory, and a control module program, said control module program residing in said memory and said microprocessor being configured to execute said control module program, wherein said network system comprises:
- a third-party computing environment, said third party computing environment being made up of a physical and virtual infrastructure, said third-party computing environment further defined by at least one third-party computing environment parameter, said third-party having control over most or all of said physical infrastructure, said virtual infrastructure and said at least one third-party computing environment parameter;
a first virtual private network, said first virtual private network configured to connect at least two assets of said user, said first virtual private network designed to overlay the third-party computing environment;
a control module, said control module containing said control module program, said control module program capable of allowing for the creation of said first virtual private network;
said control module program capable of allowing said user to set at least one virtual private network parameter, said at least one virtual private network parameter defining a behavior of said first virtual private network;
such that said first virtual private network is not dependent on said at least one parameter set by said third-party computing environment, and said user has control over said user'"'"'s assets based on said behavior of said first virtual private network.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a system and methods for enabling a user control in third-party computing environments or cloud computing via a virtual private network created by a control module, which contains parameters defined by the user. The system and methods are used to create a fault tolerant virtual private network that allows user control over addressing, security encryption, routing, and the enablement of multicast protocols, regardless of the prohibition set by the third-party computing environment.
75 Citations
28 Claims
-
1. A network system for allowing a user control over user'"'"'s assets in a third-party computing environment, said third party having control over most of said third-party computing environment, the system comprising a microprocessor, an input device, a memory, and a control module program, said control module program residing in said memory and said microprocessor being configured to execute said control module program, wherein said network system comprises:
-
a third-party computing environment, said third party computing environment being made up of a physical and virtual infrastructure, said third-party computing environment further defined by at least one third-party computing environment parameter, said third-party having control over most or all of said physical infrastructure, said virtual infrastructure and said at least one third-party computing environment parameter; a first virtual private network, said first virtual private network configured to connect at least two assets of said user, said first virtual private network designed to overlay the third-party computing environment; a control module, said control module containing said control module program, said control module program capable of allowing for the creation of said first virtual private network; said control module program capable of allowing said user to set at least one virtual private network parameter, said at least one virtual private network parameter defining a behavior of said first virtual private network;
such that said first virtual private network is not dependent on said at least one parameter set by said third-party computing environment, and said user has control over said user'"'"'s assets based on said behavior of said first virtual private network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for allowing a user control over user'"'"'s assets in a third-party computing environment, said third party computing environment being made up of a physical and virtual infrastructure, said third-party computing environment further defined by at least one third-party computing environment parameter, said third-party having control over most or all of said physical infrastructure, said virtual infrastructure and said at least one third-party computing environment parameter, the third-party computing environment made up of a network, a microprocessor, an input device, a memory, a control module, and a control module program, said control module program residing in said memory and said microprocessor being configured to execute said control module program, wherein said third party has control over most of said third-party computing environment, wherein said control module program comprises the steps of:
-
allowing for the creation of a first virtual private network, said first virtual private network configured to connect at least two assets of said user; overlaying said first virtual private network over the third-party computing environment; allowing said user to set at least one virtual private network parameter, said at least one virtual private network parameter to be used to define a behavior of said first virtual private network;
such that said first virtual private network is not dependent on said at least one parameter set by said third-party computing environment and said user has control over said user'"'"'s assets based on said behavior of said first virtual private network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification