METHODS AND SYSTEMS FOR CONTROLLING TRAFFIC TO VPN SERVERS
First Claim
1. A computer-implemented method for managing traffic in a network comprising:
- receiving, from a user on the network, a request to access the internet;
determining information of the user based upon the request, the information including security access in the network;
reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network;
matching the determined information of the user with the selection criteria;
sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step.
2 Assignments
0 Petitions
Accused Products
Abstract
The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of receiving, from a user on the network, a request to access the internet. The method also includes a step of determining information of the user based upon the request. The information includes a security privilege of the user in the network. The method also includes a step of reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network. The method also includes a step of matching the determined information of the user with the selection criteria. Further, the method includes a step of sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step. The application is also directed to a system for securing web traffic on a network including a policy controller and router.
-
Citations
20 Claims
-
1. A computer-implemented method for managing traffic in a network comprising:
-
receiving, from a user on the network, a request to access the internet; determining information of the user based upon the request, the information including security access in the network; reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network; matching the determined information of the user with the selection criteria; sending traffic of the user to one of the plural, dynamic VPN cloud servers based upon the matching step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17)
-
-
12. A computer-implemented system for enhancing security of traffic on a network comprising:
-
a non-transitory memory having instructions stored thereon for dynamically managing the web traffic of user equipment on the network; a display including a graphical user interface; and a processor, operably coupled to the memory and the display, the processor configured to execute the instructions of; receiving, from a user on the network, a request to access the internet; determining information of the user based upon the request, the information including security access in the network; reviewing selection criteria of plural, dynamic, virtual private network (VPN) cloud servers in the network; and matching the determined information of the user with the selection criteria.
-
-
12-1. (canceled)
-
18. A system for securing web traffic on a network comprising:
-
a policy controller including; a non-transitory memory having instructions stored thereon for dynamically managing the web traffic of user equipment on the network; a display including a graphical user interface; and a processor, operably coupled to the memory and the display, the processor configured to execute the instructions of; determining information of the user based upon the request, the information including security access in the network; and matching the determined information of the user with one of plural, dynamic virtual private network (VPN) servers in the network; and a router operably coupled to the policy controller for directing traffic of the user to the VPN server. - View Dependent Claims (19)
-
-
20. The system 19, wherein a second user having information is unauthorized to connect with the dynamic VPN cloud server based upon the security access.
Specification