REAL-TIME AUTOMATED VIRTUAL PRIVATE NETWORK (VPN) ACCESS MANAGEMENT
First Claim
1. A method of managing virtual private network (VPN) access to a network partitioned into a plurality of subnetworks (subnets), the method comprising:
- providing first information associated with hardware hosted on one or more subnets of the network;
providing second information associated with users for VPN access, wherein the VPN access for each user is determined by a list of hardware each user has permission to access;
detecting a hardware triggering event corresponding to a modification of the first information; and
responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information.
8 Assignments
0 Petitions
Accused Products
Abstract
Provided is a method for managing virtual private network (VPN) access to a network that is partitioned into a plurality of subnetworks (subnets). The method includes providing first information associated with hardware hosted on one or more subnets of the network; providing second information associated with users for VPN access, where the VPN access for each user is determined by a list of hardware each user has permission to access; detecting a hardware triggering event corresponding to a modification of the first information; and responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information.
-
Citations
20 Claims
-
1. A method of managing virtual private network (VPN) access to a network partitioned into a plurality of subnetworks (subnets), the method comprising:
-
providing first information associated with hardware hosted on one or more subnets of the network; providing second information associated with users for VPN access, wherein the VPN access for each user is determined by a list of hardware each user has permission to access; detecting a hardware triggering event corresponding to a modification of the first information; and responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of managing virtual private network (VPN) access to a private network divided into a plurality of subnetworks (subnets), the method comprising:
-
providing address information associated with a plurality of devices hosted on the plurality of subnets; providing authentication information associated with a plurality of users for VPN access, wherein the VPN access for each user is determined based on the devices each user has permission to access; responsive to a triggering event, evaluating the address information to determine a subnet relevant to the triggering event; and automatically updating the authentication information based on the determination of the relevant subnet. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for managing VPN access to a network partitioned into a plurality of subnetworks (subnets), the system comprising:
-
a first database having first information associated with hardware hosted on one or more subnets; a second database having second information associated with users for VPN access, wherein the VPN access for each user is determined by a list of hardware each user has permission to access; and a management module coupled to the first and second databases and operable to; detect a hardware triggering event corresponding to a modification of the first information of the first database; and responsive to the detection of the hardware triggering event, automatically update the second information of the second database based on the modification of the first information. - View Dependent Claims (17, 18, 19, 20)
-
Specification