Virtual private network access control
First Claim
1. A method for virtual private network (VPN) access control, the method comprising:
- receiving a request from an application on a user device to access a remote computer network asset;
determining, by a processor on the user device, an authorization of the application to access the remote computer network asset based on a policy;
in response to a determination, on the user device, that the application is authorized to access the remote computer network asset;
setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN; and
in response to a determination, on the user device, that the application is not authorized to access the remote computer network asset, routing traffic from the requesting application directly to a destination server different than the remote computer network asset via a network different than the remote computer network for execution of the application by the destination server, allowing the requesting application to perform functions without breaching the remote computer network.
2 Assignments
0 Petitions
Accused Products
Abstract
According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a remote computer network asset, and determining, by a processor, an authorization of the application to access the remote computer network asset based on a policy. In response to a determination that the application is authorized to access the remote computer network asset, the method includes setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN. In response to a determination that the application is not authorized to access the remote computer network asset, the method includes routing traffic from the application to a network different than the remote computer network.
-
Citations
19 Claims
-
1. A method for virtual private network (VPN) access control, the method comprising:
-
receiving a request from an application on a user device to access a remote computer network asset; determining, by a processor on the user device, an authorization of the application to access the remote computer network asset based on a policy; in response to a determination, on the user device, that the application is authorized to access the remote computer network asset; setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN; and in response to a determination, on the user device, that the application is not authorized to access the remote computer network asset, routing traffic from the requesting application directly to a destination server different than the remote computer network asset via a network different than the remote computer network for execution of the application by the destination server, allowing the requesting application to perform functions without breaching the remote computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A user device comprising:
a memory storing machine readable instructions to; receive a request from an application on the user device to access a remote computer network asset; determine, on the user device, an authorization of the application to access the remote computer network asset based on a policy on the user device; in response to a determination, on the user device, that the application is authorized to access the remote computer network asset, route traffic from the application to the remote computer network asset via a virtual private network (VPN); and in response to a determination, on the user device, that the application is not authorized to access the remote computer network asset, route traffic from the requesting application directly to a destination server different than the remote computer network asset via Internet for execution of the application by the destination server, allowing the requesting application to perform functions without breaching the remote computer network; and a processor to implement the machine readable instructions. - View Dependent Claims (16, 17)
-
18. A non-transitory computer readable medium having stored thereon machine readable instructions for virtual private network (VPN) access control, the machine readable instructions when executed cause a computer system to:
-
receive a request from an application on a user device to access a remote computer network asset; determine, by a processor on the user device, an authorization of the user device to access the remote computer network asset based on a policy; in response to a determination, on the user device, that the user device is authorized to access the remote computer network asset, route traffic from the application to the remote computer network asset via a VPN; and in response to a determination, on the user device, that the user device is not authorized to access the remote computer network asset, route traffic from the requesting application directly to a destination server different than the remote computer network asset via Internet for execution of the application by the destination server, allowing the requesting application to perform functions without breaching the remote computer network. - View Dependent Claims (19)
-
Specification