Images List Premium Download Classic

Virtual Private Network

Virtual Private Network-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW System, apparatus and method for massively scalable dynamic multipoint virtual private network using group encryption ...
Intel Corporation
January 18, 2018 - N°20180019976

In one embodiment, a hub logic is to provision a plurality of group private keys for a dynamic multipoint virtual private network (dmvpn) group associated with a function of a plurality of devices, provide a group public key for the dmvpn group to the plurality of devices and provision each of the plurality of group private keys to one of ...
Secure network rollover
Oceus Networks Inc.
January 11, 2018 - N°20180014340

A wireless mobile communication device can receive one or more network parameters from a network gateway and identify a network associated with the network parameters based on stored network information of networks with which the device is configured to join and/or network gateways with which the device is configured to communicate. The device can identify private network information associated ...
Virtual private network forwarding and nexthop to transport mapping scheme
Cisco Technology, Inc.
January 11, 2018 - N°20180013584

A method is provided in one example embodiment and includes configuring on a network element a first tunnel from the network element to a first network, wherein the configuring comprises mapping a nexthop address of the local network element to a transport address of the tunnel on the network to create a first nexthop-to-transport mapping for the network element; and ...
Virtual Private Network Patent Pack
Download + patent application PDFs
Virtual Private Network Patent Applications
Download + Virtual Private Network-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Virtual Private Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Device and method for virtual private network connection establishment
Apple Inc.
December 28, 2017 - N°20170374110

A method, client device and non-transitory computer readable storage medium for connecting to a virtual private network (vpn). A request to connect to a destination identified by a hostname is received from an application executed on the client device and a domain name system (dns) lookup functionality is performed on the hostname, the dns lookup functionality returning an address. It ...
Signaling ip address mobility in ethernet virtual private networks
Juniper Networks, Inc.
December 28, 2017 - N°20170373973

In some examples, a provider edge device provides l2 virtual bridge connectivity for at least one customer network using an evpn instance and l3 routing using an irb interface that is a l3 routing interface assigned to the evpn instance; the provider edge device obtains an indication of a new binding for an endpoint device of the at least one ...
Remote providisioning and enrollment of enterprise devices with on-premises domain controllers
Airwatch, Llc
December 21, 2017 - N°20170366646

An agent application executing on a client device retrieves an execute command from a command queue managed by a server and retrieves certificates and configuration settings for establishing a virtual private network (vpn) connection. An enrollment application resident on the client device executes in response to the execute command to modify a network setting of a network interface card (nic) ...
Virtual Private Network Patent Pack
Download + patent application PDFs
Virtual Private Network Patent Applications
Download + Virtual Private Network-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Virtual Private Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Techniques to use operating system redirection for network stream transformation operations
Facebook, Inc.
December 21, 2017 - N°20170366508

Techniques to use operating system redirection for network stream transformation operations are described. In one embodiment, an apparatus may comprise a network stream component operative to receive a network stream, the network stream associated with an application on a device; modify the network stream to generate a modified network stream; and send the modified network stream through an operating system ...
Automated sensing of network conditions for dynamically provisioning efficient vpn tunnels
Altr Solutions, Inc.
December 21, 2017 - N°20170366395

Provided is a process including: executing a virtual private network client application on a client computing device; communicating between the client computing device and a virtual private network server; sensing network conditions of a virtual private network connection; and selecting a set of configuration settings from among the different respective sets of configuration settings based on the network conditions.
Methods and systems for controlling traffic to vpn servers
Lgs Innovations Llc
December 14, 2017 - N°20170359311

The present application is directed a computer-implemented method for for managing traffic in a network. The method includes a step of receiving, from a user on the network, a request to access the internet. The method also includes a step of determining information of the user based upon the request. The information includes a security privilege of the user in ...
Method and apparatus for detecting user network interface connectivity of virtual private network
Zte Corporation
December 14, 2017 - N°20170359239

A method for detecting connectivity of user node interface in a virtual private network includes: acquiring a configuration parameter used for detecting connectivity of a user node interface between a source address and a destination address in the virtual private network; transmitting an internet control message protocol (icmp) request packet from the source address to the destination address through the ...
Methods and systems for communicating using a virtual private network
Glue Networks
November 30, 2017 - N°20170346657

Systems and methods for communication. A network abstraction layer (nal) is built on a public internet; and a network virtualization layer (nvl) is built on the nal.
Individual virtual private local area network service conversion to a different virtual private network service
Cisco Technology, Inc.
November 16, 2017 - N°20170331720

In one embodiment, a plurality of virtual private local area network services (vplss) are operated among a plurality of packet switching devices, with the plurality of vplss including a first vpls and a different second vpls. In response to a conversion declaration including a particular service instance vlan id (i-sid), the first vpls corresponding to the particular i-sid is converted ...
Systems for improved multi-channel network connectivity performance and security
Shoelace Wireless, Inc.
November 09, 2017 - N°20170325286

Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile internet. A virtual private network (vpn) service application is operated to route outgoing and incoming data packets of a mobile device. The mobile device is (i) either coupled to a remote server through the vpn service application for data packets ...
Virtual Private Network Patent Pack
Download + patent application PDFs
Virtual Private Network Patent Applications
Download + Virtual Private Network-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Virtual Private Network-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure interface isolation
November 02, 2017 - N°20170317978

Techniques for isolating interfaces of a protocol stack are discussed herein. In some instances, an apparatus may store a firewall policy that defines a set of rules for a component or type of component of a layer of a protocol stack, such as an internet protocol (ip) interface(s), an ip address(es), a tcp port(s), a socket(s), ...
Secure connections establishment
Telefonaktiebolaget Lm Ericsson (publ)
October 26, 2017 - N°20170310655

According to one aspect is provided a method for establishing a secure connection between a client device and a network gateway. The method is performed by an access point. The method comprises establishing a first secure connection between the access point and the network gateway. The method comprises establishing a second secure connection serving as a virtual private network tunnel ...
Micro vpn tunneling for mobile platforms
Citrix Systems, Inc.
October 26, 2017 - N°20170310445

Methods and systems for providing a virtual private network service on a per mobile application basis are presented. In some embodiments, a mobile device that is connected to private network may determine that one of its mobile applications is requesting to communicate with a private network. The mobile device may intercept one or more system calls to communicate with the ...
Method and system for secure communication with shared cloud services
October 19, 2017 - N°20170302629

A computer implemented method of secure communication between a virtual machine in a set of virtual machines in a virtualized computing environment and a shared software service over a network, the method comprising: establishing a network connection between the virtual machine and the software service; communicating data between the virtual machine and the software service; and, establishing a tunneling virtual ...
Virtual private network dead peer detection
Dell Software Inc.
October 12, 2017 - N°20170295079

Methods and systems are provided for detecting dead tunnels associated with a vpn. An indicator of a tunnel capability, for example, a dpd vendor id, is received from a peer through a vpn connection. The tunnel capability is associated with one or more phase ii tunnels associated with the vpn. Traffic generated by the peer is detected, and if traffic ...
Automated dpi process
App Annie Inc.
October 05, 2017 - N°20170289283

Disclosed is a method for tracking usage of applications on a mobile device that includes a virtual private network (vpn) application. The vpn application includes a rule dictionary to store a rule for each application that is executable on the mobile device. A rule comprises an identifier for the application and an associated regular expression. To create a rule, a ...
Extending nsh services into the vpn l2/l3 domain
Cisco Technology, Inc.
October 05, 2017 - N°20170289032

Embodiments of the present disclosure are directed to augmenting a network service header (nsh) metadata of a data packet with a virtual routing and forwarding identifier (vrf-id) and forgoing augmenting a virtual private network (vpn) label into a multiprotocol label switched (mpls) metadata of the data packet. A provider edge router can use the vrf-id to identify a next hop ...
Mass mac withdrawal for evpn-dci using virtual esi
Juniper Networks, Inc.
October 05, 2017 - N°20170288970

The techniques described are directed to providing mass withdrawal of media access control (mac) routes for network devices in an ethernet virtual private network data center interconnect (evpn dci). Mac routes to reach the learned mac addresses are stored in routing tables with corresponding top-of-rack ethernet segment identifier (tor-esi) values that represent the ethernet segments from where the mac addresses ...
Loading