Follow us on Twitter
twitter icon@FreshPatents


Virtual Private Network patents

      

This page is updated frequently with new Virtual Private Network-related patent applications.




 Methods and systems for reducing network congestion patent thumbnailMethods and systems for reducing network congestion
The present invention discloses methods and systems carried out at a network device for reducing network congestion by establishing an aggregated connection, wherein the aggregated connection comprise a plurality of virtual private network (vpn) tunnels. The system further comprises assigning default weights to the plurality of vpn tunnels along with transmitting and receiving data packets of a data session through the aggregated connection.
Pismo Labs Technology Limited


 Dynamic virtual private network patent thumbnailDynamic virtual private network
Various embodiments establish a virtual private network (vpn) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network.
International Business Machines Corporation


 Egress node protection in evpn all-active topology patent thumbnailEgress node protection in evpn all-active topology
In general, techniques enable an intermediate router to perform node protection for one or more other pe routers operably coupled to the intermediate router in active-active mode in an evpn. The techniques may include configuring the intermediate router, which is positioned within an a service provider network between a remote provide edge router and at least two provider edge (pe) routers operating in active-active mode in an ethernet virtual private network (evpn), to operate in a passive mode in which the intermediate router detects ethernet auto-discovery (ad) routes without performing layer two (l2) address learning for the evpn.
Juniper Networks, Inc.


 Providing on-demand vpn connectivity on a per-application basis patent thumbnailProviding on-demand vpn connectivity on a per-application basis
Disclosed are various approaches for providing on-demand virtual private network (vpn) connectivity on a per-application basis. First, an application is determined to have begun execution on a computing device.
Airwatch Llc


 Providing virtualized private network tunnels patent thumbnailProviding virtualized private network tunnels
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (vpn) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled vpn tunnel during the lifetime of the ticket.
Citrix Systems, Inc.


 Dynamic virtual private network patent thumbnailDynamic virtual private network
Various embodiments establish a virtual private network (vpn) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network.
International Business Machines Corporation


 Providing secure remote access to a device at a merchant location patent thumbnailProviding secure remote access to a device at a merchant location
System and method for providing secure connections between a point of sale (pos) system and a datacenter. Upon initiation of a support event associated with the pos system, a gateway device may determine an available block of internet protocol (ip) addresses for the merchant location, e.g., by accessing information stored in a shared storage location.
Acumera, Inc.


 Dynamic vpn policy model with encryption and traffic engineering resolution patent thumbnailDynamic vpn policy model with encryption and traffic engineering resolution
High-level network policies that represent a virtual private network (vpn) as a high-level policy model are received. The vpn is to provide secure connectivity between connection sites of the vpn based on the high-level network policies.
Cisco Technology, Inc.


 Route reflector as a service patent thumbnailRoute reflector as a service
A computer device may include logic configured to generate a virtualized environment for a customer; receive a request to provide a route reflector service for the customer; and generate a virtual route reflector on the generated virtualized environment, in response to receiving the request to provide the route reflector service for the customer. The logic may further be configured to establish a virtual private network (vpn) or secure tunnel connection between the generated virtual route reflector and a client router associated with a customer network via a cloud center access system, wherein the cloud center access system connects a cloud center system that includes the computer device to a provider network that includes the client router; and establish a border gateway protocol (bgp) session between the client router and the generated virtual route reflector using the established vpn or secure tunnel connection..
Verizon Patent And Licensing Inc.


 Machine to machine virtual private network patent thumbnailMachine to machine virtual private network
System and method for providing secure machine to machine, m2m, communications comprising a device management, dm, server configured to obtain credentials of one or more m2m devices and provision the one or more m2m devices with credentials of a virtual private network, vpn. An application programming interface, api.
Vodafone Ip Licensing Limited


Authorizing application access to virtual private network resource

Examples of authorizing application access to a virtual private network are disclosed. In one example implementation according to aspects of the present disclosure, a method may include connecting, by a computing system, electronically to a virtual private network (vpn) by sending authentication credentials, and receiving, by the computing system, a set of application policies from an application policy database in the vpn.
Hewlett Packard Enterprise Development Lp

Network address translation

A method including receiving, at a virtual private network (vpn) server, an encapsulated packet on one of the ingress addresses wherein the ingress address is associated with the packet information. After processing the packet at the vpn server, the packet source address is transformed to the address of the ingress port before transmitting the packet over a network.
Openvpn Technologies, Inc.

Interconnecting virtual private networks

In one embodiment, a method includes receiving at a first network device in a first virtual private network, a packet destined for a second network device in communication with a second virtual private network, and transmitting the packet over the second network, wherein the packet is encapsulated for transmittal on a tunnel extending from the first network device to the second network device. The first network device is in communication with a system operable to map and encapsulate the packet and provide an overlay that traverses over the second virtual private network.
Cisco Technology, Inc.

Image forming apparatus, image forming method, and image forming system

An image forming apparatus includes circuitry that connects to one or more first information processing apparatuses via a virtual private network in response to a request to connect from at least one of the one or more first information processing apparatuses and establishes a first wireless communication network among the image forming apparatus and the first information processing apparatuses to enable wireless communication among the image forming apparatus and the first information processing apparatuses.. .
Ricoh Company, Ltd.

Broadband access for virtual private networks

An apparatus receives an upper layer packet that includes data from a source device, a virtual private network (vpn) identification, a destination address, and a destination option type. The apparatus authenticates the upper layer packet by comparing the vpn identification of the received upper layer packet to a customer vpn identification.
Marlow Technologies, Llc

Virtual routing and forwarding (vrf) for asymmetrical virtual service provider (vsp) tunnels

In one embodiment, a device in a network maintains first and second routing tables associated with a virtual private network (vpn) tunnel. The first and second routing tables comprise routing information used to route packets external to a particular routing domain.
Cisco Technology, Inc.

Path maximum transmission unit handling for virtual private networks

Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router.
Cisco Technology, Inc.

Virtual private network forwarding and nexthop to transport mapping scheme

A method is provided in one example embodiment and includes configuring on a network element a first tunnel from the network element to a first network, wherein the configuring comprises mapping a nexthop address of the local network element to a transport address of the tunnel on the network to create a first nexthop-to-transport mapping for the network element; and advertising the first nexthop-to-transport mapping along with routing information for the network element to remote network elements.. .
Cisco Technology, Inc.

Managing vpn connectivity for data communications

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing virtual private network (vpn) connectivity for data communications are disclosed. In one aspect, a method includes storing, in a computer-readable medium of a computing device, packages of code and configuration data that associate the packages of code with respective virtual private networks (vpns), the configuration data associating at least one of the packages of code with at least two of the vpns, and, in response to a request to execute application code included in a first package of code, identifying, based on the configuration data, a first vpn associated with the first package of code and binding a communication interface of the first package of code to a connection with the first vpn..
Blackberry Limited

Dynamic detection of vpn sites

A method for automatically detecting and configuring virtual private network (vpn) sites is provided. A border gateway protocol (bgp) message is received from a provider edge (pe) router.
Arbor Networks, Inc.

Virtual private network based parental control service with motion-based restricted mode

In various embodiments, methods and systems for implementing motion-based parental controls on mobile devices using virtual private network (vpn)-based parental control services are provided. A parental control profile is received at a controlled device where the parental control profile includes instructions to configure the controlled device with a device motion-based control policy.
Aol Advertising Inc.

Virtual private network based parental control service

In various embodiments, methods and systems for implementing parental controls on mobile devices using virtual private network (vpn)-based parental control services are provided. A parental control profile is received at a controlled device where the parental control profile includes instructions to configure the controlled device with a device control policy.
Aol Inc.

Methods and systems for establishing vpn connections at a vpn gateway

The present invention discloses methods and systems for a vpn gateway to establish virtual private network (vpn) connections with at least one other vpn gateways. The vpn gateway determines that it is classified into a first vpn gateway group by a vpn management server, and the vpn gateway determines which other vpn gateways belong to the same first vpn gateway group.
Pismo Labs Technology Limited

Method and forwarding packet

A method and an apparatus for forwarding a packet, where a first network virtualization edge (nve) receives a first packet sent by a first tenant end system (tes), where a destination internet protocol (ip) address of the first packet is an ip address of a second tes, a destination media access control (mac) address of the first packet is a gateway mac address corresponding to the first nve. The first nve acquires an access virtual network identifier (vn id) and a layer 3 virtual private network (vpn) instance identifier of the first tes, and searches a routing and forwarding table, to obtain an entry corresponding to the ip address of the second tes.
Huawei Technologies Co., Ltd.

Collaborative business communication information system

A collaborative business communication information system that includes one or more communication devices communicatively coupled to one or more networks, and a virtual private network (vpn) accessible by the one or more communication devices via a communication access network. The vpn is configured to provision the one or more communication devices to communicate within the vpn, monitor communication data between the one or more communication devices, encrypt the communication data during transmission and when stored within the vpn, detect and block intrusive activity of the communication data in real-time, and perform a switching operation between the one or more networks in real-time, to provide an uninterrupted communication path between the one or more communication devices in communication with each other..
Grey River Group, Llc

Large scale residential cloud based application centric infrastructures

A first customer edge network device receives an encapsulated packet that includes inner headers comprising source address information for a first service running on a first computing apparatus in a first home cloud and destination address information for a second service running on a second computing apparatus in a second home cloud. The customer edge network device inserts a predetermined portion of bits of a virtual domain identifier of the encapsulated packet into a label to form a virtual domain label for label-based routing.
Cisco Technology, Inc.

Group member recovery techniques

Techniques are presented for optimizing secure communications in a network. As disclosed herein, a key server is configured to provision a plurality of routers that are part of a virtual private network.
Cisco Technology, Inc.

Native application single sign-on

In an example embodiment, a virtual private network (vpn) connection is established between a client device and an authentication service. Then a request is received from a third-party application on the client device, with the request being for a third-party service.
Intermedia.net, Inc.

Nsh service plane for l3vpn forwarding

A method for applying network services to data traffic forwarded between virtual private network (vpn) sites includes: receiving a data packet addressed to a target site associated with the vpn, determining services to be applied to the data packet according to a service chain, where the determining is a function of at least one of the vpn, the origin site or the target site, adding an indication of a vpn forwarding context onto the data packet, encapsulating the data packet with network service header encapsulation, where a header for the encapsulated data packet indicates at least the service chain; forwarding the encapsulated data packet in accordance with the service chain, receiving the encapsulated data packet at the end of the service chain, terminating the service chain, removing the encapsulation, and forwarding the data packet to a target destination per the indication of a vpn forwarding context.. .
Cisco Technology, Inc.

Micro vpn tunneling for mobile platforms

Methods and systems for providing a virtual private network service on a per mobile application basis are presented. In some embodiments, a mobile device that is connected to private network may determine that one of its mobile applications is requesting to communicate with a private network.
Citrix Systems, Inc.

Secure enterprise cdn framework

Various embodiments relate to a method, network node, and non-transitory machine-readable storage medium including the following: providing access to an enterprise file system to end user devices via a virtual private network (vpn); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (cdn) server for storage and access, wherein the cdn server is located outside the vpn; and transmitting the decryption key to an end user device via the vpn.. .
Alcatel-lucent Usa, Inc.

Connection gateway for communicating monitoring and control information between a remotely located mobile device and premises devices/appliances on a premises network

A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a virtual private network (vpn) across an internet substrate..
Portus Singapore Pte Ltd.

Secure access to remote resources over a network

A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual private network tool collects critical network information for the client computer, and sends this critical network information to an address assignment server in the remote network.
Aventail Llc

Method and system of establishing a virtual private network in a cloud service for branch networking

In one aspect, a computerized system useful for implementing a virtual private network (vpn) including an edge device that automatically establishes an internet protocol security (ipsec) tunnel alongside an unsecure multipath protocol (mp) tunnel with a gateway device in preparation for a transmission of a secure traffic communication. The edge device has a list of local subnets.

Systems for improved mobile internet speed and security

Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile internet. A virtual private network (vpn) service application is operated to route outgoing and incoming data packets of a mobile device.
Shoelace Wireless, Inc.

Virtual private network security apparatus and operation method thereof

An operation method of a vpn security apparatus includes receiving a service request from a client, dynamically allocating a fake address of a vpn apparatus connected to a service server, which provides the service requested by the client, and transmitting the fake address allocated to the vpn apparatus to the client and the vpn apparatus.. .
Electronics And Telecommunications Research Institute

System for dividing network using virtual private network and method therefor

The present invention relates to a technology for enabling each user's pc to transmit a packet separately through an internal network or external network by means of a virtual private network almost without changing the existing network environment in a network division system for physically dividing pcs into a group for accessing the internal network and a group for accessing the external network. To this end, the present invention does not allow the connection between an internal network pc and an external network pc through a network division apparatus, does not allow the internal network pc to connect to an encoded gateway, and does not allow the external network to connect through the encoded gateway to the internal network, but enables the internal network pc to connect to the internal network, and the external network pc to connect through a virtual private network to the external network..
Nsolution Co., Ltd.

Rule-based routing to resources through a network

Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer.
Aventail Llc

Method and system for establishing virtual private networks between local area networks

The invention relates to a method for establishing a virtual private network between local area networks, each local area network comprising at least one access gateway to a public network and a unit comprising a vpn client, the method comprising the following steps carried out each time a unit is powered on: sending, by the unit, of at least one connection message to an infrastructure connected to the public network and comprising at least one intermediate server, each connection message passing through a respective gateway of the local area network; reception, by the infrastructure, of each connection message; and determination of topology data identifying each bridge of the local area network in which the unit is placed, the method further comprising the following steps carried out for a plurality of units: instancing, by a predetermined intermediate server of the infrastructure, of a vpn server associated with the plurality of units; establishing an encryption tunnel between the vpn server and the vpn client of each unit from the corresponding topology data; and creating and storing routing data representative of a data routing rule between the established encryption tunnels.. .
Citypassenger

Remote network access via virtual machine

A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer.
Microsoft Technology Licensing, Llc

Method and personal virtual authentication and authorization using digital devices and as an alternative for chip card or smart card

A universal platform for personal, virtual authentication for use by digital devices for access to and/or permission, to confirm identity or enter into transactions (including e-commerce), premises and/or events by employing submitted samples of unique personal attributes which are compared with and evaluated against a library of similar pre-selected samples of unique personal attributes contained in multiple high-speed databases utilizing an internal virtual private network and secure two-way external data communications networks. The system provides for secure, contemporaneous and stored authentication credentials and a unique, secure coded transaction authorization message and record to subscribers as an equal or better alternative for and/or a complement to chip card technology without requiring a card, a physical token, additional hardware or a custom device..

Evpn inter-subnet multicast forwarding

The techniques of this disclosure may improve multicast forwarding in an ethernet virtual private network when delivering multicast traffic to receivers on a different ip subnet than the multicast source. A method may include configuring first and second layer-2 domains to forward network traffic; configuring a first layer-3 integrated routing and bridging (irb) interface for the first layer-2 domain and a second layer-3 irb interface for the second layer 2 domain; receiving a multicast packet from a multicast source device, the multicast source device being included in the first layer-2 domain, the multicast packet having a multicast receiver device in the second layer-2 domain; and forwarding, using the first and second layer-3 irb interfaces, the multicast packet to the multicast receiver device, without receiving the multicast packet from another provider edge router that has been elected as the designated router on the second irb interface for the second layer-2 domain..
Juniper Networks, Inc.

Restricting communications in industrial control

Communication in industrial control is restricted (42). virtual private network functionality is integrated (32) within a programmable logic controller (20) of an industrial control network so that physical access to network interface (16) is insufficient to access information.

Cloud-based security policy configuration

Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters associated with a first network security device of an enterprise are shared by the first network security device with other network security devices associated with the enterprise by logging into an shared enterprise cloud account.
Fortinet, Inc.

User authentication

In one implementation, instructions stored on a non-transitory computer-readable medium are executable by a processing resource to cause a computing device to fetch a token code from a home subscriber server (hss) for a user and log in to a virtual private network (vpn) server using the token code.. .
Hewlett-packard Development Company, L.p.

Credentials management in large scale virtual private network deployment

Techniques for credentials management in large scale virtual private network (vpn) deployment are disclosed. In some embodiments, credentials management in large scale vpn deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish vpn connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using vpn connections..
Palo Alto Networks, Inc.

Update of mac routes in evpn single-active topology

In general, techniques are provided for described herein that extend existing ethernet virtual private network (evpn) protocol signaling mechanisms so that local, multi-homing pes couple to an ethernet segment can definitively convey their primary/backup designated forwarder (df) status to any remote pe of the evpn. In one example, this is accomplished by utilizing a new extended community attribute to each ethernet a-d per evi route advertised by each of the multi-homing pes to specifically carry the advertising pe's primary or backup status.
Juniper Networks, Inc.

Virtual private network dead peer detection

Methods and systems are provided for detecting dead tunnels associated with a vpn. An indicator of a tunnel capability, for example, a dpd vendor id, is received from a peer through a vpn connection.
Dell Software Inc.

Recording system state data and presenting a navigable graphical user interface

Systems, methods, and computer-readable media for recording system state data and displaying the system state data in a navigable graphical user interface are disclosed. An example method includes detecting a first predefined event in a system.
Cisco Technology, Inc.

Multi-wrapped virtual private network

The invention includes a system for transmitting multi-wrapped vpn enabled-data across a communication network from a device to another destination device within a remote protected network. The device comprises a software stack, hardware layer, application-layer vpn software, link-layer vpn software, and user-based application software.
Saife, Inc.

System and monitoring network traffic

Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined.
At&t Intellectual Property Ii, Lp





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Virtual Private Network for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Virtual Private Network with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.6161

file did exist - file did put3006

3 - 1 - 51