Virtual private network between computing network and remote device
First Claim
Patent Images
1. A method comprising:
- establishing a first data tunnel leg between a tunneling client of a computing network and a tunneling server of a carrier network;
establishing a second data tunnel leg between the tunneling server of the carrier network and the tunneling client of a remote device; and
causing transmission of data between the remote device and the computing network via the first and second data tunnel legs and the carrier network using a first template associated with a first protocol, the first template being used by the tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by the tunneling client of the remote device,wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure connection between a computer network and a remote device is provided by a carrier network between the computer network and the remote device. The secure connection includes data tunnels that operate as virtual private networks between the corporate network and the carrier network and between the remote device and the carrier network. In addition, communication protocols can be used to enable data requests and data transmission over the secure connection, optionally through ports on the computer network that are opened for Web traffic.
-
Citations
46 Claims
-
1. A method comprising:
-
establishing a first data tunnel leg between a tunneling client of a computing network and a tunneling server of a carrier network; establishing a second data tunnel leg between the tunneling server of the carrier network and the tunneling client of a remote device; and causing transmission of data between the remote device and the computing network via the first and second data tunnel legs and the carrier network using a first template associated with a first protocol, the first template being used by the tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by the tunneling client of the remote device, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 41, 42)
-
-
14. A method comprising:
-
receiving a first connection signal from a computing network; establishing a first data tunnel leg between a carrier network and the computing network in response to the first connection signal; receiving a second connection signal from a remote device; establishing a second data tunnel leg between the carrier network and the remote device in response to the second connection signal, the first data tunnel leg and the second tunnel leg together operating as a virtual private network; and causing transmission of data between the remote device and the computing network via the first and second data tunnel legs using a first template associated with a first protocol, the first template being used by a tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by a tunneling client of the remote device, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method comprising:
-
causing transmission of a connection signal from a tunneling client of a device to a tunneling server of a carrier network, wherein a first data tunnel leg has already been established between the tunneling server and a remote computer network; and causing a data request to be transmitted via the second data tunnel leg to the carrier network using a first template that is associated with a first protocol and is used by the tunneling client of the device, upon the establishment of a second data tunnel leg between the device and the carrier network in response to the connection signal; causing receipt of the data request, at the remote computing network, from the carrier network via the first data tunnel leg; and processing the data request, at the remote computing network, using a second template associated with the first protocol, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A method comprising:
-
causing transmission of a first connection signal from a tunneling client of a computing network to a carrier network; transmitting a keep alive signal from the computing network to the carrier network to maintain a first data tunnel leg upon the establishment of the first data tunnel leg between the computing network and the carrier network; and causing receipt of a data request from a remote device via the first data tunnel leg and a second data tunnel leg located between the carrier network and the remote device, wherein the data request is caused to be transmitted using a first template associated with a first protocol, the first template being used by the tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by a tunneling client of the remote device, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (43, 44)
-
-
34. A computer program product comprising at least one computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
program code instructions for establishing a first data tunnel leg between a carrier network and a computing network upon receiving a first connection signal from the computing network; program code instructions for establishing a second data tunnel leg between the carrier network and a remote device, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network; and program code instructions for causing transmission of data between the remote device and the computing network via the first and second data tunnel legs using a first template associated with a first protocol, the first template being used by a tunneling client of the computing network, and a second template associated with the first protocol, the second template being used by a tunneling client of the remote device, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (35, 36, 37, 38)
-
-
39. A system for enabling a user of a remote device to access network data and software applications stored on a computer network, the system comprising:
-
a first tunneling client on the computer network; a tunneling server on a carrier network, wherein; the first tunneling client and the tunneling server are configured to communicate with each other and maintain a first data tunnel leg therebetween; the tunneling server is configured to, upon receiving a connection signal from the remote device, establish a second data tunnel leg between the carrier network and the remote device which comprises a second tunneling client, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network; and wherein the second tunneling client is configured to cause transmission of data between the remote device and the computing network via the first and second data tunnel legs using a second template associated with a first protocol, the second template being used by the second tunneling client, and a first template associated with the first protocol, the first template being used by the first tunneling client, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (40)
-
-
45. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to with the at least one processor, cause the apparatus at least to perform at least the following; communicate with a first tunneling client on a computer network and maintain a first data tunnel leg therebetween; establish a second data tunnel leg between the carrier network and the remote device upon receiving a connection signal from a remote device which comprises a second tunneling client, the first data tunnel leg and the second data tunnel leg together operating as a virtual private network; and cause data to be transmitted between the remote device and the computing device via the first and second data tunnel legs using a second template associated with a first protocol, the second template being used by the second tunneling client of the remote device, and a first template associated with the first protocol, the first template being used by the first tunneling client of the computing network, wherein each of the first template and the second template comprises one or more inflection points that correspond to commands or other data aspects that are unique to the first protocol. - View Dependent Claims (46)
-
Specification