Secure Remote Access Public Communication Environment
First Claim
1. A method in a user device for establishing a connection between a user application and an enterprise application through a virtual private network (VPN) client, the method comprising the steps of:
- intercepting, by an agent, a request to an operating system service for establishing the connection, the request originating from the user application; and
establishing a communication channel between the VPN client and the agent based upon the intercepted request.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is accessed from a user device such that it sends and receives data packets through the VPN client. For this, a request to send packets, originating from the user application, is intercepted by a VPN agent associated with the user application. In turn, the VPN agent associates an address of a loop-back interface with the user application. Thereafter, packets sent by the user application, are re-directed to the VPN client through the loop-back interface. Similarly, packets received by the VPN client from the enterprise network are routed through the loop-back interface to the user application.
65 Citations
20 Claims
-
1. A method in a user device for establishing a connection between a user application and an enterprise application through a virtual private network (VPN) client, the method comprising the steps of:
-
intercepting, by an agent, a request to an operating system service for establishing the connection, the request originating from the user application; and establishing a communication channel between the VPN client and the agent based upon the intercepted request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 15)
-
-
8. A method in a user device for transmitting a data packet from a user application through a VPN client to an enterprise application, the method comprising the steps of:
-
changing a destination address of the data packet to a loop-back interface address, the loop-back interface address having been associated with the user application in response to intercepting by an agent a request to an operating system service for establishing a connection with the enterprise application, the request originating from the user application; and forwarding the data packet to the VPN client. - View Dependent Claims (9, 10)
-
-
11. A method in a user device for establishing a connection between an enterprise application and a user application through a virtual private network (VPN) client, the method comprising the steps of:
-
intercepting, by an agent, a request to an operating system service to enable listening for requests by other applications to connect with the user application, the request originating from the user application; requesting by the agent to the VPN client to forward connection requests from the enterprise application; receiving by the VPN client connection requests from the enterprise application through a VPN tunnel; and establishing a communication channel between the VPN client and the agent based upon the received connection requests. - View Dependent Claims (12, 13, 14)
-
-
16. A system for remote virtual private network (VPN) access, comprising:
-
an enterprise network including an enterprise application; and a user device, wherein the user device includes an agent module adapted to intercept a request to an operating system service for establishing a connection from a user application to an enterprise application and establish a communication channel between the VPN client and the agent based upon the intercepted request. - View Dependent Claims (17, 18, 19, 20)
-
Specification