Third party VPN certification
First Claim
Patent Images
1. A method for creating a virtual private network (VPN) connection, comprising:
- querying, by a first device an online database to request a secure domain name address of a second device, wherein the querying supplies a remote name of a pre-authorized VPN name pair to the online database;
receiving the secure domain name address at the first device in response to the querying;
providing, by the first device, a verified certificate and receiving, at the first device, a verified certificate from the second device in order to establish a VPN connection using the verified certificates.
2 Assignments
0 Petitions
Accused Products
Abstract
A virtual private network (VPN) over a telecommunications network is created by sending a request from a first VPN device to a second VPN device for establishing a VPN between the first and second VPN devices. The request includes a first signed certificate having a verified VPN parameter for the first VPN device. A reply is received at the first VPN device from the second VPN device that includes a second signed certificate having a verified VPN parameter for the second VPN device. The VPN is established between the first and second VPN devices based on each verified VPN parameter for each of the first and second VPN devices.
20 Citations
20 Claims
-
1. A method for creating a virtual private network (VPN) connection, comprising:
-
querying, by a first device an online database to request a secure domain name address of a second device, wherein the querying supplies a remote name of a pre-authorized VPN name pair to the online database; receiving the secure domain name address at the first device in response to the querying; providing, by the first device, a verified certificate and receiving, at the first device, a verified certificate from the second device in order to establish a VPN connection using the verified certificates. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing computer-executable instructions for performing the following:
-
causing a first device to query an online database to request a secure domain name address of a second device, wherein the query supplies a remote name of a pre-authorized VPN name pair to the online database; causing the first device to receive the secure domain name address in response to the querying; causing the first device to provide a first verified certificate for the VPN connection to the second device using said secure domain name address and to receive a second verified certificate for the VPN connection from the second device, so that a VPN connection using the first and second certificates can be established. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A virtual private network (VPN) device, comprising:
-
a memory storing a plurality of verified certificates for VPN connections with the device, the certificates being associated with different local names, and the device being associated with the different local names; and a processor configured to; receive a request for a VPN connection from a second device, and identify a name in the request and compare the name with the plurality of different local names to identify at least one stored verified certificate for a desired VPN connection. - View Dependent Claims (19, 20)
-
Specification