GB201119081D0 - Private cloud server and client archictecture without utilizing a routing server - Google Patents

Private cloud server and client archictecture without utilizing a routing server

Info

Publication number
GB201119081D0
GB201119081D0 GBGB1119081.6A GB201119081A GB201119081D0 GB 201119081 D0 GB201119081 D0 GB 201119081D0 GB 201119081 A GB201119081 A GB 201119081A GB 201119081 D0 GB201119081 D0 GB 201119081D0
Authority
GB
United Kingdom
Prior art keywords
client
server
private cloud
cloud server
client device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB1119081.6A
Other versions
GB2496380A (en
GB2496380B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingston Digital Inc
Original Assignee
Kingston Digital Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingston Digital Inc filed Critical Kingston Digital Inc
Priority to GB1119081.6A priority Critical patent/GB2496380B/en
Publication of GB201119081D0 publication Critical patent/GB201119081D0/en
Publication of GB2496380A publication Critical patent/GB2496380A/en
Application granted granted Critical
Publication of GB2496380B publication Critical patent/GB2496380B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4535Network directories; Name-to-address mapping using an address exchange platform which sets up a session between two nodes, e.g. rendezvous servers, session initiation protocols [SIP] registrars or H.323 gatekeepers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A public cloud network includes at least one private cloud server (108) and at least one smart client device (106-111) in communication therewith. The private cloud server and at least one smart client device have a client server relationship. The private cloud server and client have respective first and second message boxes (e-mail, SMS) located in the public network. Session based message information is passed in e-mails or SMS messages between the server and client device via the first and second message boxes in a secure manner. The session based information is authenticated by the server and client. The client device and private cloud server can then communicate with each other after the session based information is authenticated. The method allows the client to traverse a firewall in front of the private cloud server.
GB1119081.6A 2011-11-04 2011-11-04 Private cloud server and client archictecture without utilizing a routing server Active GB2496380B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1119081.6A GB2496380B (en) 2011-11-04 2011-11-04 Private cloud server and client archictecture without utilizing a routing server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1119081.6A GB2496380B (en) 2011-11-04 2011-11-04 Private cloud server and client archictecture without utilizing a routing server

Publications (3)

Publication Number Publication Date
GB201119081D0 true GB201119081D0 (en) 2011-12-21
GB2496380A GB2496380A (en) 2013-05-15
GB2496380B GB2496380B (en) 2014-03-05

Family

ID=45421287

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1119081.6A Active GB2496380B (en) 2011-11-04 2011-11-04 Private cloud server and client archictecture without utilizing a routing server

Country Status (1)

Country Link
GB (1) GB2496380B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2544675B (en) * 2014-08-01 2019-04-03 Kingston Digital Inc Private cloud routing server connection mechanism for use in a private communication architecture
GB2532832B (en) * 2014-08-01 2017-03-22 Kingston Digital Inc Private and secure communication architecture without utilizing a public cloud based routing server
TWI537744B (en) * 2014-08-01 2016-06-11 金士頓數位股份有限公司 Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
TWI629598B (en) * 2014-10-28 2018-07-11 金士頓數位股份有限公司 Method for use with a public cloud network, private cloud routing server and smart device client

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2341523B (en) * 1998-09-12 2003-10-29 Ibm Apparatus and method for establishing communication in a computer network
FR2861934B1 (en) * 2003-10-30 2006-01-27 Wavecom METHOD AND DEVICE FOR ACCESSING A MOBILE SERVER TERMINAL OF A FIRST COMMUNICATION NETWORK USING A CLIENT TERMINAL OF ANOTHER COMMUNICATION NETWORK.
US8141143B2 (en) * 2007-05-31 2012-03-20 Imera Systems, Inc. Method and system for providing remote access to resources in a secure data center over a network

Also Published As

Publication number Publication date
GB2496380A (en) 2013-05-15
GB2496380B (en) 2014-03-05

Similar Documents

Publication Publication Date Title
EP2779589A3 (en) Changing dynamic group VPN member reachability information
EP3737071A3 (en) Method and system for internetwork communication with machine devices
WO2013019708A3 (en) Managing notification messages
EP2574009A3 (en) Network apparatus based on content name, method of generating and authenticating content name
AU2013335114A8 (en) System, method, and apparatus for settlement for participation in an electric power grid
MX2016013472A (en) Power management of mobile clients using location-based services.
MX351070B (en) Email mailbox management.
WO2012051582A3 (en) Transaction alerting in a multi-network environment
WO2013173741A3 (en) Prioritization of incoming communications
WO2014031657A3 (en) Electronic messaging system utilizing social classification rules
GB2534801A (en) A set of servers for "Machine-to-Machine" communications using public key infrastructure
WO2012109184A3 (en) Systems and methods for establishing a communication session between communication devices
MX358557B (en) Wireless data privacy maintained through a social network.
IN2014DN06766A (en)
IN2015DN02657A (en)
TR201911098T4 (en) Secure communication for computing devices using proximity services.
WO2014012175A3 (en) Measuring influence in a social network
PH12015500870A1 (en) Instant messaging system and method
PH12014502005A1 (en) Information sharing method, device and storage medium
WO2016086817A8 (en) Rcs-based group message processing method and device
PH12014501310A1 (en) Method, system, network server and storage medium for anonymous dating
GB2524198A (en) Method and device for secure network access
PH12014501499A1 (en) Secure data communications with network back end devices
GB201119081D0 (en) Private cloud server and client archictecture without utilizing a routing server
GB201218650D0 (en) System 2