System, apparatus and method for establishing a secured communications link to form a virtual private network at a network protocol layer other than at which packets are filtered
First Claim
1. A method for securing communications with a remote client computing device by establishing a virtual private network, comprising:
- generating packet traffic with a communication application running on a client computing device;
identifying at said client computing device target packet traffic of said packet traffic that is addressed to a target server;
forming a secure communications link between a pseudo server module on said computing device and said target server;
directing additional packet traffic addressed to said target server to said pseudo server module;
sending an acknowledgment to said communication application upon receipt of said additional packet traffic rerouted to said pseudo server module; and
routing a payload of said additional paket traffic to said target server.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, apparatus and a method for implementing a secured communications link at a layer other than that at which packets are filtered are disclosed. In one embodiment, a computer system is configured to form a virtual private network (“VPN”) and comprises an address inspection driver to identify initial target packet traffic addressed to a target server. Also, the computer system includes a pseudo server module to receive rerouted initial target packet traffic from the address inspection driver. The pseudo server module is configured to convey packet regeneration instructions to a VPN gateway. The address inspection driver functions to identify additional target packet traffic addressed to the target server and routes the additional target packet traffic to the pseudo server. In one embodiment, the pseudo server is configured to strip header information from the additional target packet traffic to form a payload, and thereafter, to route the payload to the target server.
253 Citations
23 Claims
-
1. A method for securing communications with a remote client computing device by establishing a virtual private network, comprising:
-
generating packet traffic with a communication application running on a client computing device; identifying at said client computing device target packet traffic of said packet traffic that is addressed to a target server; forming a secure communications link between a pseudo server module on said computing device and said target server; directing additional packet traffic addressed to said target server to said pseudo server module; sending an acknowledgment to said communication application upon receipt of said additional packet traffic rerouted to said pseudo server module; and routing a payload of said additional paket traffic to said target server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for forming a virtual private network, comprising:
-
an address inspection driver to identify initial target packet traffic addressed to a target server; and a pseudo server module to receive rerouted initial target packet traffic from said address inspection driver, said pseudo server module conveying packet regeneration instructions to said target server; wherein said address inspection driver identifies additional target packet traffic addressed to said target server and routes said additional target packet traffic to said pseudo server; and wherein said pseudo server strips header information from said additional target packet traffic to form a payload and thereafter routes said payload to said target server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A virtual private network, comprising:
-
a client machine configured as a pseudo server machine with respect to a communication application running on said client machine, such that said communication application receives packet traffic acknowledgements from said pseudo server machine; and a virtual private network gateway operative with a server machine, to exchange communications between said psuedo server machine and said server machine, to facilitate secure communications between said client machine and said server machine. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification