THIRD PARTY VPN CERTIFICATION
First Claim
1. A method for creating a virtual private network (VPN), comprising:
- a first device querying an online database to request a secure domain name address of a second device, wherein the querying supplies a remote name of a pre-authorized VPN name pair to the online database;
the first device receiving the secure domain name address in response to the querying;
the first and second devices exchanging respective verified certificates for the VPN connection, wherein the certificates of the first and second devices each contain at least one verified VPN parameter for the first and second devices, respectively; and
establishing a VPN connection using the VPN parameters.
1 Assignment
0 Petitions
Accused Products
Abstract
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
-
Citations
20 Claims
-
1. A method for creating a virtual private network (VPN), comprising:
-
a first device querying an online database to request a secure domain name address of a second device, wherein the querying supplies a remote name of a pre-authorized VPN name pair to the online database; the first device receiving the secure domain name address in response to the querying; the first and second devices exchanging respective verified certificates for the VPN connection, wherein the certificates of the first and second devices each contain at least one verified VPN parameter for the first and second devices, respectively; and establishing a VPN connection using the VPN parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium storing computer-executable instructions for performing the following:
-
causing a first device to query an online database to request a secure domain name address of a second device, wherein the query supplies a remote name of a pre-authorized VPN name pair to the online database; causing the first device to receive the secure domain name address in response to the querying; causing the first device to exchange respective verified certificates for the VPN connection with the second device using said secure domain name address, wherein the certificates of the first and second devices each contain at least one verified VPN parameter for the first and second devices, respectively; and establishing a VPN connection using the VPN parameters. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A virtual private network (VPN) device, comprising:
-
a memory storing a plurality of verified certificates for VPN connections with the device, wherein the certificates include different VPN parameter settings, the certificates are associated with different local names, and wherein the device is associated with the different local names; and a processor configured to receive a request for a VPN connection from a second device, locate a name in the request and compare the name with the plurality of different local names to identify VPN parameter settings for a desired VPN connection. - View Dependent Claims (19, 20)
-
Specification