Third party VPN certification
First Claim
1. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
- sending a request from a first VPN device to an on-line database connected to the telecommunications network for obtaining a secure domain name address associated with a second VPN device;
sending a request from the first VPN device to the second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device;
receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and
establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
3 Assignments
0 Petitions
Accused Products
Abstract
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
95 Citations
66 Claims
-
1. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
sending a request from a first VPN device to an on-line database connected to the telecommunications network for obtaining a secure domain name address associated with a second VPN device; sending a request from the first VPN device to the second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
sending a request from a first VPN device to an on-line database connected to the telecommunications network for obtaining a secure domain name address associated with a second VPN device; receiving a request from the first VPN device at the second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; sending a reply to the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for creating a virtual private network (VPN) over a telecommunications network, comprising steps of:
-
sending a certificate request for a virtual private network (VPN) device to a certification authority connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used by the VPN device for establishing a VPN over the telecommunications network; receiving a signed certification from the certification authority, the signed certification containing the at least one VPN parameter contained in the certificate request; configuring the VPN device to operate in accordance with the at least one VPN parameter contained in the signed certificate, exchanging the signed certificate with another VPN device at a selected telecommunications network address; establishing the VPN in accordance with the at least one VPN parameter contained in the signed certificate; receiving a request from a client device connected to the VPN device for establishing a VPN connection to a selected telecommunications network address; and querying an on-line database connected to the telecommunications network for obtaining a secure domain name address for the selected telecommunications network address, wherein the step of establishing the VPN connection to the selected telecommunications network address is performed when the on-line database contains the secure domain name address for the selected telecommunications network address. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A virtual private network (VPN) device, comprising:
-
a memory containing a certificate that has been signed by a certification authority, the signed certificate containing at least one VPN parameter for the VPN device that has been verified by the certification authority, and a plurality of pre-authorized name pairs having a local name and a remote name for a VPN; and a processor programmed to receive a request for establishing a VPN between the VPN device and a second VPN device and to respond to the request by sending the signed certificate over a telecommunications network to the second VPN device based on the received request. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A computer-readable medium containing computer executable instructions for performing steps of:
-
receiving a request for establishing a VPN from a client device that is associated with a first VPN device, wherein the request received from the client device includes a source/destination designation for the VPN, and wherein the source/and destination designation includes a wild card designation; sending a request from the first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices, the request including a first signed certificate having at least one verified VPN parameter for the first VPN device; and receiving a reply at the first VPN device from the second VPN device, the reply including a second signed certificate having at least one verified VPN parameter for the second VPN device; and establishing the VPN between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A computer-readable medium containing computer-executable instructions for performing steps of:
-
sending a certificate request for a virtual private network device to a certification authority connected to the telecommunications network, the certificate request including at least one VPN parameter that will be used by the VPN device for establishing a VPN over the telecommunications network, wherein the certificate request includes a range of telecommunications network addresses that the VPN device will use as client network addresses for VPNs established though the VPN device; receiving a signed certification from the certification authority, the signed certification containing the at least one VPN parameter contained in the certificate request; configuring the VPN device to operate in accordance with the at least one VPN parameter contained in the signed certificate, exchanging the signed certificate with another VPN device at a selected telecommunications network address; and establishing the VPN in accordance with the at least one VPN parameter contained in the signed certificate. - View Dependent Claims (66)
-
Specification